Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 11:03

General

  • Target

    file.exe

  • Size

    3.0MB

  • MD5

    eef08e39264bc0a21cf9e476411f799f

  • SHA1

    ccec2e89c5794ca18121135c5034c2f3c77d58e2

  • SHA256

    a7c9f75b06695f0a360167e17a690a2aeff42837f20818b2a8000e2fd517a07e

  • SHA512

    4b7a9bcedaee292bf76fe17695437119bf7b82a736d79a09c538d3d449bed66962ccfa6ac4a36107b9b34e205a54e2d4e71879ee7682dde840ecdd1f5ed3c177

  • SSDEEP

    98304:oZeqnl+mmx8ZS/bskEP+sYjC6lhqWzcSfU:KYmB+sYNhFzcSf

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\1004821001\7f0316fb02.exe
        "C:\Users\Admin\AppData\Local\Temp\1004821001\7f0316fb02.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 1500
          4⤵
          • Program crash
          PID:2116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 1480
          4⤵
          • Program crash
          PID:2880
      • C:\Users\Admin\AppData\Local\Temp\1004822001\7c208f2c24.exe
        "C:\Users\Admin\AppData\Local\Temp\1004822001\7c208f2c24.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:236
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\1004824001\39c09c66de.exe
        "C:\Users\Admin\AppData\Local\Temp\1004824001\39c09c66de.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Windows security modification
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:316
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3564 -ip 3564
    1⤵
      PID:3104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3564 -ip 3564
      1⤵
        PID:1672
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:344
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:1768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1004821001\7f0316fb02.exe

        Filesize

        3.0MB

        MD5

        beb88464d425b6672e0ddfaabc2a1aec

        SHA1

        d82c1caeb93ce0730de45be486c9dac620ba3552

        SHA256

        2baf2724bcd596615482311e56c44992c76d1f52647ac7c0daa788abc921fa74

        SHA512

        a67648a2045941fbb918d5a76c1d48165e1474755af2477eec8b66b20a6ddc897499bceaedd858551bc78494ab8fec4312215c01d94e010020e31feaec587561

      • C:\Users\Admin\AppData\Local\Temp\1004822001\7c208f2c24.exe

        Filesize

        2.0MB

        MD5

        39dcece0736e0185aa15fc863b0a30a6

        SHA1

        04f92f565fb6ca84d5545715b9e04dfb1e0b5d2f

        SHA256

        5f3bbcbfc3af0df3efbfa025309523f8d5d94fb80c23733c4ecc51a851f24146

        SHA512

        89bc5241f0a407a6986d8a44dcb98a3ead579276a820f062db5ee7ce0aa744ceea67601ad40ffb79b511f619cf3d723e582d2e1e5c2b1bbef51ffd0e007828c4

      • C:\Users\Admin\AppData\Local\Temp\1004824001\39c09c66de.exe

        Filesize

        2.7MB

        MD5

        d6081da54c028c749ff7f28756d9c365

        SHA1

        3dacd58d7300a03bce78ac627630a0ebc4736fd4

        SHA256

        6d3cf3c8d3674092a56b3b423fe0f837f29515e48a833409d26263ae65ca0e7f

        SHA512

        de915083965365c85daf9b71f3703f8967cc5f54979c1a4dc0938c78aef8b5a8900a409db1a7512a6c32d7388aa99794de7dd904c56382f91913a8a492e821fd

      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

        Filesize

        3.0MB

        MD5

        eef08e39264bc0a21cf9e476411f799f

        SHA1

        ccec2e89c5794ca18121135c5034c2f3c77d58e2

        SHA256

        a7c9f75b06695f0a360167e17a690a2aeff42837f20818b2a8000e2fd517a07e

        SHA512

        4b7a9bcedaee292bf76fe17695437119bf7b82a736d79a09c538d3d449bed66962ccfa6ac4a36107b9b34e205a54e2d4e71879ee7682dde840ecdd1f5ed3c177

      • memory/236-64-0x0000000000980000-0x000000000108A000-memory.dmp

        Filesize

        7.0MB

      • memory/236-61-0x0000000000980000-0x000000000108A000-memory.dmp

        Filesize

        7.0MB

      • memory/316-151-0x0000000000090000-0x0000000000356000-memory.dmp

        Filesize

        2.8MB

      • memory/316-121-0x0000000000090000-0x0000000000356000-memory.dmp

        Filesize

        2.8MB

      • memory/316-148-0x0000000000090000-0x0000000000356000-memory.dmp

        Filesize

        2.8MB

      • memory/316-154-0x0000000000090000-0x0000000000356000-memory.dmp

        Filesize

        2.8MB

      • memory/316-147-0x0000000000090000-0x0000000000356000-memory.dmp

        Filesize

        2.8MB

      • memory/344-160-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/344-158-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/1768-169-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-19-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-149-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-23-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-24-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-43-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-22-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-45-0x0000000000C51000-0x0000000000CB9000-memory.dmp

        Filesize

        416KB

      • memory/3244-155-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-21-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-62-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3244-20-0x0000000000C51000-0x0000000000CB9000-memory.dmp

        Filesize

        416KB

      • memory/3244-87-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/3564-44-0x0000000000FA0000-0x00000000012A7000-memory.dmp

        Filesize

        3.0MB

      • memory/3564-67-0x0000000000FA1000-0x0000000000FF9000-memory.dmp

        Filesize

        352KB

      • memory/3564-66-0x0000000000FA0000-0x00000000012A7000-memory.dmp

        Filesize

        3.0MB

      • memory/3564-41-0x0000000000FA1000-0x0000000000FF9000-memory.dmp

        Filesize

        352KB

      • memory/3564-42-0x0000000000FA0000-0x00000000012A7000-memory.dmp

        Filesize

        3.0MB

      • memory/3564-40-0x0000000000FA0000-0x00000000012A7000-memory.dmp

        Filesize

        3.0MB

      • memory/4256-77-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-82-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-79-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-78-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-68-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-75-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-74-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-73-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-76-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-72-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-86-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-84-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-89-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-99-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-98-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-96-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-95-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-93-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-92-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-90-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-88-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-80-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-85-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-97-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-94-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-91-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-83-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-100-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-110-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-109-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-81-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-123-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-70-0x0000000000400000-0x0000000000B0A000-memory.dmp

        Filesize

        7.0MB

      • memory/4256-71-0x0000000000C50000-0x0000000000F5B000-memory.dmp

        Filesize

        3.0MB

      • memory/4756-0-0x0000000000FE0000-0x00000000012EB000-memory.dmp

        Filesize

        3.0MB

      • memory/4756-17-0x0000000000FE0000-0x00000000012EB000-memory.dmp

        Filesize

        3.0MB

      • memory/4756-18-0x0000000000FE1000-0x0000000001049000-memory.dmp

        Filesize

        416KB

      • memory/4756-4-0x0000000000FE0000-0x00000000012EB000-memory.dmp

        Filesize

        3.0MB

      • memory/4756-3-0x0000000000FE0000-0x00000000012EB000-memory.dmp

        Filesize

        3.0MB

      • memory/4756-2-0x0000000000FE1000-0x0000000001049000-memory.dmp

        Filesize

        416KB

      • memory/4756-1-0x0000000077C44000-0x0000000077C46000-memory.dmp

        Filesize

        8KB