Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 13:15
Static task
static1
General
-
Target
ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe
-
Size
3.5MB
-
MD5
e511e6360abe0c5ea58abd6470834830
-
SHA1
cb8e57010603b363e39d06787525ce761f768081
-
SHA256
ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81
-
SHA512
c08c8978e08ed9293b0cf77ab78461dc496647e37d6a6989f1f2bca5853c5a3c04bef2d2558a72f51b6e71e90b4f15582111469f8e0f1bc41d39494100b16d51
-
SSDEEP
49152:yzEYEvllWYbnucw+q0LpRmc4TLWcpxmZS1O3PBfiw+NJqYQAoYoo:eEYqlWqHwKpUNLhESo/Qjn/o
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9ded8b5d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9ded8b5d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9ded8b5d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9ded8b5d5f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9ded8b5d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9ded8b5d5f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9dd4310c32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2eb4bf5e81.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9ded8b5d5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1n75c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2r4221.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9dd4310c32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9ded8b5d5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2eb4bf5e81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9ded8b5d5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1n75c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1n75c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9dd4310c32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2r4221.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2r4221.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2eb4bf5e81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1n75c8.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 2660 1n75c8.exe 864 skotes.exe 4084 2r4221.exe 3824 9dd4310c32.exe 4400 2eb4bf5e81.exe 4000 skotes.exe 2556 skotes.exe 4820 9ded8b5d5f.exe 4076 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2r4221.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 9ded8b5d5f.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1n75c8.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 9dd4310c32.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2eb4bf5e81.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9ded8b5d5f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9ded8b5d5f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9dd4310c32.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005076001\\9dd4310c32.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2eb4bf5e81.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005077001\\2eb4bf5e81.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9ded8b5d5f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005079001\\9ded8b5d5f.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2660 1n75c8.exe 864 skotes.exe 4084 2r4221.exe 3824 9dd4310c32.exe 4400 2eb4bf5e81.exe 4000 skotes.exe 2556 skotes.exe 4820 9ded8b5d5f.exe 4076 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 864 set thread context of 4000 864 skotes.exe 98 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1n75c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2r4221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dd4310c32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eb4bf5e81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ded8b5d5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1n75c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2660 1n75c8.exe 2660 1n75c8.exe 864 skotes.exe 864 skotes.exe 4084 2r4221.exe 4084 2r4221.exe 3824 9dd4310c32.exe 3824 9dd4310c32.exe 4400 2eb4bf5e81.exe 4400 2eb4bf5e81.exe 4000 skotes.exe 4000 skotes.exe 2556 skotes.exe 2556 skotes.exe 4820 9ded8b5d5f.exe 4820 9ded8b5d5f.exe 4820 9ded8b5d5f.exe 4820 9ded8b5d5f.exe 4076 skotes.exe 4076 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4820 9ded8b5d5f.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5084 wrote to memory of 2660 5084 ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe 85 PID 5084 wrote to memory of 2660 5084 ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe 85 PID 5084 wrote to memory of 2660 5084 ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe 85 PID 2660 wrote to memory of 864 2660 1n75c8.exe 87 PID 2660 wrote to memory of 864 2660 1n75c8.exe 87 PID 2660 wrote to memory of 864 2660 1n75c8.exe 87 PID 5084 wrote to memory of 4084 5084 ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe 88 PID 5084 wrote to memory of 4084 5084 ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe 88 PID 5084 wrote to memory of 4084 5084 ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe 88 PID 864 wrote to memory of 3824 864 skotes.exe 94 PID 864 wrote to memory of 3824 864 skotes.exe 94 PID 864 wrote to memory of 3824 864 skotes.exe 94 PID 864 wrote to memory of 4400 864 skotes.exe 97 PID 864 wrote to memory of 4400 864 skotes.exe 97 PID 864 wrote to memory of 4400 864 skotes.exe 97 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4000 864 skotes.exe 98 PID 864 wrote to memory of 4820 864 skotes.exe 100 PID 864 wrote to memory of 4820 864 skotes.exe 100 PID 864 wrote to memory of 4820 864 skotes.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe"C:\Users\Admin\AppData\Local\Temp\ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1n75c8.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1n75c8.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\1005076001\9dd4310c32.exe"C:\Users\Admin\AppData\Local\Temp\1005076001\9dd4310c32.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\1005077001\2eb4bf5e81.exe"C:\Users\Admin\AppData\Local\Temp\1005077001\2eb4bf5e81.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\1005079001\9ded8b5d5f.exe"C:\Users\Admin\AppData\Local\Temp\1005079001\9ded8b5d5f.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2r4221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2r4221.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4076
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5b09deb1644094d9569ac5a518e97c25c
SHA11ddcbbcbb00401a14838fe46257125c56896f98d
SHA256d96be8a69a7207825037e59d9a844ea912e910ae5896464a929064c0c77e2fb0
SHA51271ae273f909e6bdf9aa94c5f7e716f633518abbf33cc635d44d62feec8945349c1f33456fab83a432770d0ca788bd2ec7f63c492eec196d23354afcf0e2e4034
-
Filesize
2.0MB
MD50801425a20b0620caa7a43be53f4602b
SHA1c2df5b979d38cc378f36bfaef9bcbee75a320cd2
SHA256031c985ef3fa8e36336ea00598aeeabd410303b7cf8c3b1103386c89163b62c6
SHA5122a29d2d0fcabba828e74a4835a7ddab313b114739aa3856a24c73e9766ab05ff31530947891dd4f195dff877fc977a9f8c8e3a174c1889a5b81f13272b82b14d
-
Filesize
2.7MB
MD5c81134b3173346bdf56947e25f493731
SHA111373e6e6ae8d3d37df3f210b5d592e53ca39690
SHA2563c575868ff58d241c2cfab122237857624a6879b7c1d5c7041f1a225f53f1367
SHA5125931f86366ef22f8b3da5f9a4cd3389e1eb1bc99d5ba465267e67d8e204ef9c430d5d3181213fcab94a075fa2ac67085649bbc2ca685cc2d836a1c38906370dc
-
Filesize
3.1MB
MD5aec56671d0758eaff92926d21fac8693
SHA1084b183a609a1c2c70d860757257082a563e7bc4
SHA2569aa772b16838edca5370628672880f7263cf78f1661e8622fd22701090456306
SHA512c40e653996c1a2d6924a6dd9cbf26155b84eae1a9778e8ff8a55c740c8fa18d6f944fc1fdcbee76804f7c0bb0fad4f80e4f2b3ae6175134d52111207db25579e
-
Filesize
3.0MB
MD51e89027e4db2c2f57e9b4db8b00200c7
SHA1435f869057bc76c9e7596d7740deb51f4ba59260
SHA256b2dd3033c8dd8bf7218e42ebb0684c416b63748398c1bcba039e8a37c54bb9fe
SHA512562c1f65607b95d05ce3c55bdb9a15a9c4a3752c5bc92a5c36fd5aa7846f06d437f6f39adb1b8322583c7d5008ea88ce9d842ad9648f79c5fa4f60bbc3bc70a8