Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 09:28
Static task
static1
General
-
Target
86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe
-
Size
7.0MB
-
MD5
f2a2e2022f2857f6b1912de66d23e47b
-
SHA1
7ab099446e82dbe06c325243b14725c3488bb986
-
SHA256
86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80
-
SHA512
562a011f4bd21d1f5bf6b658a97d10cc5331d8ec630d55c240695249d1f72028762c4b4b090c8dc3441df6dc27c3adc252ccfd660084b2d40838bb8927bf43da
-
SSDEEP
196608:ZWVgRlEIUI9/IxR93imRS70l2EeQpOWN:YVgLEIRa93i7s20pO
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4U488g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4U488g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4U488g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4U488g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4U488g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4U488g.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1m70F8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2r1436.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3H33Z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4U488g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4U488g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4U488g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2r1436.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3H33Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1m70F8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3H33Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2r1436.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1m70F8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1m70F8.exe -
Executes dropped EXE 9 IoCs
pid Process 4664 Z3s85.exe 808 R8U30.exe 4512 1m70F8.exe 5076 skotes.exe 3420 2r1436.exe 1648 3H33Z.exe 2772 4U488g.exe 1960 skotes.exe 1980 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3H33Z.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4U488g.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1m70F8.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2r1436.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4U488g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4U488g.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z3s85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" R8U30.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4512 1m70F8.exe 5076 skotes.exe 3420 2r1436.exe 1648 3H33Z.exe 2772 4U488g.exe 1960 skotes.exe 1980 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1m70F8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3H33Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4U488g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z3s85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R8U30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1m70F8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2r1436.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4512 1m70F8.exe 4512 1m70F8.exe 5076 skotes.exe 5076 skotes.exe 3420 2r1436.exe 3420 2r1436.exe 1648 3H33Z.exe 1648 3H33Z.exe 2772 4U488g.exe 2772 4U488g.exe 2772 4U488g.exe 2772 4U488g.exe 1960 skotes.exe 1960 skotes.exe 1980 skotes.exe 1980 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 4U488g.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4512 1m70F8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4664 2468 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe 85 PID 2468 wrote to memory of 4664 2468 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe 85 PID 2468 wrote to memory of 4664 2468 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe 85 PID 4664 wrote to memory of 808 4664 Z3s85.exe 87 PID 4664 wrote to memory of 808 4664 Z3s85.exe 87 PID 4664 wrote to memory of 808 4664 Z3s85.exe 87 PID 808 wrote to memory of 4512 808 R8U30.exe 88 PID 808 wrote to memory of 4512 808 R8U30.exe 88 PID 808 wrote to memory of 4512 808 R8U30.exe 88 PID 4512 wrote to memory of 5076 4512 1m70F8.exe 89 PID 4512 wrote to memory of 5076 4512 1m70F8.exe 89 PID 4512 wrote to memory of 5076 4512 1m70F8.exe 89 PID 808 wrote to memory of 3420 808 R8U30.exe 90 PID 808 wrote to memory of 3420 808 R8U30.exe 90 PID 808 wrote to memory of 3420 808 R8U30.exe 90 PID 4664 wrote to memory of 1648 4664 Z3s85.exe 96 PID 4664 wrote to memory of 1648 4664 Z3s85.exe 96 PID 4664 wrote to memory of 1648 4664 Z3s85.exe 96 PID 2468 wrote to memory of 2772 2468 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe 99 PID 2468 wrote to memory of 2772 2468 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe 99 PID 2468 wrote to memory of 2772 2468 86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe"C:\Users\Admin\AppData\Local\Temp\86dbbba77ca8d157ff2bb4da0ef8bd68926d26020781f8fe452b516558fc1e80.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z3s85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z3s85.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\R8U30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\R8U30.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1m70F8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1m70F8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r1436.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r1436.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H33Z.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H33Z.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U488g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U488g.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5fe75f0e739e3889f3169358abc660e60
SHA17956287cd78f9823a1bbf9aa9b3d5121cd55785b
SHA256f9726e10c350b4199dde3b4bdaa6716a35fd1817a2659192762d1463e511d308
SHA512cccaaef343f6659f719062b0819a7304f05cf526251826548200d06dc9809cb48ead0b939abc0f6139a4877b9234e9dacf8a756c40cd607ddef692d256676f19
-
Filesize
5.5MB
MD50afd46fa24fa8c9c85783112e60e0cac
SHA1e4d3700363694e7f3da27623d6a1ed98abb76ccb
SHA256b136d454d00cd18686c51c805a27bdeb2c6c98a9051d7305fb0837e796857652
SHA512cb4b498b751f1ecb50d8b1be4549cfbbc27d7fc17a3e487a9ba5915e16fb003d188a4d1d1c79c932fdc3d5dfecb63bad783bc337943b39c1f0cded15860a7f36
-
Filesize
1.7MB
MD539096c92283cd64b866b46b12310e125
SHA10a6ead3e060a0eced104269191ad8cf0455802e4
SHA25607a1750dbfb6e2625f55eb606f9884902a6fc5f22cfcf92a5c2bc8a6a4847f91
SHA5121c1fc6c3381d2018a5a2957380b77109822795e84d68c1d9a9fadd8ab050d305ce5b2d2006865321cae29b724b83eb67faff114d00d266ae9542b75ba4aab0e1
-
Filesize
3.7MB
MD534b76391f1581e3a8c4d05c5e19da436
SHA181e3153fc0cb3653bbbd0a1c74f3db5f86b8a580
SHA256e0808ffb2f51ec8314273a1958debef34a4bbd47fe69e1b3a464b8596984afed
SHA51215fb74d62339bb638e28f79c734d23fab5289b96b3c4f8f011781a38fe3e7ff8a48b72427f190d9b6d779b6baa6442ee74b2616f045855aed6792f8275edb47e
-
Filesize
1.8MB
MD5035ae1ee1c2ee167007c2174afc27e3b
SHA1e99b46681f9dfe17ef19ac9e00539586d4ad2ae6
SHA2565fb0b8b83642c88f23f6e44d6181e4c03fc47771bc510943b8c7becb50db7d6d
SHA51278de62a455ea8b15ebdd244c0b41b0af909df2a8fd61cc1990f8b4c52bc1458118405be81308a2b97d70999640ae474d1c21e83fb4960731cb268f2f9345e566
-
Filesize
1.8MB
MD52f60d3c5f1049e713c629e4b109019e0
SHA152c4769003ef9cfee07c48cf4f8ff3560dbf8733
SHA256258cfb05d707f90183dd6ba8569763e75aff570da88caaf15e7234218d13e324
SHA512b185d43a70429dd27abad4e35c4e091d43a217f74201a6bf839af5f9da26bcf64b4cb9eb0045aba8eeb3f661f58a17212e457b9c9cc36ccab5501cc6c4694141