Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 23:16
Static task
static1
General
-
Target
57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe
-
Size
7.1MB
-
MD5
ffaa957b9fa4fd4d1d3a88b7600b6ea6
-
SHA1
4939736d9648fcdeccdecedc5c1d5e4b60815c08
-
SHA256
57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c
-
SHA512
2e717ba76a602bfbebc329263011f786ca71ea7338555a2561d30a2934dc702156684cb41fb8efb27dbfeb437cecd95c49b04a156447302d1f865d9289fe16a5
-
SSDEEP
196608:PtXblkafj/LLFn8IdjCLC9oIX1WN0skcXVUFOuYT:PB53jnF8MjCLqoIA0aeFLy
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4P494Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4P494Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4P494Y.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4P494Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4P494Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4P494Y.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 27657630de.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 27657630de.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec243b4f46.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a7330e616.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2D3134.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4P494Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da066a223d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1U35a0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3S76K.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27657630de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec243b4f46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a7330e616.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4P494Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2D3134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3S76K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da066a223d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1U35a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27657630de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4P494Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da066a223d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a7330e616.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2D3134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec243b4f46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1U35a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3S76K.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1U35a0.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 1056 X3z70.exe 1884 o0k47.exe 4780 1U35a0.exe 4408 skotes.exe 2124 2D3134.exe 1652 3S76K.exe 3048 4P494Y.exe 4304 skotes.exe 4436 da066a223d.exe 4496 skotes.exe 4148 27657630de.exe 3524 ec243b4f46.exe 1540 5a7330e616.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1U35a0.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4P494Y.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 27657630de.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine ec243b4f46.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 5a7330e616.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2D3134.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3S76K.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine da066a223d.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4P494Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4P494Y.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ec243b4f46.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011091001\\ec243b4f46.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5a7330e616.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011092001\\5a7330e616.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" X3z70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" o0k47.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4780 1U35a0.exe 4408 skotes.exe 2124 2D3134.exe 1652 3S76K.exe 3048 4P494Y.exe 4304 skotes.exe 4436 da066a223d.exe 4496 skotes.exe 4148 27657630de.exe 3524 ec243b4f46.exe 1540 5a7330e616.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1U35a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2412 2124 WerFault.exe 87 4996 2124 WerFault.exe 87 4996 3524 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec243b4f46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a7330e616.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o0k47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1U35a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2D3134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3S76K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4P494Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X3z70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da066a223d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27657630de.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4780 1U35a0.exe 4780 1U35a0.exe 4408 skotes.exe 4408 skotes.exe 2124 2D3134.exe 2124 2D3134.exe 1652 3S76K.exe 1652 3S76K.exe 3048 4P494Y.exe 3048 4P494Y.exe 4304 skotes.exe 4304 skotes.exe 3048 4P494Y.exe 3048 4P494Y.exe 4436 da066a223d.exe 4436 da066a223d.exe 4496 skotes.exe 4496 skotes.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 4148 27657630de.exe 3524 ec243b4f46.exe 3524 ec243b4f46.exe 1540 5a7330e616.exe 1540 5a7330e616.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 4P494Y.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4780 1U35a0.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1056 2004 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe 83 PID 2004 wrote to memory of 1056 2004 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe 83 PID 2004 wrote to memory of 1056 2004 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe 83 PID 1056 wrote to memory of 1884 1056 X3z70.exe 84 PID 1056 wrote to memory of 1884 1056 X3z70.exe 84 PID 1056 wrote to memory of 1884 1056 X3z70.exe 84 PID 1884 wrote to memory of 4780 1884 o0k47.exe 85 PID 1884 wrote to memory of 4780 1884 o0k47.exe 85 PID 1884 wrote to memory of 4780 1884 o0k47.exe 85 PID 4780 wrote to memory of 4408 4780 1U35a0.exe 86 PID 4780 wrote to memory of 4408 4780 1U35a0.exe 86 PID 4780 wrote to memory of 4408 4780 1U35a0.exe 86 PID 1884 wrote to memory of 2124 1884 o0k47.exe 87 PID 1884 wrote to memory of 2124 1884 o0k47.exe 87 PID 1884 wrote to memory of 2124 1884 o0k47.exe 87 PID 1056 wrote to memory of 1652 1056 X3z70.exe 107 PID 1056 wrote to memory of 1652 1056 X3z70.exe 107 PID 1056 wrote to memory of 1652 1056 X3z70.exe 107 PID 2004 wrote to memory of 3048 2004 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe 110 PID 2004 wrote to memory of 3048 2004 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe 110 PID 2004 wrote to memory of 3048 2004 57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe 110 PID 4408 wrote to memory of 4436 4408 skotes.exe 113 PID 4408 wrote to memory of 4436 4408 skotes.exe 113 PID 4408 wrote to memory of 4436 4408 skotes.exe 113 PID 4408 wrote to memory of 4148 4408 skotes.exe 115 PID 4408 wrote to memory of 4148 4408 skotes.exe 115 PID 4408 wrote to memory of 4148 4408 skotes.exe 115 PID 4408 wrote to memory of 3524 4408 skotes.exe 116 PID 4408 wrote to memory of 3524 4408 skotes.exe 116 PID 4408 wrote to memory of 3524 4408 skotes.exe 116 PID 4408 wrote to memory of 1540 4408 skotes.exe 120 PID 4408 wrote to memory of 1540 4408 skotes.exe 120 PID 4408 wrote to memory of 1540 4408 skotes.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe"C:\Users\Admin\AppData\Local\Temp\57a3b4e843bcce69125a951184a792d95bd780e26e3cc48b01195de89e1c579c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X3z70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X3z70.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0k47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0k47.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U35a0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U35a0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\1011089001\da066a223d.exe"C:\Users\Admin\AppData\Local\Temp\1011089001\da066a223d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\1011090001\27657630de.exe"C:\Users\Admin\AppData\Local\Temp\1011090001\27657630de.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\1011091001\ec243b4f46.exe"C:\Users\Admin\AppData\Local\Temp\1011091001\ec243b4f46.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 15847⤵
- Program crash
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011092001\5a7330e616.exe"C:\Users\Admin\AppData\Local\Temp\1011092001\5a7330e616.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D3134.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D3134.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 11165⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 17405⤵
- Program crash
PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S76K.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S76K.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4P494Y.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4P494Y.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2124 -ip 21241⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2124 -ip 21241⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3524 -ip 35241⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57d9e81071dca4ffd98fdaa3a59f3d4c2
SHA17d717efa51114a837b32435a11744536e086b324
SHA256a8f6e1f06ce798c9a24a7406366b8abed6f82097e593a8390c48b612f9e4d69b
SHA512b641f3aafc38851503f3e9f1883c809fb3c73a7042c953b8c7416c133fd7e1770f427598204dd8411b68fcdba05ce21981090792cc5d74b7fb4c7b30c8947be8
-
Filesize
4.3MB
MD5ff4b8170d65a601c9dd68f65991fcd26
SHA1ed404a41c0991fd1b250d82fd6e95ca3b1ed047f
SHA256d4d15d36936bf4c07fec6af26c3a877ea4fd5e8417eeaeed74106809c0151c5d
SHA512b7aaeae076ebd114e9d58651e2bf96e577aec54b9ccbadbb1b050eb29a865dcf3411d60cbf90d5aa0e923cf7690591f8c5affdebaa5797f2cf169f6b41d2400a
-
Filesize
2.7MB
MD58645cc60ea0d7f3f64d87a95c9059377
SHA19ef12d226d49bfb6daae661bb41e83ec7a5df672
SHA256889ef406ae4e3e9db8e605eedfda2f42174580353d6886044d7d61354bd03cd0
SHA51207c5eaa6869a1123f7479416a47d404fce95a41a5551c8586c098745f0e4dd0a28ea5da1bcfd7fab3444564e57cf228bd904e02810d481f2462bf4644af83f11
-
Filesize
5.5MB
MD59c3efefed5f03f763f4cb713c2eebf67
SHA1c0cb88262789fe4d1fb06225991d1d373641551a
SHA2567570f05cbe3009e6dbb1c1a03e08f8f0e6e326d409977bc140a7bcdb32abc604
SHA512f235b84197d180e0cd6ca2dcc6b90133e4672eb3c2ffaa3c086a14cb2939d565cc603e85a0e9df85625190f6236f55d86d4739b0c6313a2fa2ada45cd0d090e1
-
Filesize
1.7MB
MD567a3f36d09e43df0dc573740f80c383d
SHA11e46691a92586a72111174070f8e6772fd045478
SHA256f5bc3eb3ce1e72dc332853f436784bb44f53324463514b78356cc711fc8653bb
SHA5120200be8eabda8949549ae45cf0a55ac43449c84af8707d26f13a1806ce9afd1556fc7371be933cb196d1bed69d2a80ce43ae7c0f7bb354d7d5d498d37c91e5a9
-
Filesize
3.7MB
MD53e284aa4c5850bb29a942d904313fe6f
SHA1d0b2f3fbbd06b51c26265aba4b0dfb6a6d34656e
SHA2565dd398f93e2cdcd16ba146c8305ccf7776f03b305b128b1e94c695060f0e45b7
SHA512133796a0c8049d549e003041f75f9ef4027fa1b77c30e59a59515d42c39e7afab4732ace7365d6e2476ccb9aa6fe7620e7a2c580494f25ff38d30189dd903fff
-
Filesize
1.8MB
MD56168d17233fabf78c99b2332ef567ee8
SHA1fc01ec2e16bb741ddacf14c25eca3d7e2c502b95
SHA2565aaa108b8e6e927fe2cf2ae6280d54bbc78b779d2bb31f171846f216ebeeb0e7
SHA5124398c14274e147ece5faa6d707b837615724e1b410a42eee95fcb099ba405d71b998be230fa4c20cb1f42d36f5fa65bf9356226ada7f8d7a34cac62b4d1a29f1
-
Filesize
1.8MB
MD5b670ae6d2db43ba12d14b7e29d02eb3b
SHA135cd2df71bb0acf5a161b4d4d60ffcf220822490
SHA25623ec194caafa831e65e924bd7513771b81a44c8447232f80ba23a7a571c6aa98
SHA51239daa37162b922c1b0592e1585ca185940e1c94ce7210f487b821aab7ee48b2ba1498e5843cffa0d0cc96277cbad037760f5a3f11673c0c5ae8af91cb5d7f2a9