Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 13:44
Static task
static1
General
-
Target
d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe
-
Size
5.5MB
-
MD5
490224d0ee02713124ba153b7102959d
-
SHA1
5506dab20589d7ecf10dded2631fb96ec1089f9d
-
SHA256
d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee
-
SHA512
77766d2b110323653c60bad73a2c989434c044e5de76cfeeadecbc518245bc0e849394392c620f5a24441300dc23228e5fe405c7b3b8afc8f8157d713eaab71c
-
SSDEEP
98304:dYYu0EkBE3eTNAIP1daehaNtAXcXmhUqA/nPGs8sFIKFZBSIu8H/gxI/T8qe6TR:dYY1BEuT+8n1haNtM4aU9/nPGT8jIVKv
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2k9869.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w97s.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1n74X7.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w97s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2k9869.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w97s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2k9869.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1n74X7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1n74X7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1n74X7.exe -
Executes dropped EXE 8 IoCs
pid Process 3544 v6l75.exe 4876 1n74X7.exe 2088 skotes.exe 2448 2k9869.exe 1272 3w97s.exe 2060 skotes.exe 3684 skotes.exe 2688 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1n74X7.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2k9869.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3w97s.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6l75.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4876 1n74X7.exe 2088 skotes.exe 2448 2k9869.exe 1272 3w97s.exe 2060 skotes.exe 3684 skotes.exe 2688 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1n74X7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2448 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6l75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1n74X7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2k9869.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w97s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4876 1n74X7.exe 4876 1n74X7.exe 2088 skotes.exe 2088 skotes.exe 2448 2k9869.exe 2448 2k9869.exe 1272 3w97s.exe 1272 3w97s.exe 2060 skotes.exe 2060 skotes.exe 3684 skotes.exe 3684 skotes.exe 2688 skotes.exe 2688 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 1n74X7.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 392 wrote to memory of 3544 392 d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe 83 PID 392 wrote to memory of 3544 392 d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe 83 PID 392 wrote to memory of 3544 392 d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe 83 PID 3544 wrote to memory of 4876 3544 v6l75.exe 84 PID 3544 wrote to memory of 4876 3544 v6l75.exe 84 PID 3544 wrote to memory of 4876 3544 v6l75.exe 84 PID 4876 wrote to memory of 2088 4876 1n74X7.exe 85 PID 4876 wrote to memory of 2088 4876 1n74X7.exe 85 PID 4876 wrote to memory of 2088 4876 1n74X7.exe 85 PID 3544 wrote to memory of 2448 3544 v6l75.exe 86 PID 3544 wrote to memory of 2448 3544 v6l75.exe 86 PID 3544 wrote to memory of 2448 3544 v6l75.exe 86 PID 392 wrote to memory of 1272 392 d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe 105 PID 392 wrote to memory of 1272 392 d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe 105 PID 392 wrote to memory of 1272 392 d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe"C:\Users\Admin\AppData\Local\Temp\d1c102c5cecb6a5cc6cd89984d43cf0c036152affa6a3f55c4e9317e75b52cee.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6l75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6l75.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1n74X7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1n74X7.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2k9869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2k9869.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 16164⤵
- Program crash
PID:2936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3w97s.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3w97s.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2448 -ip 24481⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51e9314537d32215aac9b9e508cad802a
SHA1f4beac8138432483f4c82cf396e2468ea219c936
SHA256b6904d59e10e8349493b64fad899e70b694c60af552fcc8f70a7f090d7b3559b
SHA512db06e604d8aa83013a850104cad34432653600bccd350b2d652fa4d6624a3694d44952a813bab84ba59405e6fd1850f0638eb75603aa2793f7cdfd2a374317b4
-
Filesize
3.7MB
MD5d86ed2e3336ba4363848d87ac4b2c7d7
SHA15e5540aa74513eb3797475e3825d4b8416e235ad
SHA25632d935b68d0af280ad56acb4b0e361ab631a0bef73173c21308f0fdf9d4fc129
SHA512cecd8630b4dddd2badeb5e4c79e3c9243e69bde83d758fabef5de9a4f3344c3face4de6fcf3d536e40cf8369974d0fc4f778e5637d97daee193aea3ce3fefcff
-
Filesize
1.8MB
MD598e66a6c63fd4a6e478f71174cc40928
SHA192230e66cdd0443f85cfcadea4633b9698a7671f
SHA2562683f0b1e3edd438f90145016f5a922c5da3eaf00ebaa357520c10967fb3a522
SHA51219af3f549d55163109cfe94adedb9160ea189c737ab837e52d55c3d8d7e6f45a9fb93e7ac039217b4fa4b2ce411992534dc774909b9da4aae6b74646db8be9f9
-
Filesize
1.8MB
MD5c8491ae5902c67a267dba9d0c53974d8
SHA18497a3d1aed7dc19a5c1299fcea08fb6d1f38fd0
SHA256145d98e48d061103fe23cc3be16b2cc47dcb8889a9a728d75f968fd83a3b1903
SHA512e0e81cdadfaabcaddf2a000afcd4741fc66603fffd169e6a0747458c62c805b0f64e1e75b40230d93da1894e95eee5664478b92635799332dfda428a442afd6f