Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 20:28
Static task
static1
General
-
Target
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe
-
Size
3.6MB
-
MD5
3bc888b63247898f10e270e0711ccca2
-
SHA1
342efb0b96606ddbe130fb362c24aa1661a72f33
-
SHA256
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a
-
SHA512
0684c613bbbef78ccd2c127e305ad9115a4623e8a3617a1a2d88c925725fb1817674f7f5b9c5394e60759c655660a5723f8a07d80bd369e5951970e1b3d5f5a1
-
SSDEEP
98304:b5TOfP9BOxle7zesk/WLKmLNi4ZBjUYnFVzkBhOZOAj/P:YQlEesaJmLNFPj9r4uOOP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
quasar
1.4.1
Office04
45.200.148.155:6060
4b3820e0-d123-49d9-b51e-3c4daa4f6874
-
encryption_key
F8879E9B26846C57C99B6F152F74703E1CC15B8B
-
install_name
SecurityHealthSystray.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SecurityHealthSystray.exe
-
subdirectory
SubDir
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3600-50-0x0000000000F70000-0x0000000001706000-memory.dmp family_quasar behavioral1/memory/3600-51-0x0000000000F70000-0x0000000001706000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1p76f5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c8776.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kelyBT9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c8776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c8776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1p76f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1p76f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1p76f5.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 6 IoCs
pid Process 516 1p76f5.exe 2532 skotes.exe 3856 2c8776.exe 3600 kelyBT9.exe 4004 skotes.exe 4680 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1p76f5.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2c8776.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine kelyBT9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 516 1p76f5.exe 2532 skotes.exe 3856 2c8776.exe 3600 kelyBT9.exe 4004 skotes.exe 4680 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1p76f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 404 3856 WerFault.exe 86 3480 3856 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kelyBT9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1p76f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8776.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 64 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 516 1p76f5.exe 516 1p76f5.exe 2532 skotes.exe 2532 skotes.exe 3856 2c8776.exe 3856 2c8776.exe 3600 kelyBT9.exe 3600 kelyBT9.exe 4004 skotes.exe 4004 skotes.exe 4680 skotes.exe 4680 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3600 kelyBT9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 516 1p76f5.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 228 wrote to memory of 516 228 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 84 PID 228 wrote to memory of 516 228 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 84 PID 228 wrote to memory of 516 228 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 84 PID 516 wrote to memory of 2532 516 1p76f5.exe 85 PID 516 wrote to memory of 2532 516 1p76f5.exe 85 PID 516 wrote to memory of 2532 516 1p76f5.exe 85 PID 228 wrote to memory of 3856 228 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 86 PID 228 wrote to memory of 3856 228 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 86 PID 228 wrote to memory of 3856 228 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 86 PID 2532 wrote to memory of 3600 2532 skotes.exe 96 PID 2532 wrote to memory of 3600 2532 skotes.exe 96 PID 2532 wrote to memory of 3600 2532 skotes.exe 96 PID 3600 wrote to memory of 64 3600 kelyBT9.exe 97 PID 3600 wrote to memory of 64 3600 kelyBT9.exe 97 PID 3600 wrote to memory of 64 3600 kelyBT9.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe"C:\Users\Admin\AppData\Local\Temp\191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SecurityHealthSystray.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SecurityHealthSystray.exe" /rl HIGHEST /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:64
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 16083⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 15563⤵
- Program crash
PID:3480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3856 -ip 38561⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3856 -ip 38561⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD525ae2a8e59da886dbc3192b12e000ffa
SHA1c384fbee5a29be18571d293c1e20a36d044bd86a
SHA256d951b4352f6e4f9ef63cbbabac6cae41d3de37d26dee4b4890d60b52d51ddbb4
SHA512246a2948f880231fe597a4c6cfb1f8acbbc7173f73752532dd2049697cd4165c6d1e966a1a598d260053e1f4aeebf0472ffedc4aec56c8233899c965c7fc6736
-
Filesize
3.1MB
MD5c0d113d521f4055ce2d25ba430f7789d
SHA17a9e6c9ca301b9bbc363b615a6f8c9ea3f199758
SHA2560cdee686d940e327d736172dbe61168063bfaf253cca8ad0b37ec2097bc20fcd
SHA512c9567a7b02758846c8aa4e201a01cc807233fdbbfc63ebe2d350388682935ca98313531aff4c026c31b2ffbb6302e220cd6e68bdd42e1e42475400aa6608a084
-
Filesize
1.8MB
MD5e0933ae8e72f7faa74c26e20098c6279
SHA161edd92c5d8a5416a556b6a822bb7e7cef73068a
SHA2568c60e2eb2504988a8b4d55b0b5d9b430896e04c8b40547efd5e5930b168a7beb
SHA51205ad0f15d4b78581bb7b2f2df4f9c8e38cf83825fdc963d9d8bf633030418bbd01e2330eb411d2c42f78acf3ffe7e9cf6f492cc68316630763fccf811bf8fb3b