Analysis
-
max time kernel
112s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe
Resource
win7-20241010-en
General
-
Target
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe
-
Size
3.1MB
-
MD5
83bc6873a7977706a187a72d43538370
-
SHA1
9f9f8cac87edcfb3f5c64ccbea4d9340efc0d798
-
SHA256
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4
-
SHA512
cb7172da9dc701ce3d14919af9003ae1f3b29fc22c60846f0886ea6ef445a04312f39e9c29782808d69121f754e904e6b6213ae3b72d18ceeef3569cb14c0965
-
SSDEEP
49152:Otub5iT64321IMNRt3piRD2Lr22P6gkX+h8g9HAvdD:OtuS64321IMHCCXPbkOegZch
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://shineugler.biz/api
Extracted
lumma
https://shineugler.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98d8a0a1c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98d8a0a1c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98d8a0a1c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 skotes.exe 2092 98d8a0a1c9.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 98d8a0a1c9.exe -
Loads dropped DLL 3 IoCs
pid Process 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 3004 skotes.exe 3004 skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 3004 skotes.exe 2092 98d8a0a1c9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d8a0a1c9.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 3004 skotes.exe 2092 98d8a0a1c9.exe 2092 98d8a0a1c9.exe 2092 98d8a0a1c9.exe 2092 98d8a0a1c9.exe 2092 98d8a0a1c9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3004 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 29 PID 1680 wrote to memory of 3004 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 29 PID 1680 wrote to memory of 3004 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 29 PID 1680 wrote to memory of 3004 1680 f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe 29 PID 3004 wrote to memory of 2092 3004 skotes.exe 31 PID 3004 wrote to memory of 2092 3004 skotes.exe 31 PID 3004 wrote to memory of 2092 3004 skotes.exe 31 PID 3004 wrote to memory of 2092 3004 skotes.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe"C:\Users\Admin\AppData\Local\Temp\f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\1015894001\98d8a0a1c9.exe"C:\Users\Admin\AppData\Local\Temp\1015894001\98d8a0a1c9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56c1d0dabe1ec5e928f27b3223f25c26b
SHA1e25ab704a6e9b3e4c30a6c1f7043598a13856ad9
SHA25692228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d
SHA5123a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9
-
Filesize
3.1MB
MD583bc6873a7977706a187a72d43538370
SHA19f9f8cac87edcfb3f5c64ccbea4d9340efc0d798
SHA256f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4
SHA512cb7172da9dc701ce3d14919af9003ae1f3b29fc22c60846f0886ea6ef445a04312f39e9c29782808d69121f754e904e6b6213ae3b72d18ceeef3569cb14c0965