Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe
Resource
win7-20240903-en
General
-
Target
45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe
-
Size
2.9MB
-
MD5
a916c16724e4aa3eef3839f1647f2b0f
-
SHA1
981069c2d4254ca1b9cf41bc5dab8db5bfda1558
-
SHA256
45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800
-
SHA512
dc4949109a56e0b177a266e3b30d7675a6af578af31e103dc5ca9a3e26da42c01b472b64cbe0b17c4c64890f477bfffc1a95bc256159ce7e112da20971448980
-
SSDEEP
49152:XYcTFPtXwQoLZUBwsfBvrDtWM2ztzbHm2HCoQVQBhm9vOVTU:vho9UBwsfBTDtW1ztHHmToQycvOVT
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2616 powershell.exe 2728 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 913cee7ddd.exe -
Executes dropped EXE 6 IoCs
pid Process 220 skotes.exe 3536 913cee7ddd.exe 3960 skotes.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4372 skotes.exe 652 skotes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 raw.githubusercontent.com 22 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe 220 skotes.exe 3960 skotes.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4532 251c762947624c2ea023d6f882c74e50.exe 4372 skotes.exe 4532 251c762947624c2ea023d6f882c74e50.exe 652 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 913cee7ddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 251c762947624c2ea023d6f882c74e50.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe 220 skotes.exe 220 skotes.exe 3536 913cee7ddd.exe 2616 powershell.exe 2616 powershell.exe 2728 powershell.exe 2728 powershell.exe 3960 skotes.exe 3960 skotes.exe 4372 skotes.exe 4372 skotes.exe 652 skotes.exe 652 skotes.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3536 913cee7ddd.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4532 251c762947624c2ea023d6f882c74e50.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2060 wrote to memory of 220 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe 82 PID 2060 wrote to memory of 220 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe 82 PID 2060 wrote to memory of 220 2060 45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe 82 PID 220 wrote to memory of 3536 220 skotes.exe 83 PID 220 wrote to memory of 3536 220 skotes.exe 83 PID 220 wrote to memory of 3536 220 skotes.exe 83 PID 3536 wrote to memory of 2616 3536 913cee7ddd.exe 85 PID 3536 wrote to memory of 2616 3536 913cee7ddd.exe 85 PID 3536 wrote to memory of 2616 3536 913cee7ddd.exe 85 PID 3536 wrote to memory of 2728 3536 913cee7ddd.exe 87 PID 3536 wrote to memory of 2728 3536 913cee7ddd.exe 87 PID 3536 wrote to memory of 2728 3536 913cee7ddd.exe 87 PID 3536 wrote to memory of 4532 3536 913cee7ddd.exe 90 PID 3536 wrote to memory of 4532 3536 913cee7ddd.exe 90 PID 3536 wrote to memory of 4532 3536 913cee7ddd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe"C:\Users\Admin\AppData\Local\Temp\45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800_Sigmanly.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\1018820001\913cee7ddd.exe"C:\Users\Admin\AppData\Local\Temp\1018820001\913cee7ddd.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\meqdjfe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\meqdjfe\251c762947624c2ea023d6f882c74e50.exe"C:\meqdjfe\251c762947624c2ea023d6f882c74e50.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD558b7509448459302d45c99a5b139fcc1
SHA18dde0f5bde8e2f161ad034d12319729a20fb0ef0
SHA256a6a82fdbaa5ccd27a2d168f239c845bafd410c960c6c2e4c387958c7e6af046c
SHA51221bf8595c54935a018e106e4a643d67a9b7e64285cccbbd8f3eb9ef1a20fa17e6ce57eba31c3654217def06549f055bcc68793aa808d8c71b64efef44b808ffc
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5a916c16724e4aa3eef3839f1647f2b0f
SHA1981069c2d4254ca1b9cf41bc5dab8db5bfda1558
SHA25645400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800
SHA512dc4949109a56e0b177a266e3b30d7675a6af578af31e103dc5ca9a3e26da42c01b472b64cbe0b17c4c64890f477bfffc1a95bc256159ce7e112da20971448980
-
Filesize
1.2MB
MD5577cd52217da6d7163cea46bb01c107f
SHA182b31cc52c538238e63bdfc22d1ea306ea0b852a
SHA256139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728
SHA5128abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474