Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 09:21
Static task
static1
General
-
Target
b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe
-
Size
6.7MB
-
MD5
f71aeb46220fd7e8ed24bf419a92359f
-
SHA1
f5c098d32f53c27aa81d64813a50bb6f3f18e337
-
SHA256
b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489
-
SHA512
0e17ca9264ffa514fee3be497656fe1273b46aa2f50a0738542ff42547dbb29236d29f9d90043be5b94cecbfd1f845d3d7c0dd154c8109a412a4e567a9ce8dcf
-
SSDEEP
196608:kyMnJU9VMu1k+Qf+Lm78cz+PthllEu/LhcbTLn/R6LK/:k1sVxu2Lm78czSl/L+fTR6LK/
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4Z214F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4Z214F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4Z214F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4Z214F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4Z214F.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4Z214F.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a2441.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3K68Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4Z214F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1k76k5.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1k76k5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a2441.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3K68Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3K68Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4Z214F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4Z214F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1k76k5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a2441.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1k76k5.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 1216 O9I15.exe 5080 h6r40.exe 3608 1k76k5.exe 3964 skotes.exe 2884 2a2441.exe 2736 3K68Y.exe 4448 4Z214F.exe 532 c742bd2f66.exe 1920 skotes.exe 2304 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1k76k5.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2a2441.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3K68Y.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 4Z214F.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4Z214F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4Z214F.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" h6r40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" O9I15.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3608 1k76k5.exe 3964 skotes.exe 2884 2a2441.exe 2736 3K68Y.exe 4448 4Z214F.exe 1920 skotes.exe 2304 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1k76k5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1k76k5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a2441.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c742bd2f66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h6r40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Z214F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O9I15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3K68Y.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3608 1k76k5.exe 3608 1k76k5.exe 3964 skotes.exe 3964 skotes.exe 2884 2a2441.exe 2884 2a2441.exe 2736 3K68Y.exe 2736 3K68Y.exe 4448 4Z214F.exe 4448 4Z214F.exe 4448 4Z214F.exe 4448 4Z214F.exe 1920 skotes.exe 1920 skotes.exe 2304 skotes.exe 2304 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4448 4Z214F.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3608 1k76k5.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1216 1360 b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe 83 PID 1360 wrote to memory of 1216 1360 b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe 83 PID 1360 wrote to memory of 1216 1360 b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe 83 PID 1216 wrote to memory of 5080 1216 O9I15.exe 84 PID 1216 wrote to memory of 5080 1216 O9I15.exe 84 PID 1216 wrote to memory of 5080 1216 O9I15.exe 84 PID 5080 wrote to memory of 3608 5080 h6r40.exe 85 PID 5080 wrote to memory of 3608 5080 h6r40.exe 85 PID 5080 wrote to memory of 3608 5080 h6r40.exe 85 PID 3608 wrote to memory of 3964 3608 1k76k5.exe 86 PID 3608 wrote to memory of 3964 3608 1k76k5.exe 86 PID 3608 wrote to memory of 3964 3608 1k76k5.exe 86 PID 5080 wrote to memory of 2884 5080 h6r40.exe 87 PID 5080 wrote to memory of 2884 5080 h6r40.exe 87 PID 5080 wrote to memory of 2884 5080 h6r40.exe 87 PID 1216 wrote to memory of 2736 1216 O9I15.exe 89 PID 1216 wrote to memory of 2736 1216 O9I15.exe 89 PID 1216 wrote to memory of 2736 1216 O9I15.exe 89 PID 1360 wrote to memory of 4448 1360 b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe 90 PID 1360 wrote to memory of 4448 1360 b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe 90 PID 1360 wrote to memory of 4448 1360 b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe 90 PID 3964 wrote to memory of 532 3964 skotes.exe 94 PID 3964 wrote to memory of 532 3964 skotes.exe 94 PID 3964 wrote to memory of 532 3964 skotes.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe"C:\Users\Admin\AppData\Local\Temp\b125132b0fc81b350c50b4e2eeaddace075ae7e1525014c6705378708afa6489.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O9I15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O9I15.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6r40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6r40.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k76k5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k76k5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\1019251001\c742bd2f66.exe"C:\Users\Admin\AppData\Local\Temp\1019251001\c742bd2f66.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a2441.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a2441.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3K68Y.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3K68Y.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Z214F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Z214F.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5d3be190f83365893504c46f2b98f47dc
SHA1b64b54a2f25686b458dd7989a839a4db98e7ddc2
SHA25624a24f0646445095c73e7ce13d5d00b83e50cc31e373b74ab2f1be06f3914671
SHA512673906a25b9a5b22a89f558e2063773752b6b478f2aae923c2474301e2b038795005a2c4f8248df3d98c9c8505442945e93297ba2d26caa627169b7f889df7a9
-
Filesize
2.7MB
MD5880df76d424516c612b54407aeefa341
SHA15fc31b30425cf3ac3c8f1b947bf4b279d3da0d71
SHA25634cda3da6114d02b343d247365e79c33e2fc17409391c42cc187862c21a47321
SHA5126191287acb49e638fa22f181e219c70f735e8dadcc53c3aa2578dcae44396a13a22d2ea97a13e0d453a6d4f689418b3105da0302ab06d69c0bdc9a7dd5593e31
-
Filesize
5.2MB
MD5844af035db285eb439e7aa70c699b3e9
SHA125594b40ce060729a51a284af445c6d94e6ff2e4
SHA256bebf0cbb03622b2d1d62d2a338b3224ee26076090bd2d45e3234ebdf448dd755
SHA51297877937a06b446d0eff6dbefa7415acd02af4045825e2bf7512c2d0f5876e068e200c902044f9a3b3c81e3667bbf775772a6f37b2da11d8c3c94e69e3fe12d1
-
Filesize
2.7MB
MD5a2e7bea4344fd57b09e917ba50ecd482
SHA170d3de6bb6f8f19c4b500c3190b307c21259d2af
SHA2565008900485671d1e697b9afb70829eaa472b379f94e925394ad7b5ab681bdf3e
SHA5129f12fd0c2f92be564f27084bb1c765d5c0dc92eb9f929e60e2e19fb8bbe9d44c262515c0bf81d2191f5ebdd94edaba6e9042c08af75281193fd3dbfd7d8859dc
-
Filesize
3.5MB
MD553870b42c730e3472481e69219fe3b85
SHA1c38c5d8bfe676aa153a34e2c8da2e8407595ff9a
SHA2567b849d5797cb58c6c2865dfd4cd46cd156f0d9e6e13811b667c093370781b809
SHA512c1b169403bd5d318310fdc9e4af02a6d576df4310c1e173845ef06d4be1058f9d9f8eff24f461f05278303e82d897d93d30122248a30f0737857f0067f6cd5bd
-
Filesize
2.9MB
MD59765ac8d5874ba1323875aa901871db6
SHA1376dcb324421e41140e2ff169c2e3f2c39625fe1
SHA256d4d873be4406e74df951d8ec2781150c426663904bf44e504fafa7d70b0e7099
SHA512e3b56ccdb50d10de0bedf9067d2d19e16c01feb0116bfa429f9c027dd1c58261f104fceb64ea1bccb04b3f6cde2089431e6f7a2bf863bae6d7eb0163e761aac3
-
Filesize
1.8MB
MD56a9681c4e4484e33a9d20e53ff87c490
SHA10bb12b650db680e90659a10decd7a8ec1cd0c12e
SHA256555680332dd607bb1c50b8de42292a2ab33f23ea7a0a08318083daf5795d291d
SHA51255438f82b36f372a30c2c455cbb9637072935e01625b15397801e2446258a00b3562b0c615e93b0a0ad48a4cb0c52b40575931ae4a611de02aeeb63293ec12e2