Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 23:17
Static task
static1
General
-
Target
e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe
-
Size
6.8MB
-
MD5
9f442195d7115c37f002de9b10892ad0
-
SHA1
ad9089e1b93182a38a2339d7d1e446f0f5e79c91
-
SHA256
e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326
-
SHA512
a0245a19aaa1007468655a642d01fffffef852726dc90c08512efe1f34a71327d2905c1f2be7bc4eab4b3e1496a9cfca07f3df0249d9c14a86cf788bbbeddaf1
-
SSDEEP
98304:RedsbjGermqodPcunbMDB4YCcYelVrZ5wQFGmH3WsM4MVECsMWPwO5epYzzd7TQW:msxrmJ/84OrHwQgmX04MaCsMefn7kW
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4X772D.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4X772D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4X772D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4X772D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4X772D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4X772D.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1h67m5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f5140.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a46K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4X772D.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f5140.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f5140.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4X772D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4X772D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1h67m5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1h67m5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a46K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a46K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1h67m5.exe -
Executes dropped EXE 9 IoCs
pid Process 4732 n6m59.exe 2252 Y6k95.exe 2952 1h67m5.exe 4880 skotes.exe 1040 2f5140.exe 3952 3a46K.exe 2460 4X772D.exe 3340 skotes.exe 2420 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1h67m5.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2f5140.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3a46K.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4X772D.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4X772D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4X772D.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Y6k95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" n6m59.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2952 1h67m5.exe 4880 skotes.exe 1040 2f5140.exe 3952 3a46K.exe 2460 4X772D.exe 3340 skotes.exe 2420 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1h67m5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3268 3952 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n6m59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y6k95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1h67m5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f5140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a46K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4X772D.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3a46K.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3a46K.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2952 1h67m5.exe 2952 1h67m5.exe 4880 skotes.exe 4880 skotes.exe 1040 2f5140.exe 1040 2f5140.exe 3952 3a46K.exe 3952 3a46K.exe 3952 3a46K.exe 3952 3a46K.exe 2460 4X772D.exe 2460 4X772D.exe 2460 4X772D.exe 2460 4X772D.exe 3340 skotes.exe 3340 skotes.exe 2420 skotes.exe 2420 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2460 4X772D.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 1h67m5.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 808 wrote to memory of 4732 808 e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe 83 PID 808 wrote to memory of 4732 808 e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe 83 PID 808 wrote to memory of 4732 808 e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe 83 PID 4732 wrote to memory of 2252 4732 n6m59.exe 84 PID 4732 wrote to memory of 2252 4732 n6m59.exe 84 PID 4732 wrote to memory of 2252 4732 n6m59.exe 84 PID 2252 wrote to memory of 2952 2252 Y6k95.exe 85 PID 2252 wrote to memory of 2952 2252 Y6k95.exe 85 PID 2252 wrote to memory of 2952 2252 Y6k95.exe 85 PID 2952 wrote to memory of 4880 2952 1h67m5.exe 86 PID 2952 wrote to memory of 4880 2952 1h67m5.exe 86 PID 2952 wrote to memory of 4880 2952 1h67m5.exe 86 PID 2252 wrote to memory of 1040 2252 Y6k95.exe 87 PID 2252 wrote to memory of 1040 2252 Y6k95.exe 87 PID 2252 wrote to memory of 1040 2252 Y6k95.exe 87 PID 4732 wrote to memory of 3952 4732 n6m59.exe 88 PID 4732 wrote to memory of 3952 4732 n6m59.exe 88 PID 4732 wrote to memory of 3952 4732 n6m59.exe 88 PID 808 wrote to memory of 2460 808 e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe 108 PID 808 wrote to memory of 2460 808 e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe 108 PID 808 wrote to memory of 2460 808 e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe"C:\Users\Admin\AppData\Local\Temp\e0c2d6a645d08c6bfe3f558ece42b986b6c7a949e2290038e655bf370d705326.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6m59.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6m59.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y6k95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y6k95.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1h67m5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1h67m5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f5140.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f5140.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a46K.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a46K.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 15564⤵
- Program crash
PID:3268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X772D.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X772D.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3952 -ip 39521⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5cdc23a9c0acca3e00f3046a358cb02c4
SHA152278bafa095854811dddadffb04b33f140e2dbe
SHA256d59af0ade66fd6b6ec4072f7e1b15f534492a4ca944dcf4b3fd15a0fc75d6bda
SHA512a9fb09ba83e4d069c854755c9c250e2f81b237e3a4f881c80f18c9f61efdd9ceccf9b285c6e643f231ecc6a3c6565c9df05fac944833cb3749b8a217db998b1c
-
Filesize
5.2MB
MD502f41f21394228a4ae80870cb1bc4ecb
SHA1b278d1e327593a1eff3f98b4bd0f67b281da91a4
SHA256d713b58fe5d24beacc32aea9b69c2c3f73f7d78840cdb3f1198e11ec35f57b07
SHA512069f8b574a4abe4d183cdda3f3ae3de9e8723db5e5af80db1b7d975edb83dce529298afaad080d8611ac6b81294a5989504b613e03ce2a5a900cab1d3fb737ef
-
Filesize
4.9MB
MD5cbd44fdf9ded4fc3b65e925528543dd8
SHA1f5b3e995d73b91049d38b6cc2804ccb9c302bf24
SHA256fc3456990d88dba9d5e7f213e5d8e7d7bd137ac19937a39103d5d4ff86663b5c
SHA51264d2524dfef14bd4faee7425352bdaaef6ee235dcf372b66589ce1cbb660168e3d4a27f6d04b4a46af8545382026d24ebb63bf8329ca2bd9f8303e293df6a40f
-
Filesize
3.6MB
MD588d609b5b60901fcb512ddbb1758bd72
SHA18448850a6dc6e254709ee975835c3479baac7158
SHA2568f31d69c93ed940d1b6bf78a625418b24a2ded1450e39c055ae0f08ee7324bf4
SHA51278b4c3b6af04796cabdb4a87389e99ea022f7f3f398d1c60ceffdc20728f4a163c85c946cd72e9d156fd984ed759cb799890a2765b9196bf2175e3b1c8fb3ef4
-
Filesize
3.1MB
MD5580d3dfd202a3330c102622c19ea9f49
SHA1a80fa8c600b299421142715513ea2527803cd608
SHA256dd4f3e4fec12e5241581b5e7f96472e7093625ed3b6f4bb38208b37c82da55d1
SHA512519a7a6896ecdd8a8214a107e4fe43c2936989d57e4470dac32a8cd3871c5a212dc857ba967232c1953e07245913ce32acd182765ccb98dc13c3054ffa2b9c1f
-
Filesize
1.8MB
MD5bd7b1a726951282c65ec0ca069c7549b
SHA1ea9cde739db9e2fb3d185c9b842443c096ac9c66
SHA2564b26e08b262b45842f87361d81dbdb3205fea3632b17ee43d5457bacde98e1de
SHA5124663b4c8b8720b3c200c546705181067bd2620c49cd589b4cb08976a54e7fe989b0908b722f4b093279148c69ca634dd96b34dc625989e35c3b868f6297cffbd