Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 03:41
Static task
static1
General
-
Target
2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe
-
Size
6.7MB
-
MD5
2da9478f254591c1a28e5a07e77cbd80
-
SHA1
7a0dc9c461ee6bc2958fdbfc898a75c0ce3513da
-
SHA256
2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1
-
SHA512
6ebb7cc82bd261a258dce7f45bf1aa7465586bc40eb339ad80a53e1853d0a4b7ce4154d4368f4cd943e43897845eab960edf3ebbe5f4405fb904ab2ab1f2751f
-
SSDEEP
98304:N6U0ezBu2rNiE8HpCMsYM10sWPxkgx89H9DvSM7jBd59ENBIV34Khubt0MGPyOxm:NXbk2XOpCMvM1aPXe1vS2PgtbtIPz
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4m490H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4m490H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4m490H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4m490H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4m490H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4m490H.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2q0571.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3E99a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4m490H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e52K8.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3E99a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3E99a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4m490H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e52K8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e52K8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4m490H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2q0571.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2q0571.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1e52K8.exe -
Executes dropped EXE 10 IoCs
pid Process 2464 Z5x56.exe 3184 w1x65.exe 4776 1e52K8.exe 1552 skotes.exe 4360 2q0571.exe 4868 3E99a.exe 5100 skotes.exe 1292 4m490H.exe 2588 skotes.exe 2372 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2q0571.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3E99a.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4m490H.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1e52K8.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4m490H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4m490H.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z5x56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" w1x65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4776 1e52K8.exe 1552 skotes.exe 4360 2q0571.exe 4868 3E99a.exe 5100 skotes.exe 1292 4m490H.exe 2588 skotes.exe 2372 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1e52K8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4896 4868 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e52K8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2q0571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3E99a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4m490H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z5x56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w1x65.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3E99a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3E99a.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4776 1e52K8.exe 4776 1e52K8.exe 1552 skotes.exe 1552 skotes.exe 4360 2q0571.exe 4360 2q0571.exe 4868 3E99a.exe 4868 3E99a.exe 5100 skotes.exe 5100 skotes.exe 4868 3E99a.exe 4868 3E99a.exe 1292 4m490H.exe 1292 4m490H.exe 1292 4m490H.exe 1292 4m490H.exe 2588 skotes.exe 2588 skotes.exe 2372 skotes.exe 2372 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1292 4m490H.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4776 1e52K8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2464 4052 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe 83 PID 4052 wrote to memory of 2464 4052 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe 83 PID 4052 wrote to memory of 2464 4052 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe 83 PID 2464 wrote to memory of 3184 2464 Z5x56.exe 84 PID 2464 wrote to memory of 3184 2464 Z5x56.exe 84 PID 2464 wrote to memory of 3184 2464 Z5x56.exe 84 PID 3184 wrote to memory of 4776 3184 w1x65.exe 85 PID 3184 wrote to memory of 4776 3184 w1x65.exe 85 PID 3184 wrote to memory of 4776 3184 w1x65.exe 85 PID 4776 wrote to memory of 1552 4776 1e52K8.exe 86 PID 4776 wrote to memory of 1552 4776 1e52K8.exe 86 PID 4776 wrote to memory of 1552 4776 1e52K8.exe 86 PID 3184 wrote to memory of 4360 3184 w1x65.exe 87 PID 3184 wrote to memory of 4360 3184 w1x65.exe 87 PID 3184 wrote to memory of 4360 3184 w1x65.exe 87 PID 2464 wrote to memory of 4868 2464 Z5x56.exe 89 PID 2464 wrote to memory of 4868 2464 Z5x56.exe 89 PID 2464 wrote to memory of 4868 2464 Z5x56.exe 89 PID 4052 wrote to memory of 1292 4052 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe 109 PID 4052 wrote to memory of 1292 4052 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe 109 PID 4052 wrote to memory of 1292 4052 2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe"C:\Users\Admin\AppData\Local\Temp\2e1216e1faf698fc36aa46c84f69731870bd927c992b46d1f32165531a4afac1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z5x56.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z5x56.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w1x65.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w1x65.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1e52K8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1e52K8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2q0571.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2q0571.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E99a.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E99a.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 14764⤵
- Program crash
PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m490H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m490H.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4868 -ip 48681⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD579ec8e22792c9776e7876aee4594b2b9
SHA12301661f8aaf0d64384dd88a3961ec3b218dcc81
SHA256b7397e7ccd3288f6c04e12c1d46f8a159882dbb60ccf8288db981475842fd7a0
SHA51227c97965661bfcb98ea88c0645c708f4183b1a57483bf895a46e4f01d43f5c1e301f73cb993a5750902f1202eb79487b5a10a741ccd80519e0ee868185f0b072
-
Filesize
5.1MB
MD5e2e6110a572f0c7a3b04ba486c213ee9
SHA1ad4bbe72cd9dec84648931a0abcb9b82b9490c6f
SHA2561622824a981203fc9c512404c7143d3dfee4f0b3c63fd077e6d3a9011d64f959
SHA512a014ab32eb29eec94e308b93850dfb5e1e9b2c747362104f3bf3ecda82e37b667de1fe46225ada1717ab8783d59916443406da882710300f919d9279677559ae
-
Filesize
2.7MB
MD50c057a2ed25268502ca06132204096fb
SHA1bab3a133827d205f4c87f3fb46e7b3bb13a9713a
SHA256bdf3d2ca6645a9d5673f48b11f098dbde11af32e744ac4be1081d4df49f33342
SHA5124ac6bb125a39c6a46339ccc8329425fb25450b11138dbcf63391d6980940f902aa2fb5710fdda4321ca9447f144f705f1f8eb3598a157f794cb3d183643c2af0
-
Filesize
3.5MB
MD565f387e79bc3888031a82bf0fb91e659
SHA1bfce6d6cb371228539bed9cafb2256d816078239
SHA256394884edbfff5209341b9a4dfe67568e86df515914e01e87617c5e3831a504f9
SHA512833c8bbfa933603822a698c1ac1398927243ed9e48c4ebb8d2128cc3b5bab761c25474389d1bb485dc7bdcbef7e5995ccffc514e7d3515b15e2930a1a39add93
-
Filesize
2.9MB
MD5f5a45bbd0f3499d7289ff6716cfa314b
SHA15f6847af9b3f90f416b92f3fdd10050fc7b781bb
SHA25621e68acd2b24f8ffdd2b03eba18955a41d47ca2b356cefd983f1c089054f7551
SHA512aa697ac9c08fc4d80e0cad59358662d428f4200899e06189f63a4e7b4637ba885cc3f3d5ab3d3b0249293e354cbf6b242e5756c76bb48a0126a141743ca60241
-
Filesize
1.8MB
MD582285bf8126672de428a4b4e5c65ad7b
SHA17442447725ad0383404c54a48289c1c68243d329
SHA2563dd86deeca47d5b50603efc404ab3784e7256307880d0cdb68d180bd7a604036
SHA512c122ceea3989a7e70d902f27c8e69d649d822c331850453fb2d50e338fc775251a45133ba7e671393c9c4bfee09530f8d58d51aae4c071ed1cd9a15c4744510f