Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 04:28
Static task
static1
General
-
Target
9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe
-
Size
6.7MB
-
MD5
cf56732dd71dd0faad2495f1558adf2f
-
SHA1
f50b5e44710301042c51b2b7b05f84e417e71b65
-
SHA256
9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91
-
SHA512
2bf6316adafe65c6603f5dcee49a1500bb0fb5d2df66ea0d74ea8e69612befdf0c89da0012a1c8218c890588afb0f2af1366b6be64ffcfb4f1e2868da8911b84
-
SSDEEP
196608:y06ohIZxRQL5tmiH4mArDY/5yDR6uXBOlG4A/0psK:plhIZQLm0HmDYhyN6uXIlDLp
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4m644S.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4m644S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4m644S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4m644S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4m644S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4m644S.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1m79z1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2J1373.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3K67U.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4m644S.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1m79z1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2J1373.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4m644S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1m79z1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2J1373.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3K67U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3K67U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4m644S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1m79z1.exe -
Executes dropped EXE 9 IoCs
pid Process 1348 g6W84.exe 2412 g8o06.exe 2848 1m79z1.exe 3436 skotes.exe 3308 2J1373.exe 1756 3K67U.exe 3348 4m644S.exe 4544 skotes.exe 1700 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3K67U.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4m644S.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1m79z1.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2J1373.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4m644S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4m644S.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" g6W84.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" g8o06.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2848 1m79z1.exe 3436 skotes.exe 3308 2J1373.exe 1756 3K67U.exe 3348 4m644S.exe 4544 skotes.exe 1700 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1m79z1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2268 1756 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4m644S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6W84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8o06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1m79z1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2J1373.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3K67U.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3K67U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3K67U.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2848 1m79z1.exe 2848 1m79z1.exe 3436 skotes.exe 3436 skotes.exe 3308 2J1373.exe 3308 2J1373.exe 1756 3K67U.exe 1756 3K67U.exe 1756 3K67U.exe 1756 3K67U.exe 3348 4m644S.exe 3348 4m644S.exe 3348 4m644S.exe 3348 4m644S.exe 4544 skotes.exe 4544 skotes.exe 1700 skotes.exe 1700 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3348 4m644S.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 1m79z1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1348 1952 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe 82 PID 1952 wrote to memory of 1348 1952 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe 82 PID 1952 wrote to memory of 1348 1952 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe 82 PID 1348 wrote to memory of 2412 1348 g6W84.exe 83 PID 1348 wrote to memory of 2412 1348 g6W84.exe 83 PID 1348 wrote to memory of 2412 1348 g6W84.exe 83 PID 2412 wrote to memory of 2848 2412 g8o06.exe 84 PID 2412 wrote to memory of 2848 2412 g8o06.exe 84 PID 2412 wrote to memory of 2848 2412 g8o06.exe 84 PID 2848 wrote to memory of 3436 2848 1m79z1.exe 85 PID 2848 wrote to memory of 3436 2848 1m79z1.exe 85 PID 2848 wrote to memory of 3436 2848 1m79z1.exe 85 PID 2412 wrote to memory of 3308 2412 g8o06.exe 86 PID 2412 wrote to memory of 3308 2412 g8o06.exe 86 PID 2412 wrote to memory of 3308 2412 g8o06.exe 86 PID 1348 wrote to memory of 1756 1348 g6W84.exe 87 PID 1348 wrote to memory of 1756 1348 g6W84.exe 87 PID 1348 wrote to memory of 1756 1348 g6W84.exe 87 PID 1952 wrote to memory of 3348 1952 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe 100 PID 1952 wrote to memory of 3348 1952 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe 100 PID 1952 wrote to memory of 3348 1952 9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe"C:\Users\Admin\AppData\Local\Temp\9e2484ec85053a9a16366cedd6fdc7ba10078c79707478521f624800b38f9e91.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6W84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6W84.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8o06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8o06.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1m79z1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1m79z1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J1373.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J1373.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3K67U.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3K67U.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 15564⤵
- Program crash
PID:2268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m644S.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m644S.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1756 -ip 17561⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57e17f6853ff1355940f1f9db47800535
SHA10be102b6e0da28c8b44bb27cf62fedd0684c77fd
SHA256f1dae38a928aa00102fd35bef5c8472c7117c4c5fca5ced0bf1707ab5b5d0fcf
SHA512438654a1e953930b5476a4714956f43f03b34206133b08a5c112bff942cbeb79196d8c2dea6144ed6344c531b5cdefc642672a810bf27d591af11bbe3c8fcd7e
-
Filesize
5.1MB
MD503c2343eee184401baac4e3532c72ca8
SHA1d3762c715779b0d11ec24ed31ecbd9e0219d4f18
SHA2567b545d0e9c155e397c7c8ef29a946e69a2a63a70133d98203bb52082e08bfe53
SHA5123c18e01dc646f429b7abd16f9d14f59707e690994b5e31858071a1a99fe4b80c0132b14f89694d8e062033f82708dffd60fcba1bab2b6d7bc432babede8b7d3d
-
Filesize
2.7MB
MD5feec5b745edfa5a3f51e18af6816d3f3
SHA15d2f798b9a509694edc92e0ae7250c9915c5e594
SHA25636eb3089e093e058468907e08c07d561f83a1128fde7042e403fafcb4192558c
SHA5128e702e13af0af46014121465315fa0b745766aa4579f08ae8cc7afce19705564410361a526af98b3840d3f8d76dea8c22b760755423e45b747da978b65ffe975
-
Filesize
3.5MB
MD5f687cbe7eef8eadd85afe643d3db522f
SHA1a83ce21618ceff34856f01b3b92c5187680d157a
SHA2566b1dc13f45d755a27ebea441ca38beb81e7464a882da104596ebef839e3ae2b5
SHA51203450975d330573b9dd319ef3cebbddbb1c1083fb48581aabed46a858e4d9e75fae1503981ee320401a936abc0bf3a7557972d43db804b6ff927510639d40b79
-
Filesize
2.9MB
MD5a6e7881e1c86514eba66fce89d598015
SHA15dd1632a86c8ddf8a95f63133769480143d56357
SHA256a2ca1e496ce7f3d6846692fb5001f749d0b192c2813370d2b65adc83fe11f02c
SHA512c344c667a0355049288c60e3f340c9d4777ec0cbca87f5e84a5e7d60a1540fc96d231d3cc486faed456fd3b017d8f93009149bfa484c39e88633fc7543a56efd
-
Filesize
1.7MB
MD53ec4a2254f27c1276d3f806071827e5a
SHA1d765545998552b85df53ba7c1bd30dd28ddb9c7c
SHA25695781d4624835c84bc6db057875e60a1fa744e3ead2541082062c7205ccaee94
SHA51287707a2de5b1000adb45d54f1a6bc75c235473b56ebb3e44ba70e38c0a1b6f42f6e1af368b9d10ec4a70cfb536b849833eef9cd1e606f72e0f8587e01096c0d2