Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 06:33
Static task
static1
General
-
Target
32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe
-
Size
6.7MB
-
MD5
c5fd3fcc6491c27b6d3097d45beb395a
-
SHA1
4260ef42519ad5397ebd2a881563cfd16b476dfd
-
SHA256
32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb
-
SHA512
96fa44fe806a8993e65544fe91c544998f500f5c5d4cebb1c2e9cd5027046c0c093679571cc4b79f6c22bf0065b220a398cde109274cf4c120c2f3720aa91a8b
-
SSDEEP
98304:BpaIk47RLDjxT/mlT8TVG0iDu9z3u68VgjVheGyp3CxlR4VPFemTVf:Bm41flTaT4zHokNjxl6Vb
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4V623A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4V623A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4V623A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4V623A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4V623A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4V623A.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2H9440.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w69V.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4V623A.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1h63Q1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4V623A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1h63Q1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2H9440.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2H9440.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w69V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1h63Q1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w69V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4V623A.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1h63Q1.exe -
Executes dropped EXE 10 IoCs
pid Process 3048 i4L85.exe 5020 i7z90.exe 3180 1h63Q1.exe 3260 skotes.exe 1872 2H9440.exe 3504 3w69V.exe 4912 skotes.exe 2568 4V623A.exe 816 skotes.exe 1084 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1h63Q1.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2H9440.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3w69V.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 4V623A.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4V623A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4V623A.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i4L85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i7z90.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3180 1h63Q1.exe 1872 2H9440.exe 3260 skotes.exe 3504 3w69V.exe 4912 skotes.exe 2568 4V623A.exe 816 skotes.exe 1084 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1h63Q1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2036 3504 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i4L85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i7z90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1h63Q1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2H9440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w69V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4V623A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3w69V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3w69V.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3180 1h63Q1.exe 3180 1h63Q1.exe 1872 2H9440.exe 1872 2H9440.exe 3260 skotes.exe 3260 skotes.exe 3504 3w69V.exe 3504 3w69V.exe 4912 skotes.exe 4912 skotes.exe 3504 3w69V.exe 3504 3w69V.exe 2568 4V623A.exe 2568 4V623A.exe 2568 4V623A.exe 2568 4V623A.exe 816 skotes.exe 816 skotes.exe 1084 skotes.exe 1084 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 4V623A.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3180 1h63Q1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4036 wrote to memory of 3048 4036 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe 85 PID 4036 wrote to memory of 3048 4036 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe 85 PID 4036 wrote to memory of 3048 4036 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe 85 PID 3048 wrote to memory of 5020 3048 i4L85.exe 86 PID 3048 wrote to memory of 5020 3048 i4L85.exe 86 PID 3048 wrote to memory of 5020 3048 i4L85.exe 86 PID 5020 wrote to memory of 3180 5020 i7z90.exe 87 PID 5020 wrote to memory of 3180 5020 i7z90.exe 87 PID 5020 wrote to memory of 3180 5020 i7z90.exe 87 PID 3180 wrote to memory of 3260 3180 1h63Q1.exe 88 PID 3180 wrote to memory of 3260 3180 1h63Q1.exe 88 PID 3180 wrote to memory of 3260 3180 1h63Q1.exe 88 PID 5020 wrote to memory of 1872 5020 i7z90.exe 89 PID 5020 wrote to memory of 1872 5020 i7z90.exe 89 PID 5020 wrote to memory of 1872 5020 i7z90.exe 89 PID 3048 wrote to memory of 3504 3048 i4L85.exe 91 PID 3048 wrote to memory of 3504 3048 i4L85.exe 91 PID 3048 wrote to memory of 3504 3048 i4L85.exe 91 PID 4036 wrote to memory of 2568 4036 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe 111 PID 4036 wrote to memory of 2568 4036 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe 111 PID 4036 wrote to memory of 2568 4036 32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe"C:\Users\Admin\AppData\Local\Temp\32427aa0af7233c3b86db132323dd97889de40ea06b5e531d1c6dad3591d15cb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4L85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4L85.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i7z90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i7z90.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1h63Q1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1h63Q1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2H9440.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2H9440.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w69V.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w69V.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 15404⤵
- Program crash
PID:2036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4V623A.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4V623A.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3504 -ip 35041⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:816
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52e40a2eae302afae7d758a19a17ab944
SHA11394057cadae6a6892ed8abf696f1cfedd188d73
SHA256a0fc6367e44beb0690f3241afb0ae42518af51867b70c1f839ab55657d50b443
SHA512c1a9ac4fea58f0bd233d90faf2a9ba43292ee5fb133c16bbade6dbc3e718ee2dfd55793ab097bfdb50615ec41897867f56841fe912e46621ad72d18fa510167a
-
Filesize
5.2MB
MD54c6c4bb8d8e85d89453020c3ac2ac879
SHA1476aeda198699300e5e07c35249207d4d553c912
SHA25624e3b689d639e68131db476179dfd63c30c62bce4dca2cc67c4eb7334bcbf6d5
SHA512a15052c6028d622e834471887610fd9deac9338866c66141b9c220191562441e3e6ab37d1e1a618a33a81d8993855670ed08a471962ff6ad56256d9af7d03f88
-
Filesize
2.8MB
MD51ba71e6ac42d53bd5272efa4776e5b37
SHA1bd3526f61226508c54321ce57b04ada2e0b8847f
SHA2560a3e1ccdabd62cca6ee7b8a13d6090cf89aa8505162736f844f263b163ca7619
SHA51275ad779fb631cdc9fa906949e45ad006d15863aa8a6d4f5e6a8dae51a5e4a81d192ff5f4666e2d443fb11308e29534728300774a9bc8c602d3563636074f5d3c
-
Filesize
3.5MB
MD566015f8d17c6926c3e9892a6e83cced9
SHA13798461deca7b686ae936deaf764d291ab3faaea
SHA256d0fa9c53f16ae9d3723994d0068798f5d7c4f8091bfd7ac4e5773d81dc513456
SHA51265e09ff4acd7851d86ac2bff0ec3ffe9716ab3cfce0a02fd10e51941dc5265360268f9d999b50b47888883d12feca44f11df188debea1a3d4d243373ac731bc6
-
Filesize
3.1MB
MD5b54cf9188652a3bfe166d33c542f8ac6
SHA14335fa4d75ab3ba85613d163f8f930d9adf087ce
SHA2560f1d1aed639362ce37edde5b4c278555bec835b1a5d3d5b90a7b8bbce0d83b86
SHA512b6ef0f5c0db58bed81c3c8c5f506942503c00d7c97099ac52b290567fe2578b88b8d5589715583b1b7b80f6a30e344e870f416eda0a241ed002b8fea0171892f
-
Filesize
1.8MB
MD599e7fa90ed2f0668e8928a0bd9e4d37f
SHA1cb40bccee3c04b5c992fad18039dbedd4e59b5a0
SHA25606f71451ac6bc586a8e4a4f62a70669d2d0684d610fe4aa3197dbf053accd49c
SHA5126c5c15daeb6b621dc803c9d23e30b89c8bc4e88f07bbbb09cfceead76d5c777b7bbbe810c6a38d7ce0aed71776e46de817ccef591e806c43e13e4fd3a6fc4516