Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 06:48
Static task
static1
General
-
Target
a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe
-
Size
6.8MB
-
MD5
428f87fd092358a2037217d595ad0dc9
-
SHA1
9278dcb233f20c84baf878e1cadf5569af4ebe34
-
SHA256
a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2
-
SHA512
8dd17cfe9393b54d9f8a0310dcf465fa43df519b5962f7542b6afb87fab4816ab5a0136894be438cdb05bd2203ec61d413d7621fc8077a9c391a669a950df279
-
SSDEEP
98304:pTDu/OWg1/9fzCmrOPpSsnbiSNAXxuqFvsPM/tfmXYsSX5KGpkfpdKSO5Hl:Ju/Ohp1zf6b76y8teofNkxdKSO5Hl
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4n073S.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d53R5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b1973.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3I22y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4n073S.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d53R5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b1973.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4n073S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b1973.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d53R5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3I22y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3I22y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4n073S.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1d53R5.exe -
Executes dropped EXE 10 IoCs
pid Process 4352 D8o31.exe 3084 L0O63.exe 4084 1d53R5.exe 3028 skotes.exe 3108 2b1973.exe 628 3I22y.exe 2524 skotes.exe 516 4n073S.exe 1652 skotes.exe 3844 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1d53R5.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2b1973.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3I22y.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4n073S.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4n073S.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0O63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" D8o31.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4084 1d53R5.exe 3028 skotes.exe 3108 2b1973.exe 628 3I22y.exe 2524 skotes.exe 516 4n073S.exe 1652 skotes.exe 3844 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d53R5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1204 628 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b1973.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3I22y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4n073S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D8o31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0O63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d53R5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3I22y.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3I22y.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4084 1d53R5.exe 4084 1d53R5.exe 3028 skotes.exe 3028 skotes.exe 3108 2b1973.exe 3108 2b1973.exe 628 3I22y.exe 628 3I22y.exe 2524 skotes.exe 2524 skotes.exe 628 3I22y.exe 628 3I22y.exe 516 4n073S.exe 516 4n073S.exe 516 4n073S.exe 516 4n073S.exe 1652 skotes.exe 1652 skotes.exe 3844 skotes.exe 3844 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 516 4n073S.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4084 1d53R5.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2560 wrote to memory of 4352 2560 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 82 PID 2560 wrote to memory of 4352 2560 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 82 PID 2560 wrote to memory of 4352 2560 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 82 PID 4352 wrote to memory of 3084 4352 D8o31.exe 83 PID 4352 wrote to memory of 3084 4352 D8o31.exe 83 PID 4352 wrote to memory of 3084 4352 D8o31.exe 83 PID 3084 wrote to memory of 4084 3084 L0O63.exe 84 PID 3084 wrote to memory of 4084 3084 L0O63.exe 84 PID 3084 wrote to memory of 4084 3084 L0O63.exe 84 PID 4084 wrote to memory of 3028 4084 1d53R5.exe 85 PID 4084 wrote to memory of 3028 4084 1d53R5.exe 85 PID 4084 wrote to memory of 3028 4084 1d53R5.exe 85 PID 3084 wrote to memory of 3108 3084 L0O63.exe 86 PID 3084 wrote to memory of 3108 3084 L0O63.exe 86 PID 3084 wrote to memory of 3108 3084 L0O63.exe 86 PID 4352 wrote to memory of 628 4352 D8o31.exe 89 PID 4352 wrote to memory of 628 4352 D8o31.exe 89 PID 4352 wrote to memory of 628 4352 D8o31.exe 89 PID 2560 wrote to memory of 516 2560 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 100 PID 2560 wrote to memory of 516 2560 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 100 PID 2560 wrote to memory of 516 2560 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe"C:\Users\Admin\AppData\Local\Temp\a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D8o31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D8o31.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O63.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d53R5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d53R5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b1973.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b1973.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3I22y.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3I22y.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 15724⤵
- Program crash
PID:1204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n073S.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n073S.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 628 -ip 6281⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f7f0bbd40abcf8cae8dd347b7992ee24
SHA1936f5f1bea0505b10e5c5c1819bbd9a350c244e1
SHA2564dc7a5c34bdf707119899df37f64e713e0d60783e24c02023d6a223df5e2182b
SHA512119a27423c919bbc9b7d0d8d503742f3e8b8c4c2e5cd193011cfb5be0fa41a721f1575562ccf79414d806d19575c792b25e1d165f5652b8f35bc3e5424f21e3a
-
Filesize
5.3MB
MD581a5fc75e09e6757a3c913959f1196dd
SHA1cebff6c8be5ddf7e8b39b45830d18232fa41c1a5
SHA25629a48dde68a16b097eefe47d0e8a8370c308b1222cb80000c05f73dfd3f9f83f
SHA512849cc3ed99d4de1516c2856cdfcb97cebcac8a3e67ef9b17986eaf8ec0b41950237b2fe4654013e7454fe15e562d59cc3d6836f2aa564760342279c2c68570d6
-
Filesize
2.7MB
MD5f133453521fe781ba34c565fa05d5c17
SHA1bc08dbfedab93a56e3f59d3dfd1deda8dc9c4fe1
SHA25603bc86e0386518d5f0a1f425bb23faf848aae84bcf9ec7722da662e16415971b
SHA512ec6a5d8b617c9b8b0f99f8d6ded1a78ca97e39440dc0f89aab85a4a703ba3c5b4d039df5d9fd5ff7fdc2434b62e2fd54c3230c3cefbbddf267c8be48023a7c7f
-
Filesize
3.6MB
MD5c22e6fc92f99fbbf8fa9a76bffe89e99
SHA1dfaeb28e03b35051e6c5912935adf2509290f63d
SHA2569a8c8cdfcee4fa74676985e62de8a7d52b89dcc1057e16386a0acaf7fc079151
SHA51200f00537ce2f45ed2ab636cecf60df8a13ee16c10c9e8c7a2d608650a305a239d05e77681ac7412fe7d78a3e30a76ceb70bca69ef9df9e161ad233b1b5b59ab6
-
Filesize
3.1MB
MD5c86a777661ce6c3db00c1ba85c324ca7
SHA1836a455f2eb9fe07e304938e09aaf7fed7367da1
SHA2569df824631d77d06bd607436b7b110ed2c4359c5f31b951da63f6dc06dd4c4702
SHA5125107f115f76662ec1118e7519724d14cae204420087628f46a8ae9e5ab3f4939be325e79a66ed66a95c4899f267db671e2e74ddcf39439f43d0093eaad88696e
-
Filesize
1.8MB
MD590b1f50613476ad28622694473ce911d
SHA1303a694a9571fee00249f2a3ceff40e6f4450d0e
SHA25612f6fab21a67b2f957a7692a011d3baaeb3ad8bb12f0af6882c95ba315fadd62
SHA5127d4d61dae99dd6ff69a59ddce357894187ac1f548fcd17e43898f377cd1ba503168f203c3dd6b04b6fc4b60ae87cf2deae970f76a8d0406676561c9ba39cb5a3