Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 06:59
Static task
static1
General
-
Target
a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe
-
Size
6.8MB
-
MD5
428f87fd092358a2037217d595ad0dc9
-
SHA1
9278dcb233f20c84baf878e1cadf5569af4ebe34
-
SHA256
a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2
-
SHA512
8dd17cfe9393b54d9f8a0310dcf465fa43df519b5962f7542b6afb87fab4816ab5a0136894be438cdb05bd2203ec61d413d7621fc8077a9c391a669a950df279
-
SSDEEP
98304:pTDu/OWg1/9fzCmrOPpSsnbiSNAXxuqFvsPM/tfmXYsSX5KGpkfpdKSO5Hl:Ju/Ohp1zf6b76y8teofNkxdKSO5Hl
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4n073S.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4n073S.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d53R5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b1973.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3I22y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4n073S.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4n073S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d53R5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b1973.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b1973.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3I22y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3I22y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4n073S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d53R5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1d53R5.exe -
Executes dropped EXE 7 IoCs
pid Process 3028 D8o31.exe 3984 L0O63.exe 3896 1d53R5.exe 3596 skotes.exe 2636 2b1973.exe 1672 3I22y.exe 4380 4n073S.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1d53R5.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2b1973.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3I22y.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4n073S.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4n073S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4n073S.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" D8o31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0O63.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3896 1d53R5.exe 3596 skotes.exe 2636 2b1973.exe 1672 3I22y.exe 4380 4n073S.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d53R5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3492 1672 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D8o31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0O63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d53R5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b1973.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3I22y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4n073S.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3I22y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3I22y.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3896 1d53R5.exe 3896 1d53R5.exe 3596 skotes.exe 3596 skotes.exe 2636 2b1973.exe 2636 2b1973.exe 1672 3I22y.exe 1672 3I22y.exe 1672 3I22y.exe 1672 3I22y.exe 4380 4n073S.exe 4380 4n073S.exe 4380 4n073S.exe 4380 4n073S.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4380 4n073S.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3028 4612 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 82 PID 4612 wrote to memory of 3028 4612 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 82 PID 4612 wrote to memory of 3028 4612 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 82 PID 3028 wrote to memory of 3984 3028 D8o31.exe 83 PID 3028 wrote to memory of 3984 3028 D8o31.exe 83 PID 3028 wrote to memory of 3984 3028 D8o31.exe 83 PID 3984 wrote to memory of 3896 3984 L0O63.exe 84 PID 3984 wrote to memory of 3896 3984 L0O63.exe 84 PID 3984 wrote to memory of 3896 3984 L0O63.exe 84 PID 3896 wrote to memory of 3596 3896 1d53R5.exe 85 PID 3896 wrote to memory of 3596 3896 1d53R5.exe 85 PID 3896 wrote to memory of 3596 3896 1d53R5.exe 85 PID 3984 wrote to memory of 2636 3984 L0O63.exe 86 PID 3984 wrote to memory of 2636 3984 L0O63.exe 86 PID 3984 wrote to memory of 2636 3984 L0O63.exe 86 PID 3028 wrote to memory of 1672 3028 D8o31.exe 87 PID 3028 wrote to memory of 1672 3028 D8o31.exe 87 PID 3028 wrote to memory of 1672 3028 D8o31.exe 87 PID 4612 wrote to memory of 4380 4612 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 99 PID 4612 wrote to memory of 4380 4612 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 99 PID 4612 wrote to memory of 4380 4612 a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe"C:\Users\Admin\AppData\Local\Temp\a3f40ca09a1b58d72860865af7076d97ff20f591f448f5e70785612791c68cd2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D8o31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D8o31.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O63.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d53R5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d53R5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b1973.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b1973.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3I22y.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3I22y.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 15484⤵
- Program crash
PID:3492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n073S.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n073S.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1672 -ip 16721⤵PID:840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f7f0bbd40abcf8cae8dd347b7992ee24
SHA1936f5f1bea0505b10e5c5c1819bbd9a350c244e1
SHA2564dc7a5c34bdf707119899df37f64e713e0d60783e24c02023d6a223df5e2182b
SHA512119a27423c919bbc9b7d0d8d503742f3e8b8c4c2e5cd193011cfb5be0fa41a721f1575562ccf79414d806d19575c792b25e1d165f5652b8f35bc3e5424f21e3a
-
Filesize
5.3MB
MD581a5fc75e09e6757a3c913959f1196dd
SHA1cebff6c8be5ddf7e8b39b45830d18232fa41c1a5
SHA25629a48dde68a16b097eefe47d0e8a8370c308b1222cb80000c05f73dfd3f9f83f
SHA512849cc3ed99d4de1516c2856cdfcb97cebcac8a3e67ef9b17986eaf8ec0b41950237b2fe4654013e7454fe15e562d59cc3d6836f2aa564760342279c2c68570d6
-
Filesize
2.7MB
MD5f133453521fe781ba34c565fa05d5c17
SHA1bc08dbfedab93a56e3f59d3dfd1deda8dc9c4fe1
SHA25603bc86e0386518d5f0a1f425bb23faf848aae84bcf9ec7722da662e16415971b
SHA512ec6a5d8b617c9b8b0f99f8d6ded1a78ca97e39440dc0f89aab85a4a703ba3c5b4d039df5d9fd5ff7fdc2434b62e2fd54c3230c3cefbbddf267c8be48023a7c7f
-
Filesize
3.6MB
MD5c22e6fc92f99fbbf8fa9a76bffe89e99
SHA1dfaeb28e03b35051e6c5912935adf2509290f63d
SHA2569a8c8cdfcee4fa74676985e62de8a7d52b89dcc1057e16386a0acaf7fc079151
SHA51200f00537ce2f45ed2ab636cecf60df8a13ee16c10c9e8c7a2d608650a305a239d05e77681ac7412fe7d78a3e30a76ceb70bca69ef9df9e161ad233b1b5b59ab6
-
Filesize
3.1MB
MD5c86a777661ce6c3db00c1ba85c324ca7
SHA1836a455f2eb9fe07e304938e09aaf7fed7367da1
SHA2569df824631d77d06bd607436b7b110ed2c4359c5f31b951da63f6dc06dd4c4702
SHA5125107f115f76662ec1118e7519724d14cae204420087628f46a8ae9e5ab3f4939be325e79a66ed66a95c4899f267db671e2e74ddcf39439f43d0093eaad88696e
-
Filesize
1.8MB
MD590b1f50613476ad28622694473ce911d
SHA1303a694a9571fee00249f2a3ceff40e6f4450d0e
SHA25612f6fab21a67b2f957a7692a011d3baaeb3ad8bb12f0af6882c95ba315fadd62
SHA5127d4d61dae99dd6ff69a59ddce357894187ac1f548fcd17e43898f377cd1ba503168f203c3dd6b04b6fc4b60ae87cf2deae970f76a8d0406676561c9ba39cb5a3