Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 08:14
Static task
static1
General
-
Target
94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe
-
Size
6.7MB
-
MD5
a18885696f8d36b3a6113bb835bed64e
-
SHA1
02b09d2f57f7b42096677e61ea1f772812312e19
-
SHA256
94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456
-
SHA512
e097f748a8948b47af69d44e96fa6155da8bed190ee2492d9020bf5d8d0e393c337e8fc39d8c02fb748ba681c73c2aa5afd0d91bce4bd3f792f218a3ddf00aa3
-
SSDEEP
196608:T66moeridMOYRTAHGJNjG0sjKUkqyy8nM3yeY:T66moLbWsoNdUkqyVM3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4i649Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4i649Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4i649Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4i649Q.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4i649Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4i649Q.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d52M8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2s3463.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3R65V.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4i649Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3R65V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d52M8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2s3463.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4i649Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d52M8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2s3463.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3R65V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4i649Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1d52M8.exe -
Executes dropped EXE 9 IoCs
pid Process 3492 j5X84.exe 4768 i5d12.exe 4040 1d52M8.exe 2652 skotes.exe 1640 2s3463.exe 4896 3R65V.exe 2644 4i649Q.exe 4908 skotes.exe 3800 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1d52M8.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2s3463.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3R65V.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4i649Q.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4i649Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4i649Q.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" j5X84.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i5d12.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4040 1d52M8.exe 2652 skotes.exe 1640 2s3463.exe 4896 3R65V.exe 2644 4i649Q.exe 4908 skotes.exe 3800 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d52M8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4848 4896 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i5d12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d52M8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2s3463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3R65V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4i649Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j5X84.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3R65V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3R65V.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4040 1d52M8.exe 4040 1d52M8.exe 2652 skotes.exe 2652 skotes.exe 1640 2s3463.exe 1640 2s3463.exe 4896 3R65V.exe 4896 3R65V.exe 4896 3R65V.exe 4896 3R65V.exe 2644 4i649Q.exe 2644 4i649Q.exe 2644 4i649Q.exe 2644 4i649Q.exe 4908 skotes.exe 4908 skotes.exe 3800 skotes.exe 3800 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 4i649Q.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4040 1d52M8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2052 wrote to memory of 3492 2052 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe 83 PID 2052 wrote to memory of 3492 2052 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe 83 PID 2052 wrote to memory of 3492 2052 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe 83 PID 3492 wrote to memory of 4768 3492 j5X84.exe 84 PID 3492 wrote to memory of 4768 3492 j5X84.exe 84 PID 3492 wrote to memory of 4768 3492 j5X84.exe 84 PID 4768 wrote to memory of 4040 4768 i5d12.exe 85 PID 4768 wrote to memory of 4040 4768 i5d12.exe 85 PID 4768 wrote to memory of 4040 4768 i5d12.exe 85 PID 4040 wrote to memory of 2652 4040 1d52M8.exe 86 PID 4040 wrote to memory of 2652 4040 1d52M8.exe 86 PID 4040 wrote to memory of 2652 4040 1d52M8.exe 86 PID 4768 wrote to memory of 1640 4768 i5d12.exe 87 PID 4768 wrote to memory of 1640 4768 i5d12.exe 87 PID 4768 wrote to memory of 1640 4768 i5d12.exe 87 PID 3492 wrote to memory of 4896 3492 j5X84.exe 89 PID 3492 wrote to memory of 4896 3492 j5X84.exe 89 PID 3492 wrote to memory of 4896 3492 j5X84.exe 89 PID 2052 wrote to memory of 2644 2052 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe 108 PID 2052 wrote to memory of 2644 2052 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe 108 PID 2052 wrote to memory of 2644 2052 94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe"C:\Users\Admin\AppData\Local\Temp\94baad51bb3ec87ad546e3d8f66d5fb739aac2ad010337a7f631627e7c598456.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j5X84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j5X84.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i5d12.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i5d12.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d52M8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d52M8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2s3463.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2s3463.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3R65V.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3R65V.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 15604⤵
- Program crash
PID:4848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4i649Q.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4i649Q.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4896 -ip 48961⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52f5d909eef76a14b4a46f464ec09ac2a
SHA12bbf75a127103d628161b2ad1b5b4f49182d861f
SHA256452a07222e5fb380fa084eba99f658794396842e4a1804a7f5af9cf0e4e61a59
SHA51208a5f23adf63f5d394bde23df72c7de915cb0218b94602dab227b66928fcf8a8aa1f004b2f47e266cb4cf686443db0e0f84c747591b2c70029f4b1f99e78d1f3
-
Filesize
5.2MB
MD5c12d0fbc2d481484f0e61f72aa7b15a5
SHA1478146ee6b56ff6f6e9cb3ccf04b7fa8ee2d389e
SHA256483f75afdb15f3f99f5233be336e57c7543ae362f9345f4bf1e74a7cdc995038
SHA512b7afaca1abef07324701262f2aeecb03ed2d1e331c9b0dd2e0dbd84b73d8f45d8f49dc67104b5de8dfe78e778da3d980716e7701eb88a47fb1c7bfd6c5eff05c
-
Filesize
2.7MB
MD56a745871d883b116a4bbc9607f5b7b9b
SHA1380a4cd6e33af3ff4363b6d16a9e05dd703f5f9e
SHA2562bd8a1b7065df88462d34eed180f2ea300c5e4cf80a984fc8aa07f6bd7949869
SHA512f0de0884f50447a59da34a795cf7ed4be3ce245ca269d04eef6683307a47357f572d092d8ab4312e5244cd5c2979e040d3fe546930dd6f9945ac68ad791ef993
-
Filesize
3.6MB
MD56257c25a6608539fe252b18335f6a738
SHA1372b6a59fb60708de04822707e39ef35ef79c8bb
SHA2566068618a8aaaf7e472977371d35d9b3dd8e6bc5289d0a1802ff02d57bde22d4a
SHA512557155bf5bf574fcfc6791d1c2e0c0340fb488627b178c1ce5eb95e8ce9fb93f3cf0d1dcba06e5219aa775024e760409a03d4e880a71d3ba4d55543e60ab7f78
-
Filesize
3.2MB
MD55c79e9130fe7a65573f8749b84020166
SHA146406c4e5ba432fe7c11321ca2ce72f242bdc2b7
SHA256335b9c173dcf00e1b0612753cf4e021578690c9ab16f98e1d00da18eed7aa687
SHA51227aebe6ec716ee75657a64eb1c763f14ff51521d59eb576216e6e2fcd229ac0a7526ef1c0da8cdcb75deb557dfd26d229d7022386f3c8a225ff355aab789408b
-
Filesize
1.7MB
MD561e51e787b161b21769aab5c29fc8003
SHA18223428075907ebcc833046b7c7606f176c11cf5
SHA256c45ebba7c2d577cc6b1d138b902a92d9c243c2f7a9d593bf3a0b97dabcb72a96
SHA512895407c28908aa56ebad666d320e5a9ae83e97731bef22e6f4dffbb009f17d2d4b3e995b168cbfa8f32086cc2bee062ea7682c8759c3000fd238440830c678b3