Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 07:31
Static task
static1
General
-
Target
840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe
-
Size
6.7MB
-
MD5
f54b8c83a706f149993c9f0125d91a78
-
SHA1
e6516f9aae81768882996b9eab0acc3aacfb2ae1
-
SHA256
840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0
-
SHA512
0363fcdfbccf0c788c0a1ae0d0aa906c341ef31120f2a4251d50dd34e26285711fa29127472ae6ad7622359f297e2a19517f3977241bd67cc94fdee885192b76
-
SSDEEP
196608:VHEqx6T3odDRf6bfTEuq9tzVm5pZNUfQb5Y:VHEHreRfS7TqbuL7Y
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4Z157E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4Z157E.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4Z157E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4Z157E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4Z157E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4Z157E.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l1740.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3J19o.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4Z157E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1X48u7.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4Z157E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4Z157E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3J19o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3J19o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l1740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l1740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1X48u7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1X48u7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1X48u7.exe -
Executes dropped EXE 10 IoCs
pid Process 2268 J1e81.exe 4868 F7w24.exe 4484 1X48u7.exe 736 skotes.exe 436 2l1740.exe 4268 3J19o.exe 4808 skotes.exe 1912 4Z157E.exe 3588 skotes.exe 3520 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2l1740.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3J19o.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 4Z157E.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1X48u7.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4Z157E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4Z157E.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" J1e81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" F7w24.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4484 1X48u7.exe 736 skotes.exe 436 2l1740.exe 4268 3J19o.exe 4808 skotes.exe 1912 4Z157E.exe 3588 skotes.exe 3520 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1X48u7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4764 4268 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J1e81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F7w24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1X48u7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l1740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3J19o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Z157E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3J19o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3J19o.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4484 1X48u7.exe 4484 1X48u7.exe 736 skotes.exe 736 skotes.exe 436 2l1740.exe 436 2l1740.exe 4268 3J19o.exe 4268 3J19o.exe 4808 skotes.exe 4808 skotes.exe 4268 3J19o.exe 4268 3J19o.exe 1912 4Z157E.exe 1912 4Z157E.exe 1912 4Z157E.exe 1912 4Z157E.exe 3588 skotes.exe 3588 skotes.exe 3520 skotes.exe 3520 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1912 4Z157E.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4484 1X48u7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2268 4812 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe 83 PID 4812 wrote to memory of 2268 4812 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe 83 PID 4812 wrote to memory of 2268 4812 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe 83 PID 2268 wrote to memory of 4868 2268 J1e81.exe 84 PID 2268 wrote to memory of 4868 2268 J1e81.exe 84 PID 2268 wrote to memory of 4868 2268 J1e81.exe 84 PID 4868 wrote to memory of 4484 4868 F7w24.exe 85 PID 4868 wrote to memory of 4484 4868 F7w24.exe 85 PID 4868 wrote to memory of 4484 4868 F7w24.exe 85 PID 4484 wrote to memory of 736 4484 1X48u7.exe 86 PID 4484 wrote to memory of 736 4484 1X48u7.exe 86 PID 4484 wrote to memory of 736 4484 1X48u7.exe 86 PID 4868 wrote to memory of 436 4868 F7w24.exe 87 PID 4868 wrote to memory of 436 4868 F7w24.exe 87 PID 4868 wrote to memory of 436 4868 F7w24.exe 87 PID 2268 wrote to memory of 4268 2268 J1e81.exe 89 PID 2268 wrote to memory of 4268 2268 J1e81.exe 89 PID 2268 wrote to memory of 4268 2268 J1e81.exe 89 PID 4812 wrote to memory of 1912 4812 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe 109 PID 4812 wrote to memory of 1912 4812 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe 109 PID 4812 wrote to memory of 1912 4812 840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe"C:\Users\Admin\AppData\Local\Temp\840991db8171b92ed103d7e0728577896f687067a99d3780b9ca3c7d7edcaed0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J1e81.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J1e81.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F7w24.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F7w24.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1X48u7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1X48u7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l1740.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l1740.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J19o.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J19o.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 15644⤵
- Program crash
PID:4764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Z157E.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Z157E.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4268 -ip 42681⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD51b0cc3eb60d08ca2a7b356ab812dab72
SHA1f6d811a3d39a71492cd53323633fa54ca4f3f6a5
SHA256c7be50f4f3bc9d1fb8d2a0a54a92d66a5cfa137516248cfb9167ca05f330804a
SHA512ec743afc8328f37c92fec1ea9848a0e73d69d5049bbbf5a4234982a8832bbc40081fe3a04e30b50d1497e5ef1eb3f0fd5e9b0a32abeac8758e992f7a033b8ae7
-
Filesize
5.1MB
MD57146720d79a3a6d97d4de703d4dbef99
SHA1693dfff0e4409b77ccf4deb0b24170d498d2334b
SHA256e78661132d38706301fb259ba0d21425bf8bd1bc9ba353e13a94601c4396c02c
SHA5122e1d42843bcc2662fc3297c75cd41df6f275f2ed49272bf55fb37b9200ee2d698154de7d44b2920eb22ade7298d0d8cf9ab8b63b96f60f6669a625583f08870a
-
Filesize
2.7MB
MD5198c34c639aabe94b184910b7c000d49
SHA174406b01f739c9442ba085cc46dcfd85ae661b1d
SHA25606719723b85c40ec97d49a498ae0eccc537df6f2663eabbb58cb2bfd52f1503b
SHA512df8caf3e379c4507efef928031ccf1e94bbd75ddf1e1f1e7d9e86dadfd6a6e15cbaf59f0c5847a69ef2a8a32ed5b58a9d5b01668aaf899889c1fd6b10041e7bd
-
Filesize
3.5MB
MD5376e431a5e5de2dbbdcec66fe1c8f5fc
SHA1ea61795c34e9469c9ba62642081bcd11a2075970
SHA256c17d8b00008538467aa9c2983f1d8d74a733272b74625e0ecfe978478bcc7eb5
SHA512af8a7263cb4c0d617ef5ae14a24566b3898a7868f595a341c23b42b6a00ae7ba24f5c9775c84cba8bbc31645f5988a6992d0bcf6e2847d629bf620ed37263d23
-
Filesize
3.1MB
MD5a460aa48c254283bae24108a2ecce44e
SHA1bcaf608d317e47617864ca8de5a2c79681079183
SHA256e725b9e74ee829dd5dd692d27062556b1dd42255d76d2858a3849cac2a6ec0db
SHA512411e041ab9bfd2855347750128ec7fbcda16e3a6814c6afd838140479dca908ac2a342b1aed95cf331ce256fce2cd03e450274e254111fc27286159e572997a8
-
Filesize
1.7MB
MD50c1b90960b1c923e995a29a0fc4e3a52
SHA11d6bdc1b5b82d6fb0fbbf9b9be6f92788dac4aee
SHA25679db9e98ac7146bb76bd0b6b876334154592528cc24b24ea801bce39d61f3db2
SHA512355c6ff42f8ec02f62fa6ce7f0ec9f1dfe59d0d3de6c5f92695ef88c956af6558cc8256fafbbd66588af7cf159b7e6fa0d61b14b94d10bf0fe65e222908087df