Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 09:06
Static task
static1
General
-
Target
f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe
-
Size
6.7MB
-
MD5
eefe3b5546511c66b52206cede01b223
-
SHA1
1921139d5681a9106394549bfd3673117c6e1700
-
SHA256
f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027
-
SHA512
ba6840cbc348d0fcce29674d66c15d8094fed7351f09927713a3734c2588a9a628535e6cc701cf866d3a065f25a5d3e2dae55f931ae5501cc3345f2c5bd77f01
-
SSDEEP
196608:42KtpANHAZ355bUFOXCduKmubawRrDtxLvlHV:xrKZzgALKmApxLn
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4N358t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4N358t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4N358t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4N358t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4N358t.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4N358t.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4N358t.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x97m9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z3228.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3R61O.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x97m9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x97m9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z3228.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4N358t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4N358t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3R61O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z3228.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3R61O.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1x97m9.exe -
Executes dropped EXE 10 IoCs
pid Process 3684 Q0e23.exe 4316 g4H21.exe 4916 1x97m9.exe 3808 skotes.exe 3956 2z3228.exe 2888 3R61O.exe 4536 skotes.exe 4152 4N358t.exe 5036 skotes.exe 1448 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1x97m9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2z3228.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3R61O.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4N358t.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4N358t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4N358t.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Q0e23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" g4H21.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4916 1x97m9.exe 3956 2z3228.exe 3808 skotes.exe 2888 3R61O.exe 4536 skotes.exe 4152 4N358t.exe 5036 skotes.exe 1448 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1x97m9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2880 2888 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z3228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3R61O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4N358t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q0e23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4H21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x97m9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3R61O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3R61O.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4916 1x97m9.exe 4916 1x97m9.exe 3956 2z3228.exe 3956 2z3228.exe 3808 skotes.exe 3808 skotes.exe 2888 3R61O.exe 2888 3R61O.exe 2888 3R61O.exe 2888 3R61O.exe 4536 skotes.exe 4536 skotes.exe 4152 4N358t.exe 4152 4N358t.exe 4152 4N358t.exe 4152 4N358t.exe 5036 skotes.exe 5036 skotes.exe 1448 skotes.exe 1448 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 4N358t.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4916 1x97m9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1260 wrote to memory of 3684 1260 f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe 83 PID 1260 wrote to memory of 3684 1260 f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe 83 PID 1260 wrote to memory of 3684 1260 f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe 83 PID 3684 wrote to memory of 4316 3684 Q0e23.exe 84 PID 3684 wrote to memory of 4316 3684 Q0e23.exe 84 PID 3684 wrote to memory of 4316 3684 Q0e23.exe 84 PID 4316 wrote to memory of 4916 4316 g4H21.exe 85 PID 4316 wrote to memory of 4916 4316 g4H21.exe 85 PID 4316 wrote to memory of 4916 4316 g4H21.exe 85 PID 4916 wrote to memory of 3808 4916 1x97m9.exe 86 PID 4916 wrote to memory of 3808 4916 1x97m9.exe 86 PID 4916 wrote to memory of 3808 4916 1x97m9.exe 86 PID 4316 wrote to memory of 3956 4316 g4H21.exe 87 PID 4316 wrote to memory of 3956 4316 g4H21.exe 87 PID 4316 wrote to memory of 3956 4316 g4H21.exe 87 PID 3684 wrote to memory of 2888 3684 Q0e23.exe 88 PID 3684 wrote to memory of 2888 3684 Q0e23.exe 88 PID 3684 wrote to memory of 2888 3684 Q0e23.exe 88 PID 1260 wrote to memory of 4152 1260 f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe 109 PID 1260 wrote to memory of 4152 1260 f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe 109 PID 1260 wrote to memory of 4152 1260 f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe"C:\Users\Admin\AppData\Local\Temp\f5c24372c7f3d19f3e45ff9c55935189f4f733336a885bdecd20f60f0e9b7027.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q0e23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q0e23.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4H21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4H21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z3228.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z3228.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3R61O.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3R61O.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 15684⤵
- Program crash
PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N358t.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N358t.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2888 -ip 28881⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5e3d6f4bdc765aa7350990ec8657777ea
SHA1e2c315138f5ecc958ac1bbe5acc3d8ac87260425
SHA256e74744eda82aa148824f0963e14cf99f162e2aff444436b514db04f8ee79da2e
SHA512294f70cdaf3ed0ffe9b75c0e9442530cd64bd2497395e164c8cc20728f90c8e942062ed852512de85f6be445145a7e823865f776af75adf2156f50b8a7d80327
-
Filesize
5.2MB
MD5b1186f50572d83583b3d811bf1ffb1a1
SHA1eccd5227117253b722dd256ec8271a96bbddec03
SHA2563efed37048ff74fb8213de27a2a3319f7a9abe43661ec10bab49c039b288e8fd
SHA512cdc043dcde8b789224f4f18d60d57b721d4f62f4fd12d7b7804ea8d0d0bb8709333b9a8b029ab9acf9197d54eab21a02c6d1cc4bc66fc19ae705f282f8259401
-
Filesize
2.8MB
MD56ad8c80adf22544fa38534491968ee1f
SHA110630c3020fcafd52ea2d67385fdee4278a65121
SHA2567bd38004d31037e2310abca4378bdc296a0a35bd3a5b4cc892d44bdbf5a89779
SHA512ad73321f2698d344832e991310d3c3e6f8ea494094c81f949b229f6e76b0a259dc364d958afd2562f5d2b0166cc0795ce297af20e072e46899a66a1332787a65
-
Filesize
3.5MB
MD57c999dcfdd49da4331c3dcae0f85cc2d
SHA144bf9235d8b1a37a3f7f78d729619d306087659c
SHA256ad52ca8be160153cf51accb509dab37c66c1a57e68ee0b2a133a428aa8fb57b9
SHA512f5ab65a1023503b4acaf1851cf91ca39f18a1c439965795796f5c1ce899c30627f7544bd44369f8a0c6bc265e398267a37b3dc7cdfe08459d61d52eb4d516336
-
Filesize
3.0MB
MD52403937faddd91bc030343f0369d4bc9
SHA1368d948876e5add93853813dc5cbb883aaaeacb9
SHA256cd382ef8521c6dafc7eba8ff58373be650f8cfb9142133e1ef9decf0a93fa2bd
SHA5121a769dceda14513b1fb9c801b9c30d8356990edc65e769663f4ce7c8ea71c6727b82a331681c0df613fbd4da12ae3ad3a8ff588f09f6ab3f78746262873e77af
-
Filesize
1.7MB
MD57884feeb676b85c98dbbe6a0e6f92cbc
SHA1897b3e60a77b96d2423525a6db8ccb386abeb14d
SHA25680e820374e64aba34f70f88c5d7d3ecf7967d833d1ab674d50379ee4034a30d0
SHA51299697017c1e6402cbd21795fa7c4ee1b3302558ae26d7e1e780d47257d4535a32a11da8d80504956d575407e0c5038808acec2aaa8ec9038084c0df32cdbaee2