Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 09:33
Static task
static1
General
-
Target
7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe
-
Size
6.7MB
-
MD5
638d737f576898808e84d83de29c0367
-
SHA1
a01b934f4291fe6dd3ef87a4a372916b82ae2b48
-
SHA256
7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64
-
SHA512
2e2d437a20beb8f37ca08946c9ce7a3bcc6f2259d27ad0a84a660a894b48865e934e3e9bc67cdbef40e59cc2d2f07eb1886fd05a02c259b66ca938c93914de79
-
SSDEEP
98304:TiVsTAAKnvWdhSEt2m8nJX1hDF3uqvOAJQX26mivy6/pnKUAvNav:GKTZKnudIEIR4bG6bvySpnhAU
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4o171E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4o171E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4o171E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4o171E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4o171E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4o171E.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Z46h9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x2370.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3K02S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4o171E.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3K02S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3K02S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Z46h9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x2370.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x2370.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4o171E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Z46h9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4o171E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1Z46h9.exe -
Executes dropped EXE 9 IoCs
pid Process 3976 J6n76.exe 4692 A7N20.exe 8 1Z46h9.exe 1936 skotes.exe 4104 2x2370.exe 2508 3K02S.exe 1224 4o171E.exe 4224 skotes.exe 4996 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1Z46h9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2x2370.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3K02S.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 4o171E.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4o171E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4o171E.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" J6n76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" A7N20.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 8 1Z46h9.exe 1936 skotes.exe 4104 2x2370.exe 2508 3K02S.exe 1224 4o171E.exe 4224 skotes.exe 4996 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Z46h9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3544 2508 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J6n76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A7N20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Z46h9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x2370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3K02S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4o171E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3K02S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3K02S.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 8 1Z46h9.exe 8 1Z46h9.exe 1936 skotes.exe 1936 skotes.exe 4104 2x2370.exe 4104 2x2370.exe 2508 3K02S.exe 2508 3K02S.exe 2508 3K02S.exe 2508 3K02S.exe 1224 4o171E.exe 1224 4o171E.exe 1224 4o171E.exe 1224 4o171E.exe 4224 skotes.exe 4224 skotes.exe 4996 skotes.exe 4996 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1224 4o171E.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 8 1Z46h9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3976 3888 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe 83 PID 3888 wrote to memory of 3976 3888 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe 83 PID 3888 wrote to memory of 3976 3888 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe 83 PID 3976 wrote to memory of 4692 3976 J6n76.exe 84 PID 3976 wrote to memory of 4692 3976 J6n76.exe 84 PID 3976 wrote to memory of 4692 3976 J6n76.exe 84 PID 4692 wrote to memory of 8 4692 A7N20.exe 85 PID 4692 wrote to memory of 8 4692 A7N20.exe 85 PID 4692 wrote to memory of 8 4692 A7N20.exe 85 PID 8 wrote to memory of 1936 8 1Z46h9.exe 86 PID 8 wrote to memory of 1936 8 1Z46h9.exe 86 PID 8 wrote to memory of 1936 8 1Z46h9.exe 86 PID 4692 wrote to memory of 4104 4692 A7N20.exe 87 PID 4692 wrote to memory of 4104 4692 A7N20.exe 87 PID 4692 wrote to memory of 4104 4692 A7N20.exe 87 PID 3976 wrote to memory of 2508 3976 J6n76.exe 91 PID 3976 wrote to memory of 2508 3976 J6n76.exe 91 PID 3976 wrote to memory of 2508 3976 J6n76.exe 91 PID 3888 wrote to memory of 1224 3888 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe 108 PID 3888 wrote to memory of 1224 3888 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe 108 PID 3888 wrote to memory of 1224 3888 7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe"C:\Users\Admin\AppData\Local\Temp\7798cfc18edcfa33b87f936f0c8998f861e1b346545f9b750e2c2481147fed64.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J6n76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J6n76.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7N20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7N20.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z46h9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z46h9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x2370.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x2370.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3K02S.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3K02S.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 14884⤵
- Program crash
PID:3544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o171E.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o171E.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2508 -ip 25081⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51c6508b9af98324392ad8ab455e30b63
SHA1244452c4b2da3950161027dff84970e1cee78e21
SHA256e313bc2469cf164ed872c956d8da30a0c57e79aba39348a3e071201db7dcc2d9
SHA512aa1acaed4492205bf08ae7225ca65020337862d7cc3e05c734d76bdffd6771ce4681fee6dceeb665deaaad36b44a3fd83ac827b8a1feacb2b31107d93eabce50
-
Filesize
5.2MB
MD52492c99847f9ec3e3cdca5e8d2d360c5
SHA12f601193a3c2a4e1bdbf1e9695600ae425928468
SHA25689bd438eb82d2b64db9b1ee6217d6c8c5b775e82929c7f3672edb5d9e20e3c13
SHA512861655a08b97083a9ab1bd533f344931d52300b8ab9b5b2bbb9d30c621b0d946e5f0a9421ee7d8b44e67490af1ea49a7329993bc726940ffb6951573adaa895e
-
Filesize
2.8MB
MD56bd56ec3800953b10c705363fa41c135
SHA1a01aaa8823fa117ca7583ca8c4b39c545a0d63d9
SHA256ecb8cfe5d51ff3eff98719dad96cf7d143fb57294d42e2a702b0b179535106a2
SHA512b52f55556f001d3e1576f1fd9be57a175f7609f32a64e2c9912a5c0c0b2c4c62f4a8dea470dbb6aae64f0767136909842622c2a6d2befd8aef1126996acb1ecd
-
Filesize
3.5MB
MD5fb804f6d961bb9024c578f3e0487d429
SHA1d614304ddfadac2f5a91467a4537cdbe5c2eee92
SHA25646b22fab9c647c0d403e55727705418602d9f37ad7581bab277f12b20f7efac2
SHA5127f70fc51f61b2e8f86d243ef966e40018148b0e5b8c787bad4fb19ef2126400658ca1bd548ef65e2937290f2c9cbb11d644c86828477128e94ae80e204ec6c70
-
Filesize
3.1MB
MD5ce66f44fb2f29d370ec8a1f8042453b2
SHA1dc1e2b28f1386bc0a4fcbae80fb54e497bd447c0
SHA256d98293425f2242e9132aad5d5ba18edd06aa4ccbe472bc4e592730be48b323bf
SHA512a22ee9c3ab3f91cd567aca834681e2d834e0d3bb742ac846653ea23fbdadd40afaec3ea52bd21237cd60758cfc0e7e4f7c5b344320224ddfbb1d91a01125fdcc
-
Filesize
1.7MB
MD5e3361158b1d0c44af1a2b481e644e54f
SHA12084824b5d4c25b3ee428b7a8fef51e81c06b2aa
SHA256bcf1bc2d2af26f2f4ca6d16fff03db316a6dc5e6f493b6eef752620aa9931706
SHA512f159686b4e3320eeb084e6c2d852a4ea807f19f6a21884f4f4eaebf4071f8e43b79864c6289540277d4e651ab6a391d3a10e94ff31f989889962553ca76d0de9