Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 11:13
Static task
static1
General
-
Target
4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe
-
Size
6.8MB
-
MD5
33f9360e078fd950290504cf904da0d1
-
SHA1
996917d192803e5e01ce057e25c1a101a393c053
-
SHA256
4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d
-
SHA512
f9913b2305c8d627e3e7bfd8ba348da7f8acd6f037429698a8d4fb30de646783fb1ea31c1000554c632b2e5711b73ad478c951a0117be5aa998722b5cf09b1d7
-
SSDEEP
98304:OJYzd4MtHXftV4NrmR8MODYBVZj/JSSu+faMmCaAGI5XZBwXFuYEHZP6McGZ:eYzd9UpUogb/hu+farCaAGIDB6FuPZV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://pollution-raker.cyou/api
https://hosue-billowy.cyou/api
https://ripe-blade.cyou/api
https://smash-boiling.cyou/api
https://supporse-comment.cyou/api
https://greywe-snotty.cyou/api
https://steppriflej.xyz/api
https://sendypaster.xyz/api
https://cuddlyready.xyz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4b098F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4b098F.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4b098F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4b098F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4b098F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4b098F.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b098F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1l76i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2m7651.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3l39f.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3l39f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2m7651.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3l39f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b098F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b098F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1l76i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2m7651.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1l76i7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1l76i7.exe -
Executes dropped EXE 10 IoCs
pid Process 3568 B6y45.exe 2344 P6v23.exe 1984 1l76i7.exe 3164 skotes.exe 1408 2m7651.exe 924 3l39f.exe 3020 skotes.exe 1868 4b098F.exe 4640 skotes.exe 1580 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2m7651.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3l39f.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4b098F.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1l76i7.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4b098F.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4b098F.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" B6y45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" P6v23.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1984 1l76i7.exe 3164 skotes.exe 1408 2m7651.exe 924 3l39f.exe 3020 skotes.exe 1868 4b098F.exe 4640 skotes.exe 1580 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1l76i7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1172 924 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3l39f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b098F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6y45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P6v23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1l76i7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2m7651.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3l39f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3l39f.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1984 1l76i7.exe 1984 1l76i7.exe 3164 skotes.exe 3164 skotes.exe 1408 2m7651.exe 1408 2m7651.exe 924 3l39f.exe 924 3l39f.exe 3020 skotes.exe 3020 skotes.exe 924 3l39f.exe 924 3l39f.exe 1868 4b098F.exe 1868 4b098F.exe 1868 4b098F.exe 1868 4b098F.exe 4640 skotes.exe 4640 skotes.exe 1580 skotes.exe 1580 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 4b098F.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 1l76i7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4176 wrote to memory of 3568 4176 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe 82 PID 4176 wrote to memory of 3568 4176 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe 82 PID 4176 wrote to memory of 3568 4176 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe 82 PID 3568 wrote to memory of 2344 3568 B6y45.exe 83 PID 3568 wrote to memory of 2344 3568 B6y45.exe 83 PID 3568 wrote to memory of 2344 3568 B6y45.exe 83 PID 2344 wrote to memory of 1984 2344 P6v23.exe 84 PID 2344 wrote to memory of 1984 2344 P6v23.exe 84 PID 2344 wrote to memory of 1984 2344 P6v23.exe 84 PID 1984 wrote to memory of 3164 1984 1l76i7.exe 85 PID 1984 wrote to memory of 3164 1984 1l76i7.exe 85 PID 1984 wrote to memory of 3164 1984 1l76i7.exe 85 PID 2344 wrote to memory of 1408 2344 P6v23.exe 86 PID 2344 wrote to memory of 1408 2344 P6v23.exe 86 PID 2344 wrote to memory of 1408 2344 P6v23.exe 86 PID 3568 wrote to memory of 924 3568 B6y45.exe 87 PID 3568 wrote to memory of 924 3568 B6y45.exe 87 PID 3568 wrote to memory of 924 3568 B6y45.exe 87 PID 4176 wrote to memory of 1868 4176 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe 100 PID 4176 wrote to memory of 1868 4176 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe 100 PID 4176 wrote to memory of 1868 4176 4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe"C:\Users\Admin\AppData\Local\Temp\4a219e7d0b68e00c7419d0534340a235ca72910b4c45505f62b4ece6028e8a0d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B6y45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B6y45.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P6v23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P6v23.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1l76i7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1l76i7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2m7651.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2m7651.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3l39f.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3l39f.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 15804⤵
- Program crash
PID:1172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b098F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b098F.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 924 -ip 9241⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b4c2fc007a84bc27c8335869a583d9c1
SHA12a77119fdf2f0f87cd3a2c8e0b0e5f883890aa4d
SHA256c57791c7eb77485a1ee8e92c9331df7831126837b2f535f4f9ebf70d13c2e5f1
SHA5121b92f2db7e5f0ff40527373af32e81ecf2de7b2ae17851b199f612ea8f630c1f30f0b124ac1049cb6a0fbf94b881ac54604239b2b77b853925a836f109541f34
-
Filesize
5.2MB
MD527d55033706abec47cba3d86d07bb95f
SHA1f24a7659d7a120b772eae103c9c936453a3d0c6a
SHA25641def9dd8bde37c7f7f29dbcdb37653d38431d0b6cb47d214cc195dc4ad0cb7d
SHA512525fd2f54ecb2c309553461c2a35a6e820bd8c96907b4e421ccb42aa02d6b9cc4b40c9fb2d652cc9995bfb809137d41600dc6afa85a03ae54d35c6e457bb90c4
-
Filesize
2.8MB
MD57bad838d9a55cee844e4d4998730393a
SHA192a5dd9141862f2011d424ab05c1a27bf73200c0
SHA2564701fcbc1867febb3bebe4ede4e967ce589229fbf1e72fea1fb878606a53b30f
SHA512f93b04f4841984009c8b8e23b0f62c8b71281c1358e046a0da6514c4b43a7befb8fafa691c2858c0042ab923294fd573dc5a7f00ccfd9f3f102e753bab0b845f
-
Filesize
3.5MB
MD59c52a65bf620a34b7a128da90ed4f0ed
SHA1ebede6736ad8ab2371e5fa1478e112bf07dbd282
SHA25614e47632af919ca8dfe726c4f0ba9c36ff5f5cff025d5c019ab29e2c9d6d0acd
SHA512f35c81073081314da89102c1b93b9d7baf819d3875f3865ed5d10cfdd66f66bb8183637ac1a635760fe13bd49ac65e196a73180679824f6cafec1f9c97a4d9bc
-
Filesize
3.0MB
MD5aaa16ccd4ffc27f130c372870e15df30
SHA1635c497a46ed22eb07fcbf07354edce8e7d5f46d
SHA256f5cedfcb6af16506d00c511f36fefcbbb4fee5157e97cc980461f127a632b763
SHA512d87bb7e31a1e71af0b894433c9cdeba98a2aee27aeef291e1e6cc28930774a0d84cc63bf04269e0aea44a72b104c50a0eb65554ac552bff4a70856ece5b08dc7
-
Filesize
1.8MB
MD58dd414635e15c2a274bbff6e793f76f2
SHA128a8c5a674202fc829176e42270c59973dcef150
SHA256057b470511c6e1cc5dbb6b9f5161f1254e713ebd328f997c51823db8f31828f9
SHA512ae527d1675a99bd2c9c65641807c6e9d037bb7210de311a7d9e1dc6aaf7e10afc629e4ea38d7f1869dedc3108c59f41a2b0c1234a7490d7901f437ad1048acbb