Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 12:20
Static task
static1
General
-
Target
7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe
-
Size
6.8MB
-
MD5
bd02156054a6cdc1336525c662753649
-
SHA1
bf225e292c2d3c9d3fa72d91b1586a202cd631de
-
SHA256
7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4
-
SHA512
a8e31e65f46a4707b186a2c597a809a3144081c3634403360e2d43aa75681083b5706a6e1fcd89284998760631857374757e3243648e7dfeb9ed2c6bd8c83ccb
-
SSDEEP
196608:LZri2mkg54g4Og5a+B5uQhLn80gHuZgo0wVPqph:9rMkg/qDB5uQy0gQg0VSp
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4m502s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4m502s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4m502s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4m502s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4m502s.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4m502s.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1C08q7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2n6078.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3g95E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4m502s.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4m502s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1C08q7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2n6078.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3g95E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2n6078.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3g95E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1C08q7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4m502s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1C08q7.exe -
Executes dropped EXE 10 IoCs
pid Process 5116 d7B30.exe 3324 v5f39.exe 4076 1C08q7.exe 2792 skotes.exe 924 2n6078.exe 4740 3g95E.exe 4768 skotes.exe 1568 4m502s.exe 4988 skotes.exe 1208 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 4m502s.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1C08q7.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2n6078.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3g95E.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4m502s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4m502s.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" d7B30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5f39.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4076 1C08q7.exe 2792 skotes.exe 924 2n6078.exe 4740 3g95E.exe 4768 skotes.exe 1568 4m502s.exe 4988 skotes.exe 1208 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1C08q7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1424 4740 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C08q7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2n6078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3g95E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4m502s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7B30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5f39.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3g95E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3g95E.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4076 1C08q7.exe 4076 1C08q7.exe 2792 skotes.exe 2792 skotes.exe 924 2n6078.exe 924 2n6078.exe 4740 3g95E.exe 4740 3g95E.exe 4768 skotes.exe 4768 skotes.exe 4740 3g95E.exe 4740 3g95E.exe 1568 4m502s.exe 1568 4m502s.exe 1568 4m502s.exe 1568 4m502s.exe 4988 skotes.exe 4988 skotes.exe 1208 skotes.exe 1208 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 4m502s.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4076 1C08q7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4804 wrote to memory of 5116 4804 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe 83 PID 4804 wrote to memory of 5116 4804 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe 83 PID 4804 wrote to memory of 5116 4804 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe 83 PID 5116 wrote to memory of 3324 5116 d7B30.exe 84 PID 5116 wrote to memory of 3324 5116 d7B30.exe 84 PID 5116 wrote to memory of 3324 5116 d7B30.exe 84 PID 3324 wrote to memory of 4076 3324 v5f39.exe 85 PID 3324 wrote to memory of 4076 3324 v5f39.exe 85 PID 3324 wrote to memory of 4076 3324 v5f39.exe 85 PID 4076 wrote to memory of 2792 4076 1C08q7.exe 86 PID 4076 wrote to memory of 2792 4076 1C08q7.exe 86 PID 4076 wrote to memory of 2792 4076 1C08q7.exe 86 PID 3324 wrote to memory of 924 3324 v5f39.exe 87 PID 3324 wrote to memory of 924 3324 v5f39.exe 87 PID 3324 wrote to memory of 924 3324 v5f39.exe 87 PID 5116 wrote to memory of 4740 5116 d7B30.exe 89 PID 5116 wrote to memory of 4740 5116 d7B30.exe 89 PID 5116 wrote to memory of 4740 5116 d7B30.exe 89 PID 4804 wrote to memory of 1568 4804 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe 110 PID 4804 wrote to memory of 1568 4804 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe 110 PID 4804 wrote to memory of 1568 4804 7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe"C:\Users\Admin\AppData\Local\Temp\7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7B30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7B30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5f39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5f39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C08q7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C08q7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n6078.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n6078.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g95E.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g95E.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 14844⤵
- Program crash
PID:1424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m502s.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m502s.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4740 -ip 47401⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD597b29ce33ccfe8a2b642bd236a0dd337
SHA105b326f85c0043014bcb17f3c937c82cd591abe6
SHA256d8db10abdb18394fa74bfb00c68a6ae1a40de13cf5d0a6620a9a2f1d4571351d
SHA5122f2b996a02c91911f90e7842fbedf7e51eea044d9369d98f72dcbae6edd8658f137a3f027dd02851c021555d69676cd98123a6f0b86e8af5e2a31ca71639cffb
-
Filesize
5.2MB
MD55706f19e8fcd3076a24e61956f8a49df
SHA17fb77a05e5235360e73ab1fff27f8a6c6c043b8a
SHA256b3e29eb4d4b15bb6ea45fedd04cb020a579646bbb34f5a2bfd9c2b9297a6ba60
SHA512450b2ea217f5667e0e8d02e5595d863432e5ce53b12722a8295f16c1f1cd7688257dac14ee1841ae472b64a57c29454eefb6aae9d498b2a4b9295fe5cf605a99
-
Filesize
2.8MB
MD5880f67c30d6c2335273b27df0004f500
SHA1d340d73b98a457d26180d69c28486f4d0cb98432
SHA2563acd04016a0846f4e6c69d4684ac0a21dc476e63f8e7957fc73ca58c90f40857
SHA512346c038aa380b6467417d01d9fae63bb55424886c85ac42cf98e2c9fe851c55c31bc4b46096cc793233409366c9752325c20c8ff5150eaeb8184b54ec7878ccc
-
Filesize
3.6MB
MD5b55ac1c91abed14a9119a434aa8cc03f
SHA1271d028dce489593d8526f87bfb9f906ce8847a9
SHA2564bf8b3c7096c27d79980d17ef45aac68b60419dbbf84c2f713385435cae00e8a
SHA5126efdda1405c5c27dd539e566355addb9d80ce78c5b3247ac434142e8fbe2d7bb3ffe6ae883a540cd35b5c4568cf3d9447c13747752e891464a06f34d95434ac3
-
Filesize
3.1MB
MD5919d92ab525f48e96489a3d5a55781eb
SHA13813b25b33a2d95439d631ceaa52f736da904f3f
SHA25639283777838c37df701a0f1a38bc188485b773a0804271a4d249f12a3e9e7aa4
SHA5124050dc27c21d30325af900d0488a499731f213a9059735af2b90639e8638578197a79dcb98ba06b9ba1723c18dd567ceb107bfe3320236fae19df1650e6e98dc
-
Filesize
1.8MB
MD5065df2b1ac44bd33f358223cffe70368
SHA154e5395d877a8ab89947d568aa7fc2bb5c5fbf9a
SHA25650a0eabaa0e3870d2f5f8a3a35056ff7ed381e6303eb9b44a5a9bdb2e7ff36ba
SHA512086249925dfa5d2a428506891299e3547fdbfdd848f648a6a28ddf3037a83abd4bc7b1bcb55c3cfaf0bccf8c3e29e43b9494ca8a2d7f1f4d809d57330392ce31