Analysis

  • max time kernel
    143s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2024, 12:20

General

  • Target

    7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe

  • Size

    6.8MB

  • MD5

    bd02156054a6cdc1336525c662753649

  • SHA1

    bf225e292c2d3c9d3fa72d91b1586a202cd631de

  • SHA256

    7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4

  • SHA512

    a8e31e65f46a4707b186a2c597a809a3144081c3634403360e2d43aa75681083b5706a6e1fcd89284998760631857374757e3243648e7dfeb9ed2c6bd8c83ccb

  • SSDEEP

    196608:LZri2mkg54g4Og5a+B5uQhLn80gHuZgo0wVPqph:9rMkg/qDB5uQy0gQg0VSp

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe
    "C:\Users\Admin\AppData\Local\Temp\7e15f5aac8c003389164fc30e6db79a304e70f1f8123995407056afeec4610d4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7B30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7B30.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5f39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5f39.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C08q7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C08q7.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4076
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n6078.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n6078.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g95E.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g95E.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 1484
          4⤵
          • Program crash
          PID:1424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m502s.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m502s.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Windows security modification
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1568
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4768
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4740 -ip 4740
    1⤵
      PID:2052
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4988
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m502s.exe

      Filesize

      2.7MB

      MD5

      97b29ce33ccfe8a2b642bd236a0dd337

      SHA1

      05b326f85c0043014bcb17f3c937c82cd591abe6

      SHA256

      d8db10abdb18394fa74bfb00c68a6ae1a40de13cf5d0a6620a9a2f1d4571351d

      SHA512

      2f2b996a02c91911f90e7842fbedf7e51eea044d9369d98f72dcbae6edd8658f137a3f027dd02851c021555d69676cd98123a6f0b86e8af5e2a31ca71639cffb

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7B30.exe

      Filesize

      5.2MB

      MD5

      5706f19e8fcd3076a24e61956f8a49df

      SHA1

      7fb77a05e5235360e73ab1fff27f8a6c6c043b8a

      SHA256

      b3e29eb4d4b15bb6ea45fedd04cb020a579646bbb34f5a2bfd9c2b9297a6ba60

      SHA512

      450b2ea217f5667e0e8d02e5595d863432e5ce53b12722a8295f16c1f1cd7688257dac14ee1841ae472b64a57c29454eefb6aae9d498b2a4b9295fe5cf605a99

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g95E.exe

      Filesize

      2.8MB

      MD5

      880f67c30d6c2335273b27df0004f500

      SHA1

      d340d73b98a457d26180d69c28486f4d0cb98432

      SHA256

      3acd04016a0846f4e6c69d4684ac0a21dc476e63f8e7957fc73ca58c90f40857

      SHA512

      346c038aa380b6467417d01d9fae63bb55424886c85ac42cf98e2c9fe851c55c31bc4b46096cc793233409366c9752325c20c8ff5150eaeb8184b54ec7878ccc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5f39.exe

      Filesize

      3.6MB

      MD5

      b55ac1c91abed14a9119a434aa8cc03f

      SHA1

      271d028dce489593d8526f87bfb9f906ce8847a9

      SHA256

      4bf8b3c7096c27d79980d17ef45aac68b60419dbbf84c2f713385435cae00e8a

      SHA512

      6efdda1405c5c27dd539e566355addb9d80ce78c5b3247ac434142e8fbe2d7bb3ffe6ae883a540cd35b5c4568cf3d9447c13747752e891464a06f34d95434ac3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C08q7.exe

      Filesize

      3.1MB

      MD5

      919d92ab525f48e96489a3d5a55781eb

      SHA1

      3813b25b33a2d95439d631ceaa52f736da904f3f

      SHA256

      39283777838c37df701a0f1a38bc188485b773a0804271a4d249f12a3e9e7aa4

      SHA512

      4050dc27c21d30325af900d0488a499731f213a9059735af2b90639e8638578197a79dcb98ba06b9ba1723c18dd567ceb107bfe3320236fae19df1650e6e98dc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n6078.exe

      Filesize

      1.8MB

      MD5

      065df2b1ac44bd33f358223cffe70368

      SHA1

      54e5395d877a8ab89947d568aa7fc2bb5c5fbf9a

      SHA256

      50a0eabaa0e3870d2f5f8a3a35056ff7ed381e6303eb9b44a5a9bdb2e7ff36ba

      SHA512

      086249925dfa5d2a428506891299e3547fdbfdd848f648a6a28ddf3037a83abd4bc7b1bcb55c3cfaf0bccf8c3e29e43b9494ca8a2d7f1f4d809d57330392ce31

    • memory/924-39-0x0000000000A10000-0x0000000000EB6000-memory.dmp

      Filesize

      4.6MB

    • memory/924-40-0x0000000000A10000-0x0000000000EB6000-memory.dmp

      Filesize

      4.6MB

    • memory/1208-78-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/1568-63-0x0000000000F00000-0x00000000011BE000-memory.dmp

      Filesize

      2.7MB

    • memory/1568-66-0x0000000000F00000-0x00000000011BE000-memory.dmp

      Filesize

      2.7MB

    • memory/1568-60-0x0000000000F00000-0x00000000011BE000-memory.dmp

      Filesize

      2.7MB

    • memory/1568-59-0x0000000000F00000-0x00000000011BE000-memory.dmp

      Filesize

      2.7MB

    • memory/1568-58-0x0000000000F00000-0x00000000011BE000-memory.dmp

      Filesize

      2.7MB

    • memory/2792-53-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-67-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-51-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-80-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-79-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-76-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-48-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-47-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-75-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-74-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-61-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-35-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-73-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-72-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-68-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/2792-71-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/4076-34-0x0000000000C30000-0x0000000000F5A000-memory.dmp

      Filesize

      3.2MB

    • memory/4076-21-0x0000000000C30000-0x0000000000F5A000-memory.dmp

      Filesize

      3.2MB

    • memory/4740-50-0x0000000000220000-0x000000000071C000-memory.dmp

      Filesize

      5.0MB

    • memory/4740-43-0x0000000000220000-0x000000000071C000-memory.dmp

      Filesize

      5.0MB

    • memory/4740-54-0x0000000000220000-0x000000000071C000-memory.dmp

      Filesize

      5.0MB

    • memory/4740-49-0x0000000000220000-0x000000000071C000-memory.dmp

      Filesize

      5.0MB

    • memory/4740-52-0x0000000000220000-0x000000000071C000-memory.dmp

      Filesize

      5.0MB

    • memory/4768-46-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB

    • memory/4988-70-0x0000000000760000-0x0000000000A8A000-memory.dmp

      Filesize

      3.2MB