Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:31
Static task
static1
General
-
Target
c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe
-
Size
6.8MB
-
MD5
9fd792ce29e0a44561b55698f72876ac
-
SHA1
60e1253f87ed2e85c1aa6d0c37854fa97cea6d29
-
SHA256
c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe
-
SHA512
38d3bad76cb389791c82ff4fde0c9cb1bcf27978b47db57b53e88158914313953abd38e7373f365e5c4f0e499db10257ecf6375d1636365dc835e2b140a1af49
-
SSDEEP
196608:XHEkUEb//BwSFHb3GH1ycaMrYHxWXjg9uNpQhO7B:XHj//BwSF6EC1Xj3kOd
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4J242N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4J242N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4J242N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4J242N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4J242N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4J242N.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1o73Q2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2N7312.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3n78R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4J242N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2N7312.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4J242N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1o73Q2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2N7312.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3n78R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3n78R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1o73Q2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4J242N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1o73Q2.exe -
Executes dropped EXE 9 IoCs
pid Process 384 O9Z18.exe 1788 m9q15.exe 1632 1o73Q2.exe 4372 skotes.exe 3652 2N7312.exe 3128 3n78R.exe 4532 4J242N.exe 3196 skotes.exe 4636 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1o73Q2.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2N7312.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3n78R.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4J242N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4J242N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4J242N.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" O9Z18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" m9q15.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1632 1o73Q2.exe 4372 skotes.exe 3652 2N7312.exe 3128 3n78R.exe 4532 4J242N.exe 3196 skotes.exe 4636 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1o73Q2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4316 3128 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2N7312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3n78R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4J242N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O9Z18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m9q15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1o73Q2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3n78R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3n78R.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1632 1o73Q2.exe 1632 1o73Q2.exe 4372 skotes.exe 4372 skotes.exe 3652 2N7312.exe 3652 2N7312.exe 3128 3n78R.exe 3128 3n78R.exe 3128 3n78R.exe 3128 3n78R.exe 4532 4J242N.exe 4532 4J242N.exe 4532 4J242N.exe 4532 4J242N.exe 3196 skotes.exe 3196 skotes.exe 4636 skotes.exe 4636 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4532 4J242N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 1o73Q2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3192 wrote to memory of 384 3192 c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe 82 PID 3192 wrote to memory of 384 3192 c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe 82 PID 3192 wrote to memory of 384 3192 c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe 82 PID 384 wrote to memory of 1788 384 O9Z18.exe 83 PID 384 wrote to memory of 1788 384 O9Z18.exe 83 PID 384 wrote to memory of 1788 384 O9Z18.exe 83 PID 1788 wrote to memory of 1632 1788 m9q15.exe 84 PID 1788 wrote to memory of 1632 1788 m9q15.exe 84 PID 1788 wrote to memory of 1632 1788 m9q15.exe 84 PID 1632 wrote to memory of 4372 1632 1o73Q2.exe 85 PID 1632 wrote to memory of 4372 1632 1o73Q2.exe 85 PID 1632 wrote to memory of 4372 1632 1o73Q2.exe 85 PID 1788 wrote to memory of 3652 1788 m9q15.exe 86 PID 1788 wrote to memory of 3652 1788 m9q15.exe 86 PID 1788 wrote to memory of 3652 1788 m9q15.exe 86 PID 384 wrote to memory of 3128 384 O9Z18.exe 91 PID 384 wrote to memory of 3128 384 O9Z18.exe 91 PID 384 wrote to memory of 3128 384 O9Z18.exe 91 PID 3192 wrote to memory of 4532 3192 c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe 100 PID 3192 wrote to memory of 4532 3192 c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe 100 PID 3192 wrote to memory of 4532 3192 c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe"C:\Users\Admin\AppData\Local\Temp\c0ec3205495230999477212d02f403986f529b51132be293b5d9c1d0aea981fe.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O9Z18.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O9Z18.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9q15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9q15.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o73Q2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o73Q2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2N7312.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2N7312.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n78R.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n78R.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 15604⤵
- Program crash
PID:4316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J242N.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J242N.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3128 -ip 31281⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d30b3e87f762bc900931ee2f7731978e
SHA14f4ee3a6e78316316332368aebedfb230a3a7e15
SHA2565a6d128e443c2e21219652d9de1b30697b465df372938e019c950734a625aa51
SHA512e60820ba72fcadc8597e5e727bb6a7d72a1f6f0ffce95f56f460e4256eacdb16eb46f20c9c1ddbae4eeaa8e0909164c322c0eb735c4aca27f2301b48d167756f
-
Filesize
5.2MB
MD53b19c5775dbb25aacaf4e1a77640e5da
SHA1b57c62ce709ebcb41f3293f566b93bbb7a5e0fc4
SHA2568d4b07983766a16c8537ae34f2c74f1fbc91a003b0a3d7d1079f6f126a6542aa
SHA5122375b010c4282439e80a9086f3abc8dd60e98a9b697bbee0ba30be340025f978950092e73baf3f8dccda8b1df7bf55c26d7557783183a808b8289595b420dea3
-
Filesize
4.9MB
MD550c6ca989aefc9719a21f7e8ff0d035f
SHA1a351e1ab7bf8501fb0f7f9396c099784cdd1940c
SHA2569a7e3e0c8689ef3ed894fdfe73fedeaee19dd6136996dad963a6b7618029ac6e
SHA512ecbe82863c9f472120cbebd2a28b81cd9f40209c297c3ce441a7ac5791087714b8871162f168f380b01268358ab94ede973490828c5bc9c3d15723e0a2c2c339
-
Filesize
3.6MB
MD55a371625fab02abbf523af42999778f8
SHA1bf5b52619f89a1f31bf622c8ee19683190ca9181
SHA256cb48ad563beca419217be5ecac1dd111f0ecfb8bda5ada01db9ccee1ac7d8ff2
SHA512ccce0ec3a63a933eb82c09de8bb1b6534db3d00fbc6477ebe3235de294a57de7c727f719cb21762454a2b097c89fab9bc8b8321939e4fd24e2d6f0f8105b74b0
-
Filesize
3.1MB
MD5f92878a0f22cc47571fce9713852afe9
SHA15a51389f701048076125895fd03f6406252767fc
SHA256e74ee9d21ef2fd722225a8ff054113b85ae11a71405085258ba53b467524bde4
SHA512d1bdf09fd2148eaba78aa977bfaa6664528b78403d04d6a318da9f875065b9129095c388e16c63a73768e0769419d76593b1c176d6ff8c741fe8bd32f9119ac3
-
Filesize
1.8MB
MD5de5663a16524882ceb5a3010b0ec0b1e
SHA1280d168c2fd1c0907eca8f1818b3cd6898586c88
SHA256b83a1f57cac8525b3cf0e64196418f40f5360b029e7c39daaa5909066b49e8de
SHA51277ffd66d7bdf9309c9c1fec965e3daa64bde555ea40154c176252fd94b5e42c5c2a5140ef1ddf0a79fb11cb58fc20b27e02cb447d56c08a3fc4a7f845693d3c1