Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 20:18
Static task
static1
General
-
Target
ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe
-
Size
6.8MB
-
MD5
ad29963f3520bfd5047a0ac4f3b37369
-
SHA1
e730b51e6d557d437323e85eb0a3be25622b5e08
-
SHA256
ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03
-
SHA512
6088d7f585aff38a376819f5987005929f5f9798c2c7a0871ffff0448a0431b395da88e35362190a8fcdbc04dd521ace66149f1e1447b9f31ef8fb959562dfb6
-
SSDEEP
196608:Aj3eSZJWAaN8EHIZnwGud39SzySOLM/87vCwv6Zm65BUFyiL9di:KvpnwGMsOvbCwv6Zm6fUUQ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4U624H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4U624H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4U624H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4U624H.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4U624H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4U624H.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4U624H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1L29y0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2A1731.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3H39l.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3H39l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3H39l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1L29y0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1L29y0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2A1731.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2A1731.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4U624H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4U624H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1L29y0.exe -
Executes dropped EXE 9 IoCs
pid Process 4160 f2L48.exe 4572 Q4z96.exe 2660 1L29y0.exe 3048 skotes.exe 3000 2A1731.exe 1520 3H39l.exe 3256 4U624H.exe 5016 skotes.exe 4084 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4U624H.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1L29y0.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2A1731.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3H39l.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4U624H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4U624H.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" f2L48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Q4z96.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2660 1L29y0.exe 3048 skotes.exe 3000 2A1731.exe 1520 3H39l.exe 3256 4U624H.exe 5016 skotes.exe 4084 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1L29y0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3480 1520 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1L29y0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2A1731.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3H39l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4U624H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2L48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q4z96.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3H39l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3H39l.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2660 1L29y0.exe 2660 1L29y0.exe 3048 skotes.exe 3048 skotes.exe 3000 2A1731.exe 3000 2A1731.exe 1520 3H39l.exe 1520 3H39l.exe 1520 3H39l.exe 1520 3H39l.exe 3256 4U624H.exe 3256 4U624H.exe 3256 4U624H.exe 3256 4U624H.exe 5016 skotes.exe 5016 skotes.exe 4084 skotes.exe 4084 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3256 4U624H.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 1L29y0.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4160 3456 ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe 82 PID 3456 wrote to memory of 4160 3456 ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe 82 PID 3456 wrote to memory of 4160 3456 ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe 82 PID 4160 wrote to memory of 4572 4160 f2L48.exe 83 PID 4160 wrote to memory of 4572 4160 f2L48.exe 83 PID 4160 wrote to memory of 4572 4160 f2L48.exe 83 PID 4572 wrote to memory of 2660 4572 Q4z96.exe 84 PID 4572 wrote to memory of 2660 4572 Q4z96.exe 84 PID 4572 wrote to memory of 2660 4572 Q4z96.exe 84 PID 2660 wrote to memory of 3048 2660 1L29y0.exe 85 PID 2660 wrote to memory of 3048 2660 1L29y0.exe 85 PID 2660 wrote to memory of 3048 2660 1L29y0.exe 85 PID 4572 wrote to memory of 3000 4572 Q4z96.exe 86 PID 4572 wrote to memory of 3000 4572 Q4z96.exe 86 PID 4572 wrote to memory of 3000 4572 Q4z96.exe 86 PID 4160 wrote to memory of 1520 4160 f2L48.exe 87 PID 4160 wrote to memory of 1520 4160 f2L48.exe 87 PID 4160 wrote to memory of 1520 4160 f2L48.exe 87 PID 3456 wrote to memory of 3256 3456 ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe 100 PID 3456 wrote to memory of 3256 3456 ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe 100 PID 3456 wrote to memory of 3256 3456 ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe"C:\Users\Admin\AppData\Local\Temp\ffa6c59edc896439226c1c92d6eaeeb25460b6b8995289ae144859242beffb03.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f2L48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f2L48.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Q4z96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Q4z96.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L29y0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L29y0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A1731.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A1731.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H39l.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H39l.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 15364⤵
- Program crash
PID:3480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U624H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U624H.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1520 -ip 15201⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD53a07e187cea950c9b1dffbe01135ac8f
SHA12231123c233b4550cdff10964114410286ed6fa6
SHA25634bad0ee4d935bcc8a1758c5d3aa6075917b8bb81bbeeb460382e9c9579ec245
SHA5121e581b235656a8f5a1bb2cf32a33980f2636d47d7f8c0177220ed7630dcfbb066114322fb3185bdf032dc17bff9c6b2c07e67c13fa750b86554269be01009da8
-
Filesize
5.3MB
MD5e59246bd6e928823c202800f4c21ae34
SHA131526580639576e435ba67a8db2acd945a3be8f2
SHA2568bf190abf5b469ca1fec4496223bea4230c882823658dfa6f1c72ea2657e7365
SHA5123f0cab7b91ac2058e4d6501ac77b3dee00274ee2d80b07a466c1138b5dfeb2ee176780aeac37b1b2858032f9762bca03f8b5556fdf403363b5f0ca35b840e723
-
Filesize
5.0MB
MD51cd88ba6c43ec0f578f261746327cc9c
SHA1d2c1d38a835fdfc81be5739ae5b863a663118346
SHA2560911c94ce0979522999ab8e796c4e5a3db35cdab27dfd208902c24f77556a967
SHA5121b64ec2e8f48a6486836e5eeba530973317d3f468c3ae00f43b06c0254e9d200c8504d9ac2f17b8220d8fa5b1496bb934f9c950e2616f85fbf7a82192f014ec0
-
Filesize
3.6MB
MD519ee2a884a86ee7e339053533c397c9f
SHA12a659972edca18d1ab50bc97811e252fc8c19540
SHA25678b42e274a87e70c81e2aefb60f5610d1abbb62c835e770649a279bf83bc563c
SHA5122611a14786dc1c6a32f549c00e7c9f46e7674bdc4935c8f8b0d5546133feb040989879eef8e65d6568ae1ed2582a84c41e4d642fbee6e61dc3222e0318374888
-
Filesize
3.2MB
MD5d40bdd850dfa25108f5bfa3ed247b68b
SHA12c304d0fff00ba515e7d50639433f43c6fb6fa97
SHA2562f35bac81857c12e8ce3283182ac2c2ee03ec207c0351f5eb44c16ffd16787d5
SHA512356ff391e69b4f7e5896502eddf1f50ab352a1e30324e95261f58dd1e65a58d9e8803909592c88040afb092fd7d45ad459400db6309c4e14329c5bbdee8d626d
-
Filesize
1.8MB
MD56be43af1d47558e4993b9c341da5a653
SHA10bef6b68199ee1f205326d3289b39102978ec1f5
SHA2567e13dd0f50e0ded479413d1061d1d2f73fd2e51639e8b29b22776b4d0ab5368d
SHA51228d30e5d6d6c39eebb4508fce49c40bb35b6075a6b523ca8a9f643b1930fc7a49406427317fffccb374314ec59e50d004ddf6ef7082ce532b1858c112ecc05e4