Analysis
-
max time kernel
143s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:05
Static task
static1
General
-
Target
6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe
-
Size
6.9MB
-
MD5
a664bb5450e20961b39282eea3c68633
-
SHA1
8587a78290b04ec561278b69cf7c93e131811bfb
-
SHA256
6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13
-
SHA512
06273f9ba177b62ba1b3b3f190f43a9d1824922038f391b7528e26d19f601d696c108ab6a3d022159647b14690337da8c3a17319a24bccdedb24bee6fbcb5f67
-
SSDEEP
196608:66OMNUppzlRf4U3PbyYNew6wEDVFPliEiKz7oCcRD:66ZNUpp3f4UzJz8VrE0oCI
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4M182o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4M182o.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4M182o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4M182o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4M182o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4M182o.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4M182o.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1r89w3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q2027.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3M52B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1r89w3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3M52B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3M52B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4M182o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4M182o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q2027.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q2027.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1r89w3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1r89w3.exe -
Executes dropped EXE 10 IoCs
pid Process 3140 J7q24.exe 2600 d5K98.exe 2128 1r89w3.exe 2516 skotes.exe 2872 2Q2027.exe 2548 3M52B.exe 2424 skotes.exe 968 4M182o.exe 1020 skotes.exe 5012 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3M52B.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4M182o.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1r89w3.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2Q2027.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4M182o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4M182o.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" J7q24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" d5K98.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2128 1r89w3.exe 2516 skotes.exe 2872 2Q2027.exe 2548 3M52B.exe 2424 skotes.exe 968 4M182o.exe 1020 skotes.exe 5012 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1r89w3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1308 2548 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5K98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1r89w3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q2027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3M52B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4M182o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J7q24.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3M52B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3M52B.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2128 1r89w3.exe 2128 1r89w3.exe 2516 skotes.exe 2516 skotes.exe 2872 2Q2027.exe 2872 2Q2027.exe 2548 3M52B.exe 2548 3M52B.exe 2424 skotes.exe 2424 skotes.exe 2548 3M52B.exe 2548 3M52B.exe 968 4M182o.exe 968 4M182o.exe 968 4M182o.exe 968 4M182o.exe 1020 skotes.exe 1020 skotes.exe 5012 skotes.exe 5012 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 968 4M182o.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 1r89w3.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1532 wrote to memory of 3140 1532 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe 83 PID 1532 wrote to memory of 3140 1532 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe 83 PID 1532 wrote to memory of 3140 1532 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe 83 PID 3140 wrote to memory of 2600 3140 J7q24.exe 84 PID 3140 wrote to memory of 2600 3140 J7q24.exe 84 PID 3140 wrote to memory of 2600 3140 J7q24.exe 84 PID 2600 wrote to memory of 2128 2600 d5K98.exe 85 PID 2600 wrote to memory of 2128 2600 d5K98.exe 85 PID 2600 wrote to memory of 2128 2600 d5K98.exe 85 PID 2128 wrote to memory of 2516 2128 1r89w3.exe 86 PID 2128 wrote to memory of 2516 2128 1r89w3.exe 86 PID 2128 wrote to memory of 2516 2128 1r89w3.exe 86 PID 2600 wrote to memory of 2872 2600 d5K98.exe 87 PID 2600 wrote to memory of 2872 2600 d5K98.exe 87 PID 2600 wrote to memory of 2872 2600 d5K98.exe 87 PID 3140 wrote to memory of 2548 3140 J7q24.exe 89 PID 3140 wrote to memory of 2548 3140 J7q24.exe 89 PID 3140 wrote to memory of 2548 3140 J7q24.exe 89 PID 1532 wrote to memory of 968 1532 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe 99 PID 1532 wrote to memory of 968 1532 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe 99 PID 1532 wrote to memory of 968 1532 6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe"C:\Users\Admin\AppData\Local\Temp\6687a4b3bad4d14d9b4afeaf4f116d0e1676c8aea52a68bdf957a1cbdd5ccb13.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J7q24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J7q24.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5K98.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5K98.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r89w3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r89w3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q2027.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q2027.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M52B.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M52B.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 15524⤵
- Program crash
PID:1308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M182o.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M182o.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2548 -ip 25481⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD549e4b42af2f02c01c9b73adfeabdac1b
SHA1eb44395565d7608cc9b62927f09306e8a865abc9
SHA256c940cd77a0ef39a1c840f9309b7ac8cb3d26af5346f40ad76753b90ba8efaf65
SHA51219a00e1f93731bc81c9b827b2b178da32bf8deeadf157678ee90bd59a1de300bb05c253b696dcb83895258bf1539f34f1f696b895f25732f1f5a064c9d136028
-
Filesize
5.3MB
MD55dbdeba9a806d6e185c553832600ca42
SHA1b9bac6efeba47656e3306150840997bd110a6c97
SHA25603b9e72b3b8f8031613778634bb15e31ff9f4cbeee3dea49fa18281930218077
SHA512b8a045552de176301e0b4415f7e4b34eedc01fac7a75475bc8012eb3cbd350e71d2379abdcdcbc638773d2ef9bc7039a35be4e2c69e30909acc3734ccb7a3316
-
Filesize
5.0MB
MD58c40bb6c3c0e8a36f2eae8a4c847bb88
SHA1540209d851c92683c093101dd2bf73b0f4c63373
SHA256b3dfb40fa19b4a19759bd60766049c27161b4223ea06380e15be7b0f057cb5bb
SHA5123a2ef6aa88c5f57d4540ba218d3e30ebfad8d413aae09b79fc69c75f860664a7cce4c046ebac8cd662472801ca2b1300c5f3004670b671261d125b2d502f4d93
-
Filesize
3.6MB
MD5334f54f02ac905cce0c769c7f850d656
SHA1e200508f73c4e7a4677f5bc9a6b5be11ee8cb1bd
SHA256e02b2f8457806806dc4e9320e15248cd11f40448c43e25f8e31eef7e26dd0b3c
SHA512dfb3f7c3737601b47770af79740c3e40fc44bf37208cca9a5e0c0911f74e9c1b6b77f8ad5a7a7570af445d37bf1ea2243fc59ff451c84cc76f2b9b84f0e9b7da
-
Filesize
3.1MB
MD582bf7a0f78d3cf2ec7bb1641c1a335bb
SHA1f667669797c507034b77fd6ea37f9eb4d941ce40
SHA256476eba1917bb8ffdf2cb5a27cfd3ecdd9bc20323a0197e77cef57efbd2a6f141
SHA5126f677129e7914bea18466feee33375008f51612c49940bca8f03e57711c1aeea7a3c120e20bd178043afc3071535d0e26d52a3bb842aef9b169d3fe3abbd544a
-
Filesize
1.8MB
MD5942e86204245173e9297bf46dacf79b3
SHA1e3a1824db55ca76304cf36a238bc3b24a76902d6
SHA256a6f5c5e95852cd706419be818733fa6c079c27af126b390928b315ff984a1918
SHA51240845e4bdac867d5b6a5b04dd831eb3d136ce74c90f3657621c53f4c415d24dc48abe838b79addad1ff7a564c8e4a835082da2eef62323c8f2cb28381fe1327b