Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:50
Static task
static1
General
-
Target
effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe
-
Size
6.8MB
-
MD5
c57586feb47dcd57a70ef8881fca867d
-
SHA1
0f9b0fdf853e2966ceb426f3967032685454d2ad
-
SHA256
effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95
-
SHA512
59c2d064ab73b5d891ca1088ac40f8e6d537c95b408b71178d6badb212f602bac3bb4d922388b0ea1734e113ddf3e8a3b8a8c77decb07688549907de34e6b2cf
-
SSDEEP
196608:lY/A4h3D3XYQJhwivKbRMeOeHUfBioTerr:u44h3rJJeivKbR5Oe0fBioTer
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4y183q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4y183q.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4y183q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4y183q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4y183q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4y183q.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3o03l.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4y183q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1T35e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2u7798.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1T35e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1T35e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2u7798.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2u7798.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3o03l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3o03l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4y183q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4y183q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1T35e8.exe -
Executes dropped EXE 9 IoCs
pid Process 1468 I6t92.exe 2096 E1U10.exe 3836 1T35e8.exe 4420 skotes.exe 1440 2u7798.exe 4240 3o03l.exe 4488 4y183q.exe 4636 skotes.exe 2356 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1T35e8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2u7798.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3o03l.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4y183q.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4y183q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4y183q.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" I6t92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" E1U10.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3836 1T35e8.exe 4420 skotes.exe 1440 2u7798.exe 4240 3o03l.exe 4488 4y183q.exe 4636 skotes.exe 2356 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1T35e8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 588 4240 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1T35e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2u7798.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3o03l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4y183q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I6t92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E1U10.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3o03l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3o03l.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3836 1T35e8.exe 3836 1T35e8.exe 4420 skotes.exe 4420 skotes.exe 1440 2u7798.exe 1440 2u7798.exe 4240 3o03l.exe 4240 3o03l.exe 4240 3o03l.exe 4240 3o03l.exe 4488 4y183q.exe 4488 4y183q.exe 4488 4y183q.exe 4488 4y183q.exe 4636 skotes.exe 4636 skotes.exe 2356 skotes.exe 2356 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4488 4y183q.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3836 1T35e8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1468 1820 effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe 82 PID 1820 wrote to memory of 1468 1820 effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe 82 PID 1820 wrote to memory of 1468 1820 effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe 82 PID 1468 wrote to memory of 2096 1468 I6t92.exe 83 PID 1468 wrote to memory of 2096 1468 I6t92.exe 83 PID 1468 wrote to memory of 2096 1468 I6t92.exe 83 PID 2096 wrote to memory of 3836 2096 E1U10.exe 84 PID 2096 wrote to memory of 3836 2096 E1U10.exe 84 PID 2096 wrote to memory of 3836 2096 E1U10.exe 84 PID 3836 wrote to memory of 4420 3836 1T35e8.exe 85 PID 3836 wrote to memory of 4420 3836 1T35e8.exe 85 PID 3836 wrote to memory of 4420 3836 1T35e8.exe 85 PID 2096 wrote to memory of 1440 2096 E1U10.exe 86 PID 2096 wrote to memory of 1440 2096 E1U10.exe 86 PID 2096 wrote to memory of 1440 2096 E1U10.exe 86 PID 1468 wrote to memory of 4240 1468 I6t92.exe 87 PID 1468 wrote to memory of 4240 1468 I6t92.exe 87 PID 1468 wrote to memory of 4240 1468 I6t92.exe 87 PID 1820 wrote to memory of 4488 1820 effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe 100 PID 1820 wrote to memory of 4488 1820 effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe 100 PID 1820 wrote to memory of 4488 1820 effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe"C:\Users\Admin\AppData\Local\Temp\effd3b92ce1a08aa79435df88fa00941adadb55abe0e241c6d0598c7a4083b95.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I6t92.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I6t92.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\E1U10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\E1U10.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T35e8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T35e8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u7798.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u7798.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o03l.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o03l.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 15604⤵
- Program crash
PID:588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4y183q.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4y183q.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4240 -ip 42401⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD58ad8cac12308faa017c8a4314d868562
SHA175fc650b6e15df54671a8a7d969fb645c998a08e
SHA2566c89d2e46ea851b0512810ef7607961ee0ef82857423143d5c8a631e0921f8b9
SHA512124b84e7d39d858dc593db2d4b66d65dc2ed3cc84b61fbc2aacec4ec5392b483f5e911ce9cbb048479391b0ee1e8aabfd17e5c906763fc38550e7421a9e6630a
-
Filesize
5.2MB
MD51f025428ecd8a2bd656362d2bd1c827d
SHA1d0b1eeaec802d36a5c0fffeb8f0fdc89681bb633
SHA256dc19233abc03f17e1267151f9e145b81a05f67d1436bf67b55ff4e84442b55af
SHA512120de833840b4b1746dce1d5a430afd465cd16d57139c57bb1465abfffe35348c9545530698cdbe991f3f2897ff3a340def888c4405755e2aaaad1bc059ef46a
-
Filesize
5.0MB
MD54f825f7b0b233e31c4427388540a9a5f
SHA1b25757ea5637cb67370aa086435920945c86bcd4
SHA25630adbfb2d22d4eda4f96b4d8dccf80f91d8bfff44d63acbeac1b6e2ba091c102
SHA512c5c0b3df54fc1cb5fd14625ebb4451c51ca1529b00c8a6b17308799cde485b7a2c5234b185f389c29737bb56468e676c3843df31f2a5229173067f3bc136fe56
-
Filesize
3.6MB
MD5b5e5e98662bd04e954dbb1d9e0ce1419
SHA1df2a421f6c0ca1346d0b8ed5a9433432f7caf9da
SHA25669e9d7b4be0ebbec8b29c91ea9ed5b50f5682b748bfce5fbcaf31fcb396e6401
SHA51278975edbcc1c95b2de41b5ba88577848050bf004189affccf376c14eab5d887d4c6334e42c07a53082d87bf0d1acd00a87fd239ab9f52d23c6f3e6f33ab09d5a
-
Filesize
3.1MB
MD56c98fde238946d932ecfc0243ea9e21d
SHA13fe8b50191dd764a619d861c2654fa532a71cd93
SHA2569f5ce4132d2f5993ea7bd7664e9796717266ae2b8c0b2409bbd8af3c8723f22e
SHA512a49645198e249f00e49163139c920b9680c3507049b0640b7a473643a9f68b14ce470a97c8f66a98e60ee9593bba0a6b146f8e89af60708868aee1909b0b3179
-
Filesize
1.8MB
MD59f7b8b49dccac6a621777e49d24766a2
SHA162a20bc4344257ebacdfd9c0c364ff6e86a1409a
SHA2566fdf99b8a3805c6927600badc80954e71839513f199db0e0d656f6882a022bcb
SHA512e38a1593cd962766645cc88132b72e10f27c4ce361b992d884194f500566838a0d581cd482a01089faaf0fd654545eab4d936f449c5082526a76ff94731c352a