Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 00:31
Static task
static1
General
-
Target
0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe
-
Size
6.8MB
-
MD5
f4c2094830af40c3be9d9295174a1a12
-
SHA1
a72c84e8d9aa42d5687b8199315325f4409d7a68
-
SHA256
0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811
-
SHA512
ee1137e38875c025ec97b6ab6eefd9410a639ffa165bd8e4028401bd437ec4fb4f4c52d5584a9ed73fd8d350237292e4483a511eb7f40b988ca12d288057262e
-
SSDEEP
196608:8fvIIAmVgM+GotPL8sD/cFO1XUPAY8GCXIQ+:uvIIHOL1EFCUPAY+X
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4C590n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4C590n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4C590n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4C590n.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4C590n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4C590n.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3J83p.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4C590n.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1I12N9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z1707.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z1707.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3J83p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4C590n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1I12N9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1I12N9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3J83p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4C590n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z1707.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1I12N9.exe -
Executes dropped EXE 10 IoCs
pid Process 4800 d1y58.exe 3932 s6T54.exe 2836 1I12N9.exe 4884 skotes.exe 4692 2z1707.exe 4488 3J83p.exe 4140 skotes.exe 820 4C590n.exe 1944 skotes.exe 844 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2z1707.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3J83p.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4C590n.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1I12N9.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4C590n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4C590n.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" d1y58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s6T54.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2836 1I12N9.exe 4884 skotes.exe 4692 2z1707.exe 4488 3J83p.exe 4140 skotes.exe 820 4C590n.exe 1944 skotes.exe 844 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1I12N9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3520 4488 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1I12N9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z1707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3J83p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4C590n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1y58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6T54.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3J83p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3J83p.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2836 1I12N9.exe 2836 1I12N9.exe 4884 skotes.exe 4884 skotes.exe 4692 2z1707.exe 4692 2z1707.exe 4488 3J83p.exe 4488 3J83p.exe 4140 skotes.exe 4140 skotes.exe 4488 3J83p.exe 4488 3J83p.exe 820 4C590n.exe 820 4C590n.exe 820 4C590n.exe 820 4C590n.exe 1944 skotes.exe 1944 skotes.exe 844 skotes.exe 844 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 820 4C590n.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 1I12N9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4340 wrote to memory of 4800 4340 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe 84 PID 4340 wrote to memory of 4800 4340 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe 84 PID 4340 wrote to memory of 4800 4340 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe 84 PID 4800 wrote to memory of 3932 4800 d1y58.exe 85 PID 4800 wrote to memory of 3932 4800 d1y58.exe 85 PID 4800 wrote to memory of 3932 4800 d1y58.exe 85 PID 3932 wrote to memory of 2836 3932 s6T54.exe 86 PID 3932 wrote to memory of 2836 3932 s6T54.exe 86 PID 3932 wrote to memory of 2836 3932 s6T54.exe 86 PID 2836 wrote to memory of 4884 2836 1I12N9.exe 87 PID 2836 wrote to memory of 4884 2836 1I12N9.exe 87 PID 2836 wrote to memory of 4884 2836 1I12N9.exe 87 PID 3932 wrote to memory of 4692 3932 s6T54.exe 88 PID 3932 wrote to memory of 4692 3932 s6T54.exe 88 PID 3932 wrote to memory of 4692 3932 s6T54.exe 88 PID 4800 wrote to memory of 4488 4800 d1y58.exe 89 PID 4800 wrote to memory of 4488 4800 d1y58.exe 89 PID 4800 wrote to memory of 4488 4800 d1y58.exe 89 PID 4340 wrote to memory of 820 4340 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe 102 PID 4340 wrote to memory of 820 4340 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe 102 PID 4340 wrote to memory of 820 4340 0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe"C:\Users\Admin\AppData\Local\Temp\0bfa88e1370bd7dd80b0e8114e204bd1d8bd8ecb818bbafd1fac8fe03ab90811.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1y58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1y58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6T54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6T54.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I12N9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I12N9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z1707.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z1707.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J83p.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J83p.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 14844⤵
- Program crash
PID:3520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C590n.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C590n.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD589552ef846075f39f6d21e9369bad5e6
SHA184dc75b438af5ef48e391922ff29d31afe22c09d
SHA256fb7af8be5f3b0fb8efe5f888f60cbdd721bcc30e57d2348a6cf7e9ae5d44ba73
SHA512ba113381e61f5058b6f55399f96538499d5dc043657a345113ad0096ab0c044395d78901eb2c909557f5261227d323c805e99a0921ab5ac28bb3aced802c6c5b
-
Filesize
5.2MB
MD5ae8fd2e316492ec86ee8bf6e7ac148c4
SHA14f60a73ccb8fc9b0915fe3f05750a7da70a06ecb
SHA256ebbef45e8006f666f06bcdd37178079b010f6cee1733630469f76a5c8671be7b
SHA51298112bd4176b09c1528d2458c0ac360d62ecf9cf95342b0c361a9bd08d6505b60b44172c3f6d01d162c4848901e2d120900e3a0d8cd51346a8b8ae38c7ce7e22
-
Filesize
5.0MB
MD51a0527b260fa04d76f3681a8e8c073e8
SHA130770bf1453e27aaa646012fa206d1dce9303ee7
SHA256cd4983b57559febd4defa362f134cce10e56878b1009d7ce7c8b921e3a663e0a
SHA5121276727d328ded813f70ea4c1b6475aea0fdc4ecf77b1b924d39699c547e76bf6d352eda4fbc63d298d2ef407cac1686b8addfbdd4bb92f66b09379b0114340c
-
Filesize
3.5MB
MD51db21fdaa57d4e3a3f9a12fd472e9dd4
SHA19bb1c1754ba19160ea360dee4e0c847e3ef35b8f
SHA25618123d4a95846a316bd2188378811f53019854b63814ec90512a723ab63c842c
SHA51203a241aaf61266ee95af9d18c1cc67ef302ac70982a1626c97771d56165e4626dee0bd76295d0206e03fe3a706edd71687b505a878bacd715b5dd0f031b8cbae
-
Filesize
3.1MB
MD51c118d7fe75b1ad72fa3d058e23d6fe8
SHA1800d1f7f69c3402b8a71c97087590388c9338969
SHA256c2c33c001c306f2699d9749bc0596c3ee856a6ada67f32a6f15e03acf390c0fd
SHA5126b3b8abafef71a426f9851bf1067becdb69a34881460308605d06e667babb7f7c72fed53b8f42d555e04b7c3b172b6475db95c5988fce47f7a74bbb463aca8a1
-
Filesize
1.8MB
MD58dfd2ea00fdde8c44a5c9cca9b3a1282
SHA17b5706096da014004a204113a729a5bd8eeee89e
SHA25602e2b7baf57cc228049864c9e29674714b8a4b4021afc3306604cdb2512dc193
SHA5129a5acab39684ddcd516debd3f5f075d584628700f7458e2448befa8e77cb78d3c6f520efdb93d825ba97d515a91a93752c15891d3ae147e9190bba9140bba099