Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 06:41
Static task
static1
General
-
Target
3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe
-
Size
6.8MB
-
MD5
e92ae874e936ba076871d94d88603274
-
SHA1
25641ff05ca20b0b091533d63161ea7549675d57
-
SHA256
3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e
-
SHA512
e5e388f40da69a50b63e70e3effd303109a4895574af0d7b40b8b62ac516753586e4aaee7f1101140b7942655c59e2a4f45b8e18c3be2c364606a3f6296c0062
-
SSDEEP
196608:e2Xqj6XDlCAvtSdG7ZFN2af2rcQECO0uiH:e2aWBiKZuz8C3u4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4x058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4x058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4x058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4x058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4x058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4x058e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3j85a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4x058e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B01H0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2C6595.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2C6595.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3j85a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3j85a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4x058e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B01H0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B01H0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2C6595.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4x058e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1B01H0.exe -
Executes dropped EXE 10 IoCs
pid Process 4808 A8c42.exe 1232 t0d62.exe 852 1B01H0.exe 2908 skotes.exe 4864 2C6595.exe 3924 3j85a.exe 1124 skotes.exe 3024 4x058e.exe 4140 skotes.exe 3124 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2C6595.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3j85a.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4x058e.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1B01H0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4x058e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4x058e.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" A8c42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" t0d62.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 852 1B01H0.exe 2908 skotes.exe 4864 2C6595.exe 3924 3j85a.exe 1124 skotes.exe 3024 4x058e.exe 4140 skotes.exe 3124 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B01H0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5012 3924 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C6595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3j85a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4x058e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A8c42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t0d62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B01H0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3j85a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3j85a.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 852 1B01H0.exe 852 1B01H0.exe 2908 skotes.exe 2908 skotes.exe 4864 2C6595.exe 4864 2C6595.exe 3924 3j85a.exe 3924 3j85a.exe 1124 skotes.exe 1124 skotes.exe 3924 3j85a.exe 3924 3j85a.exe 3024 4x058e.exe 3024 4x058e.exe 3024 4x058e.exe 3024 4x058e.exe 4140 skotes.exe 4140 skotes.exe 3124 skotes.exe 3124 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 4x058e.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 532 wrote to memory of 4808 532 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe 83 PID 532 wrote to memory of 4808 532 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe 83 PID 532 wrote to memory of 4808 532 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe 83 PID 4808 wrote to memory of 1232 4808 A8c42.exe 84 PID 4808 wrote to memory of 1232 4808 A8c42.exe 84 PID 4808 wrote to memory of 1232 4808 A8c42.exe 84 PID 1232 wrote to memory of 852 1232 t0d62.exe 85 PID 1232 wrote to memory of 852 1232 t0d62.exe 85 PID 1232 wrote to memory of 852 1232 t0d62.exe 85 PID 852 wrote to memory of 2908 852 1B01H0.exe 86 PID 852 wrote to memory of 2908 852 1B01H0.exe 86 PID 852 wrote to memory of 2908 852 1B01H0.exe 86 PID 1232 wrote to memory of 4864 1232 t0d62.exe 87 PID 1232 wrote to memory of 4864 1232 t0d62.exe 87 PID 1232 wrote to memory of 4864 1232 t0d62.exe 87 PID 4808 wrote to memory of 3924 4808 A8c42.exe 88 PID 4808 wrote to memory of 3924 4808 A8c42.exe 88 PID 4808 wrote to memory of 3924 4808 A8c42.exe 88 PID 532 wrote to memory of 3024 532 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe 109 PID 532 wrote to memory of 3024 532 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe 109 PID 532 wrote to memory of 3024 532 3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe"C:\Users\Admin\AppData\Local\Temp\3f851c7ec843f51c71fc958f398efb08342145196d50d05a9872602e532ce85e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A8c42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A8c42.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t0d62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t0d62.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B01H0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B01H0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2C6595.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2C6595.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3j85a.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3j85a.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 15604⤵
- Program crash
PID:5012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x058e.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x058e.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3924 -ip 39241⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD511a24314b2624fa88400b8432750ca07
SHA14ab451ed3952ffdafe3319138d69572cad186bb8
SHA256f0d5c981e03e1d93da09a4d278add8a4645aee8824932df00d4c2644f8f0d203
SHA5127417b6cacccc2f2127bcb13898a2bcaeef6c1a7e9336d67fa33346bdea006e760106f1c00012aada62ed9697e35ed618fc007a2dbc4a5bc2da7374f6fdebbd71
-
Filesize
5.2MB
MD51bdfe069ce7b4ba3f3ee3dc54f5e5ae2
SHA1066db42a324ca36b63aaa575182f1982ba316a60
SHA256a85f5ab8fc95faf113e18fbac9dfe838c6029852b117ac324c699db5a7d95dea
SHA5126f44df10b8f3355d81896c2f527044fada06245c1c4008f95d3ee6afbe164f0cf39a710817f0ffc7d7f56cb9e243505147775a2c095b81e1ec63737248908299
-
Filesize
4.9MB
MD586469ee1374eb8662bae36d7dd5de6b1
SHA11b5f8571f39a8adee4a9054c8c2fc2f46fbbee27
SHA2562fd9b6f30c14646cb9de4189b522b244ef724dd65d22a7ba6532d61360fddd65
SHA51219176b04fde01c9ca018d6eb1906a21c3cd06777d2ef871e040d08241370c84161c8b2e969f4090d142ce671a7bff0489f6e107ba9897d5ddb8b3b566560bc45
-
Filesize
3.6MB
MD5c49f114cad10104a792460d2768dbf68
SHA169d00e6cdda5cc08fd73823b51aee9153ff0419d
SHA2567d163ce0a4630a15e0d9a15eebbd7137a5c4dbc99fa566b7272b1666770f1481
SHA512088a21fe28072714d7d651a05a8a6753a3d9afffe554e515c0dad1230e34d2172bc98fdba5195bcfbc8efd0335ebf483b8f26ee9afa51d542ec89f34fd922409
-
Filesize
3.1MB
MD56d7ca0f47b89ad48a11b0f47927cc3b9
SHA14aa35099ba998ef195d55482ed19a6f62ddee362
SHA256c4dd95cb7c3ee36faafa00266ef173df5cec96d1ae5604591b0ed9a77fcd0b9f
SHA512bbd148d67186b7b0cd23ef7a5f0f9b7de5c145b696e75b95893ba16fe7efe306d6c4dfaff4b53631523ec4461e99885b49bdcf9658c43ccb59107315908f4688
-
Filesize
1.8MB
MD506473103f0ce27b3600328c027b7ac83
SHA10bec56f13caa2199d47935c94cad806bda003f5f
SHA256abff990c992961487c4f8f6cd4b2fd3977adb737d5842f7ade73b120d500cf49
SHA5121bacc032e4449c0c0cb7453474e2c0d5648a91ba6e7047be1dfdd153423e1e50a41d1f4e421b02dc59e0ad0a4b79cecf8c1356b8ca7c944da0420aa49635dd1e