Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 08:54
Static task
static1
General
-
Target
d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe
-
Size
6.8MB
-
MD5
af1035c988bc2c6748376b8f29d6a839
-
SHA1
87174e6ed290c90b23225db19543ca1fac358259
-
SHA256
d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2
-
SHA512
44c3f95d859ed72a78fe938360eba9968ac88658c28a32e2b78a16667bf74ab619b530acee5f8b9458c125c636c04a2579be66d4ddcc58ec02af60507ae52d53
-
SSDEEP
196608:qcnj/jZPililuWBSVDlZO1hc2Fve1EckDYX:lj/ViliuiSc1/9aEck
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4V160W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4V160W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4V160W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4V160W.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4V160W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4V160W.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Z32f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4V160W.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d52L7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2k4644.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2k4644.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d52L7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4V160W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4V160W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d52L7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2k4644.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Z32f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Z32f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1d52L7.exe -
Executes dropped EXE 9 IoCs
pid Process 2428 F0g48.exe 2200 P6O86.exe 4088 1d52L7.exe 1112 skotes.exe 2868 2k4644.exe 888 3Z32f.exe 876 4V160W.exe 3516 skotes.exe 2548 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1d52L7.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2k4644.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3Z32f.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4V160W.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4V160W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4V160W.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" F0g48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" P6O86.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4088 1d52L7.exe 1112 skotes.exe 2868 2k4644.exe 888 3Z32f.exe 876 4V160W.exe 3516 skotes.exe 2548 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d52L7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4872 888 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4V160W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F0g48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P6O86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d52L7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2k4644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Z32f.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3Z32f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3Z32f.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4088 1d52L7.exe 4088 1d52L7.exe 1112 skotes.exe 1112 skotes.exe 2868 2k4644.exe 2868 2k4644.exe 888 3Z32f.exe 888 3Z32f.exe 888 3Z32f.exe 888 3Z32f.exe 876 4V160W.exe 876 4V160W.exe 876 4V160W.exe 876 4V160W.exe 3516 skotes.exe 3516 skotes.exe 2548 skotes.exe 2548 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 876 4V160W.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4088 1d52L7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2428 2872 d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe 82 PID 2872 wrote to memory of 2428 2872 d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe 82 PID 2872 wrote to memory of 2428 2872 d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe 82 PID 2428 wrote to memory of 2200 2428 F0g48.exe 83 PID 2428 wrote to memory of 2200 2428 F0g48.exe 83 PID 2428 wrote to memory of 2200 2428 F0g48.exe 83 PID 2200 wrote to memory of 4088 2200 P6O86.exe 84 PID 2200 wrote to memory of 4088 2200 P6O86.exe 84 PID 2200 wrote to memory of 4088 2200 P6O86.exe 84 PID 4088 wrote to memory of 1112 4088 1d52L7.exe 85 PID 4088 wrote to memory of 1112 4088 1d52L7.exe 85 PID 4088 wrote to memory of 1112 4088 1d52L7.exe 85 PID 2200 wrote to memory of 2868 2200 P6O86.exe 86 PID 2200 wrote to memory of 2868 2200 P6O86.exe 86 PID 2200 wrote to memory of 2868 2200 P6O86.exe 86 PID 2428 wrote to memory of 888 2428 F0g48.exe 92 PID 2428 wrote to memory of 888 2428 F0g48.exe 92 PID 2428 wrote to memory of 888 2428 F0g48.exe 92 PID 2872 wrote to memory of 876 2872 d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe 100 PID 2872 wrote to memory of 876 2872 d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe 100 PID 2872 wrote to memory of 876 2872 d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe"C:\Users\Admin\AppData\Local\Temp\d4cd497b180131d071e1dd9e031a15fbc2ee78cd900338b62f2991df297594e2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\F0g48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\F0g48.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P6O86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P6O86.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d52L7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d52L7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k4644.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k4644.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z32f.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z32f.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 15604⤵
- Program crash
PID:4872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4V160W.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4V160W.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 888 -ip 8881⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD51d4862db9991f5540866af210c8de996
SHA1104583e0c1c7062ea74bdc1120b5d55bd3896850
SHA2563a29c3e9e63c09c95c22cc0217b00a1250195686ab991f6a8051daee437f91b4
SHA51274ca2fd1c43e2be79ee7fe81e9f396e128629057239f4f2b2a4c34baff9900018fb1985997ea7b53ff92e01355f129118de0595565013ce6fd661eb5852c474a
-
Filesize
5.3MB
MD586ee2d5dde3c3b5e75e81a37e6ba5de4
SHA1b3b25d5862018b715ad809d54d99ffcd49c9b992
SHA256ec59d25289689f2cc75d8de2bba872f1a820a03fe42a12f5c734b380d2b38fac
SHA5123a339d9a8e3f9f56a3e02a38f403f171a31d1cb681af44739770cd2be32307666664c6f613efb1d0d833975a2c11ea2795482534e736616fc286b1a4dfa45424
-
Filesize
5.0MB
MD58a52c9727ba14d8af880136b6212ca7c
SHA1a5f3dff5f697ca064c8bdc020fa2209a16ed9124
SHA256f7f5bd2daefbacddbdad2e23c43f1d43558baf6ebe50843db51f20491d5f7263
SHA512b43ee411e3fd04bb5031af9490411e4e3cf85a8f4646099a29ae83a884453bbf86e85565facf7a2d93411c6d41fbf32dd556de398f0fa49bfe21135f12e02868
-
Filesize
3.6MB
MD54fa4a3f6c768e1a073387ee68aeb61f4
SHA1bc893f72707a1b25ba109c9d2fe7161633c66859
SHA256efd4cc7e39182a3ce25c538a35ed19047cb25293d3a1112c5919795ee3652846
SHA51285ae6d56bb57cf9db2ba1cdd3d50a9b50681dd1b7167520e8b933b6abc10970347267c4a790c84dafe166176136a3845143a504e0132bb44139b345117216532
-
Filesize
3.1MB
MD5049b4308394726ea4a8e200d768c1ffe
SHA15532506958164981b511073c2be7c19d6d571aa7
SHA2560dbf234021164276fe06ed7c0248171847a23239bead8d3422f14bd59f0216cd
SHA5120ae7cbcb68624832d02003dc36c8998f6e95d21d5a34199ef560fce23983871541e6a573ae6646e2f1aac6d6eebb9b3b3677c334c14780dea2893fadd17160a6
-
Filesize
1.8MB
MD50f02b493551249ebec8e7f1f77d27e03
SHA1b0123e2635b273edaa243e3984491186a6dd823d
SHA256d7e35944454fa434b36485ab788b3ae09a01e4d8f1b2b9ecc991e248c9e65456
SHA51239647226befd0b15c73523beb6e01a367117c604f899433f9dc3b91c6f6c030c7b7349cf60c956a219a88d4dda7748eb5025b9e1b3d8e0188e839b8c9eef0b2c