Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 09:25
Static task
static1
General
-
Target
75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe
-
Size
6.7MB
-
MD5
e42ccca514b3422712d90b7929ab0a49
-
SHA1
c63c0240619263a1951c19e9a40f348422daa151
-
SHA256
75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3
-
SHA512
4401044bc466183e22ef99cef365031a569a4704e81b3178766d8881f84bee0d3bfa3cce78e393b2f4a758484fa6fa70901f168e5e8a7454e9cc00d359d6bbae
-
SSDEEP
196608:Dvn7l983e/3d/k29gi7ObaDAzyN/gOjdyDwkobtfIPEamwvLD5dr:Dh98yd/k29gi7u4g2jyD/E5c5d
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4h912D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4h912D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4h912D.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4h912D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4h912D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4h912D.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a37U.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4h912D.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1i68s6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2g5360.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2g5360.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4h912D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1i68s6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2g5360.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4h912D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1i68s6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a37U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a37U.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1i68s6.exe -
Executes dropped EXE 9 IoCs
pid Process 1640 z0H71.exe 1964 R5k74.exe 2716 1i68s6.exe 676 skotes.exe 2868 2g5360.exe 4516 3a37U.exe 3720 4h912D.exe 2852 skotes.exe 3936 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1i68s6.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2g5360.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3a37U.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4h912D.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4h912D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4h912D.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0H71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" R5k74.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2716 1i68s6.exe 676 skotes.exe 2868 2g5360.exe 4516 3a37U.exe 3720 4h912D.exe 2852 skotes.exe 3936 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1i68s6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 228 4516 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z0H71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R5k74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1i68s6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2g5360.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a37U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4h912D.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3a37U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3a37U.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2716 1i68s6.exe 2716 1i68s6.exe 676 skotes.exe 676 skotes.exe 2868 2g5360.exe 2868 2g5360.exe 4516 3a37U.exe 4516 3a37U.exe 4516 3a37U.exe 4516 3a37U.exe 3720 4h912D.exe 3720 4h912D.exe 3720 4h912D.exe 3720 4h912D.exe 2852 skotes.exe 2852 skotes.exe 3936 skotes.exe 3936 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3720 4h912D.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 1i68s6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1640 1052 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe 83 PID 1052 wrote to memory of 1640 1052 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe 83 PID 1052 wrote to memory of 1640 1052 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe 83 PID 1640 wrote to memory of 1964 1640 z0H71.exe 84 PID 1640 wrote to memory of 1964 1640 z0H71.exe 84 PID 1640 wrote to memory of 1964 1640 z0H71.exe 84 PID 1964 wrote to memory of 2716 1964 R5k74.exe 85 PID 1964 wrote to memory of 2716 1964 R5k74.exe 85 PID 1964 wrote to memory of 2716 1964 R5k74.exe 85 PID 2716 wrote to memory of 676 2716 1i68s6.exe 86 PID 2716 wrote to memory of 676 2716 1i68s6.exe 86 PID 2716 wrote to memory of 676 2716 1i68s6.exe 86 PID 1964 wrote to memory of 2868 1964 R5k74.exe 87 PID 1964 wrote to memory of 2868 1964 R5k74.exe 87 PID 1964 wrote to memory of 2868 1964 R5k74.exe 87 PID 1640 wrote to memory of 4516 1640 z0H71.exe 96 PID 1640 wrote to memory of 4516 1640 z0H71.exe 96 PID 1640 wrote to memory of 4516 1640 z0H71.exe 96 PID 1052 wrote to memory of 3720 1052 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe 110 PID 1052 wrote to memory of 3720 1052 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe 110 PID 1052 wrote to memory of 3720 1052 75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe"C:\Users\Admin\AppData\Local\Temp\75fd0d4c88d80081dfeb7e47257afbb4f7fbc4ae41769ee645393118d456dff3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0H71.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0H71.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\R5k74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\R5k74.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i68s6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i68s6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g5360.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g5360.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a37U.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a37U.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 15604⤵
- Program crash
PID:228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4h912D.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4h912D.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4516 -ip 45161⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD51a8f984a852b3e7e02e245b94a1a2657
SHA1415058e1e557ae28c494892fb892d361673f9d25
SHA256f81a346a16948d4372b6e3b615a04d01c50644f99f1db7bf0e41346f1b2c0a01
SHA512c8f8085237e2fcbbbb8b3e7d89bfe14b6ce5770c14a4651694195bdcbd8cc2cbe80ae566f795a9244c76e26de43fbd7962c4bf9e8a14c285eb51cb71d744e481
-
Filesize
5.1MB
MD5a452fab231ee9fed76e193cacf6e3a61
SHA127d7aeaca1ab8849e8dacf0ee031775bbffd34f9
SHA25619216b9117652db8083ca141f4cf0ad6e75c458760687adf422d85d07a98b49b
SHA512bd8ec2a19d17cc944b7c3045317bbf8a1e84f5258c5d56dab9315e351cb91f11af7171ba39da4e7b733917740ed00682e81da730fa722fd318d8cb13337beb53
-
Filesize
4.9MB
MD541e972777ac93aeb1727ff9cefea7fd6
SHA1d4540eaab8030fdf99844bed4437769e12a89269
SHA256a0aac9a98da66e68dcedd48ad1d9d657c6e4107ea409745fdfa1cf4eacff9697
SHA512e6c262d7268c8743ad1cdd0c59e53c83854079b4019f901ac972a1531e4f78d3c897d464218655243ac15091a9e2ab320d392f0e1eef362fdc50d3dd4f24b662
-
Filesize
3.5MB
MD5970a05f64ff3d53156059e8c101b8696
SHA1663214d10d4f9416515fdb3c8483e23237f9db2a
SHA256f9c9ba9fa187ca638521e38771417b75a81d10a1e7bf22b15b38ea656c4c9acb
SHA512ff9aa1723ae09ac7af4961ab45ac0ad0127c509db62f4bd9790a58ef6c2ab11a3307d29c6c496c96a1151d76117ad6b8871d02468d48976a9946ca3246c8d844
-
Filesize
3.0MB
MD58bdbcf219c497bcac9ee633a5d8fbd50
SHA1f05e1260ba548add8e6b0f5e83c95f7393ec9361
SHA2567a512845921e555302a5931c49194e12a8cafbf834bb6dab85ceb5b85597f6b7
SHA512239d953fb0f017a63c9cbabbf86aadb62d03e3bb5407e3b2c93c53abd1dc33bad1222e76ea93c7e27d741dbd490e8aae0438d2645d45b2c810ed997c4f364115
-
Filesize
1.8MB
MD53a1499129e65e9f9bd9ba2f6bb37bde4
SHA1bd5a3122769eabd0eae6ab6607ee39c62dbc4576
SHA256c4428b7f7dbbfd80cff05865e37da3028e867845205873d255f8eaf26b83d98e
SHA5120f0c4e5c8f01c06188c92bd8ba68d8258602aedb915c97419dc0c2e6c0e873e5cc72ae2d2e80a5e4ee60eb4d524079311662ccc45a180f88f934245b0face07b