Analysis
-
max time kernel
113s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 20:28
Static task
static1
General
-
Target
7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe
-
Size
3.6MB
-
MD5
a3070dbcb94df0f06d965e22270fdcf7
-
SHA1
6669074761e1889ac17e0f5ca90d3b576dd58d80
-
SHA256
7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec
-
SHA512
b5ae35526c5d7cb087f06939c5f3def9d501a17a76cea349ebe3668e8ce79bbe75ec08a5261f1bd2dc1cffb5eb043376bdbe5b1cb98d980c6e96eaaa8e308b4c
-
SSDEEP
98304:KYRi+MRXEDzVlldOohqSm+U2tOMf6SprBvf4iC2XSi:p/M1QPlzqSmri6SlBhxii
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e59v5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e7735.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e59v5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e59v5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e7735.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e7735.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1e59v5.exe -
Executes dropped EXE 5 IoCs
pid Process 1572 1e59v5.exe 2160 skotes.exe 5096 2e7735.exe 4288 skotes.exe 1032 skotes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1e59v5.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2e7735.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1572 1e59v5.exe 2160 skotes.exe 5096 2e7735.exe 4288 skotes.exe 1032 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1e59v5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e7735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e59v5.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1572 1e59v5.exe 1572 1e59v5.exe 2160 skotes.exe 2160 skotes.exe 5096 2e7735.exe 5096 2e7735.exe 4288 skotes.exe 4288 skotes.exe 1032 skotes.exe 1032 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1572 1e59v5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1572 4000 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe 82 PID 4000 wrote to memory of 1572 4000 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe 82 PID 4000 wrote to memory of 1572 4000 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe 82 PID 1572 wrote to memory of 2160 1572 1e59v5.exe 83 PID 1572 wrote to memory of 2160 1572 1e59v5.exe 83 PID 1572 wrote to memory of 2160 1572 1e59v5.exe 83 PID 4000 wrote to memory of 5096 4000 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe 84 PID 4000 wrote to memory of 5096 4000 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe 84 PID 4000 wrote to memory of 5096 4000 7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe"C:\Users\Admin\AppData\Local\Temp\7e52aa0a56886f6b80d0bc393eaf986b8bfa9394eb8811f0b997fedb78595fec.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1e59v5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1e59v5.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2e7735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2e7735.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e561b6e364aea1b25acad1319773f9c6
SHA1bfb821050c97947530713f5d2784e8b25e742c0e
SHA25634fb95bb02f6f53584eaefe99950aaafa68cac6fbcaaba201fe7ceff7cafc63c
SHA5125a2b1ae562aa54320da4f59adbf7aee2f8136e6f436a14ec41b414f38c448ff94b27c31ef7fb2039e5004f0e3e09f1a0990b3cffc9d474f9cb7a43386395612a
-
Filesize
1.8MB
MD5fa6d16ce8d95428b4d8016eb5a497666
SHA1258f6e54ffc8ed9c8a7f24fd749700b8876fe68e
SHA2561d78d31fc4a2f38a624178de6aba3c671884012cefb492a6cafaf6c74e0e4c5d
SHA512ec671ccb40726b69802d831b6aa606148ffcd4c96f302351a720136cbe7426c56d8cc9ce94976277da14384241c14a36a1f591200240562bd586db478bd40fc6