Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 14:20
Static task
static1
General
-
Target
same.exe
-
Size
6.6MB
-
MD5
8fee55294b6ce710ba882421a1e282a1
-
SHA1
f1da859228b828a84984afbe1777840aa520f4d6
-
SHA256
644f889c72e122951a1aa1961f390fed9eb1fcbf2fee43f67b7151c411da6b13
-
SHA512
5c2f768d58978ef5798c64e00a3ab130b04a3922a1f90dc85d71a7da3cb492076208e65dc7add0de7ba4d7f9a96a8a4e6df21453cdbf4e44946d6ad6e312f156
-
SSDEEP
98304:Ews34wkL3ZF2eHZz14dNtDoyVMbFRUHkWaAm11FjCyhWpypQCJSBRmecn4jMlmj7:oo3z14droyqFuE/h1yy16FzjMlsIC9J
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4O211C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4O211C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4O211C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4O211C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4O211C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4O211C.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z8320.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3r66R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4O211C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1C05b9.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4O211C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z8320.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z8320.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3r66R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4O211C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1C05b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3r66R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1C05b9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1C05b9.exe -
Executes dropped EXE 9 IoCs
pid Process 1092 N4H84.exe 8 h0i46.exe 532 1C05b9.exe 3524 skotes.exe 4940 2z8320.exe 4888 3r66R.exe 3396 4O211C.exe 3672 skotes.exe 3092 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3r66R.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4O211C.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1C05b9.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2z8320.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4O211C.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4O211C.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" same.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" N4H84.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" h0i46.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 532 1C05b9.exe 3524 skotes.exe 4940 2z8320.exe 4888 3r66R.exe 3396 4O211C.exe 3672 skotes.exe 3092 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1C05b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4676 4888 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language same.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N4H84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h0i46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C05b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z8320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3r66R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4O211C.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3r66R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3r66R.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 532 1C05b9.exe 532 1C05b9.exe 3524 skotes.exe 3524 skotes.exe 4940 2z8320.exe 4940 2z8320.exe 4888 3r66R.exe 4888 3r66R.exe 4888 3r66R.exe 4888 3r66R.exe 3396 4O211C.exe 3396 4O211C.exe 3396 4O211C.exe 3396 4O211C.exe 3672 skotes.exe 3672 skotes.exe 3092 skotes.exe 3092 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3396 4O211C.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1092 1860 same.exe 82 PID 1860 wrote to memory of 1092 1860 same.exe 82 PID 1860 wrote to memory of 1092 1860 same.exe 82 PID 1092 wrote to memory of 8 1092 N4H84.exe 83 PID 1092 wrote to memory of 8 1092 N4H84.exe 83 PID 1092 wrote to memory of 8 1092 N4H84.exe 83 PID 8 wrote to memory of 532 8 h0i46.exe 84 PID 8 wrote to memory of 532 8 h0i46.exe 84 PID 8 wrote to memory of 532 8 h0i46.exe 84 PID 532 wrote to memory of 3524 532 1C05b9.exe 85 PID 532 wrote to memory of 3524 532 1C05b9.exe 85 PID 532 wrote to memory of 3524 532 1C05b9.exe 85 PID 8 wrote to memory of 4940 8 h0i46.exe 86 PID 8 wrote to memory of 4940 8 h0i46.exe 86 PID 8 wrote to memory of 4940 8 h0i46.exe 86 PID 1092 wrote to memory of 4888 1092 N4H84.exe 87 PID 1092 wrote to memory of 4888 1092 N4H84.exe 87 PID 1092 wrote to memory of 4888 1092 N4H84.exe 87 PID 1860 wrote to memory of 3396 1860 same.exe 100 PID 1860 wrote to memory of 3396 1860 same.exe 100 PID 1860 wrote to memory of 3396 1860 same.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\same.exe"C:\Users\Admin\AppData\Local\Temp\same.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N4H84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N4H84.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0i46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0i46.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C05b9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1C05b9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z8320.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z8320.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r66R.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r66R.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 15524⤵
- Program crash
PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O211C.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O211C.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4888 -ip 48881⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5c96f81336ad8bdaae4add552570d9018
SHA157a1520f41dbea5bd734426b97a85306157f98a6
SHA256569cb514f2b13dbea223f2df9fea9cf8c8a66f36d292bb579de772b2473d7c7d
SHA51232b041bc79e0511141bb56d25e1eec60e90f27b029716982786d38f1edeb7c96797beec6e293c593f2239a1069c1fd72bc0ff090f82130fa360ff0c0d7875401
-
Filesize
5.0MB
MD59b6914ff1d91d65e66ec864964314b91
SHA1c5890c76edb0e78621690fe4098bba3f34db6ae4
SHA25606eddfc02d306f8344356ff875c2b00ca03636ed24018fb686fe3d2835056bab
SHA512a79df7ce0b8d9d59640383e89d157d4427a4555e5dfa6239c4162f2b75b72322a7744c9479d55fe795f1deb8edc1411697beec267d7616ac3ee096c9371700f4
-
Filesize
5.0MB
MD5d9b9048bf135f96587b038a1aaf7fd9b
SHA1ffa7af429d9604901bc922c6a82aee6e311c41bf
SHA256d3f6e303233aa32d6db0a98e15b12c7479e851161e47d6beba528d2f28ad61bd
SHA512cace6a2f815bf7298f7685219fa291e5ca77b7a5ab6334903ef7aa10715d886651c39614faa37a1a54b21de29401f676969ac341ed8c08183b0af29022a7b84d
-
Filesize
3.4MB
MD581771dd2b9318acb04b8f1377c88f23a
SHA199b390487002e82317c54fed378e78ef7ed9bc99
SHA256e34841fafb31702bea1dbe3ed2e7789cd70cb55705dd573e26a88101744ac534
SHA512310ba7137040122588e00259288b70b334eb6e3c8f26f6f870e0d36b2242aa365d392819e4c0f3a4a701e959011bc7974259c0c32ebe134aab996f3f51d35736
-
Filesize
3.0MB
MD5c10552e6670650e273e4d8688d186e30
SHA1b11338aff97507be3268bd2eb1fc5a67bda0f4b5
SHA256d8ad2634c0f1e99dcd5d0db58a57810ed39bdf5f68e3e8a4fddd6727b66ccae4
SHA512e864bd3104b8fb2568094425310d41129eaa725da3379251fb1599027fee9bf60c054a26865cc4fed7fba4c9948d2e38aaf11697b7ad198018959460cc422ee0
-
Filesize
3.0MB
MD546b9970ed9e0b2f9ea3daa8d0bafd525
SHA1a205ec1a757a4c4885c506e82e5a7d559aa301d2
SHA25669ebe455f76af6a8611d7097b240574865458d9de0aeddcc94935958f65334ba
SHA512acf910b3dafd75c5bde0fe19b9f45392915e63679f26119ac6b38015c31e3a0263244caf587c60401dddc6f55d237bcb624de7409b743c84b17b2ab6f037050b