Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 00:39
Static task
static1
General
-
Target
8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe
-
Size
7.0MB
-
MD5
b3de44608133aae76040013a1ab7d076
-
SHA1
54bf1a264064a07d6708649c4e00c62ad6a787b4
-
SHA256
8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723
-
SHA512
8fd858e421e8353cd466732cbcc6c726f9982703bace226bb976cbafafdf89bf517aeb19636256b16352243af18aeb2a5e7cda063cddd2fc99101e72cfcf4aa9
-
SSDEEP
196608:AxhnvcWlXjv4vDu1hP3M/0SE5UVl/7xKkaBiL1/qaD:ATlXjv4vD8d3M/7iY7xKkGYBxD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5016-55-0x00000000001E0000-0x0000000000636000-memory.dmp healer behavioral1/memory/5016-56-0x00000000001E0000-0x0000000000636000-memory.dmp healer behavioral1/memory/5016-64-0x00000000001E0000-0x0000000000636000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4l009G.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4l009G.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4l009G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4l009G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4l009G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4l009G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4l009G.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4l009G.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4l009G.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4l009G.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2y9871.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3z05r.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4l009G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1E05d9.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1E05d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2y9871.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2y9871.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4l009G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4l009G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1E05d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3z05r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3z05r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1E05d9.exe -
Executes dropped EXE 9 IoCs
pid Process 4796 D2A14.exe 2276 A7c05.exe 4032 1E05d9.exe 404 skotes.exe 1444 2y9871.exe 4144 3z05r.exe 5016 4l009G.exe 3260 skotes.exe 3396 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1E05d9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2y9871.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3z05r.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4l009G.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4l009G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4l009G.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" D2A14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" A7c05.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4032 1E05d9.exe 404 skotes.exe 1444 2y9871.exe 4144 3z05r.exe 5016 4l009G.exe 3260 skotes.exe 3396 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1E05d9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1740 4144 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2y9871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3z05r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4l009G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D2A14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A7c05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1E05d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3z05r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3z05r.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4032 1E05d9.exe 4032 1E05d9.exe 404 skotes.exe 404 skotes.exe 1444 2y9871.exe 1444 2y9871.exe 4144 3z05r.exe 4144 3z05r.exe 4144 3z05r.exe 4144 3z05r.exe 5016 4l009G.exe 5016 4l009G.exe 5016 4l009G.exe 5016 4l009G.exe 3260 skotes.exe 3260 skotes.exe 3396 skotes.exe 3396 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5016 4l009G.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4032 1E05d9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4796 2000 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe 83 PID 2000 wrote to memory of 4796 2000 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe 83 PID 2000 wrote to memory of 4796 2000 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe 83 PID 4796 wrote to memory of 2276 4796 D2A14.exe 84 PID 4796 wrote to memory of 2276 4796 D2A14.exe 84 PID 4796 wrote to memory of 2276 4796 D2A14.exe 84 PID 2276 wrote to memory of 4032 2276 A7c05.exe 85 PID 2276 wrote to memory of 4032 2276 A7c05.exe 85 PID 2276 wrote to memory of 4032 2276 A7c05.exe 85 PID 4032 wrote to memory of 404 4032 1E05d9.exe 86 PID 4032 wrote to memory of 404 4032 1E05d9.exe 86 PID 4032 wrote to memory of 404 4032 1E05d9.exe 86 PID 2276 wrote to memory of 1444 2276 A7c05.exe 87 PID 2276 wrote to memory of 1444 2276 A7c05.exe 87 PID 2276 wrote to memory of 1444 2276 A7c05.exe 87 PID 4796 wrote to memory of 4144 4796 D2A14.exe 89 PID 4796 wrote to memory of 4144 4796 D2A14.exe 89 PID 4796 wrote to memory of 4144 4796 D2A14.exe 89 PID 2000 wrote to memory of 5016 2000 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe 109 PID 2000 wrote to memory of 5016 2000 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe 109 PID 2000 wrote to memory of 5016 2000 8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe"C:\Users\Admin\AppData\Local\Temp\8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D2A14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D2A14.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7c05.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7c05.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05d9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05d9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y9871.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y9871.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z05r.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z05r.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 15524⤵
- Program crash
PID:1740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4l009G.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4l009G.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4144 -ip 41441⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3396
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD55b6fbe93e4551c6d85847ed01a027ecb
SHA119619b28057c4cbeef3ddc3945a66e02f4f5782d
SHA256c6a39ac6f40d876507ef829c2d083be996f6ecb9b3b121e8ed341e5893c22150
SHA51215b3c3d5d5749612a0773a23bd15457ab15ab04ce8830a48c7a03347fa21ca19b797da583e36a1b5efaad91a215c3d3fba83c9f96f918279f583424fefd4a954
-
Filesize
5.2MB
MD5e7e2ed1422fcb6adbbb7e318a69a91f8
SHA196bafbee3b2316efe91e25d9c28df78536385bc5
SHA256c9e3b26c3fccc20b2601256f6eff29796dc994af04ca19f4ef1ed0dd2eb33c96
SHA512a15cac78d2e279539c857dc2b988ffeaaef841e28538922293497233ec1306cb8d60387987e7db4fda1c82994f837ae0595e4843a36a5de3ef96631729167804
-
Filesize
1.7MB
MD57556cfc61d6c9b652ab946e86254b8b9
SHA1a73c8c885d2b10be4b534b2f79a46665b421d0ac
SHA25655cfd403887d49db21b5f57811385ee6aad3cb227dffa94a09e562e245ec299d
SHA512cf16e89abb9f0ffba94dc5c203847cae4f2189c7a52fa1b0f20ab06819a401ba9105b2aaed6025677453da092b0fd14253ad34fa469a762f12a6f0c07dfe226f
-
Filesize
3.4MB
MD5967d51163bf0c8673cb8842cf8312524
SHA1ba46d25946b63b67a79f3528b62103dfee6743cc
SHA2567f903015cae036887bd730dd607f18dfd036eac89c0298fd33aad664d330496a
SHA5126101c664cc7f0217cf7c5e17db3b503d01741cfbcfd53217d336385b309f8b9cf0dd5d22f16b1aee548f90ad8f9d22cb581eeda380ab43559661d91721d1d108
-
Filesize
3.1MB
MD50fbe9ba291837e4e16ff3b5c49444680
SHA15c6b98943bd8b2328d219e8967204537db0e4c6c
SHA2565bd061d7524a1455cc126fa5614fdcbce711416c7c896ad0939979c59e5dcef0
SHA5123483533c13c8b594035f4cd5a0728d4a7b88fd2958fca666f0a5c381fea4fd44808b5b5f16411675f6b3dbd8ec709c6b9cd9be00a5879df3e3746adf268b9bcd
-
Filesize
3.0MB
MD57c11f700ed5f7a6d1e4d55c13486b680
SHA1a1399a616b8b5ab8cdeca1ea513bf803132c1702
SHA25627f4e39190071ee72ef6cc3a17a08b587e457bb8039f0e043a3ff071e7509a19
SHA51250b6b74616ce5017c7574d0f576dcb5ebaa3d5488635fb7141bca645dc317de310ffc87f9c7c4e905bc14131cf1208b28929db977381457aa59f8538cdf7d297