Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 01:26
Static task
static1
General
-
Target
33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe
-
Size
7.0MB
-
MD5
c421d8aff5a33011d73da4c721e22a83
-
SHA1
94332aab52a78832cb6f818043450b96d9d5a630
-
SHA256
33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c
-
SHA512
3d4113e7b11414c00294f2fc2d6b9b25efdd59c043f9b5e27982f360fb8058f2779ab4c5ed18e98493adcbe10481db00a4c19ea26427935786e2f0aebfbd2493
-
SSDEEP
196608:oZRoaLtusdfix2FsNDMhXpb3TJ3t9Kn3+:oZRH4sdfixZOHbNZ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2960-57-0x00000000005E0000-0x0000000000A40000-memory.dmp healer behavioral1/memory/2960-58-0x00000000005E0000-0x0000000000A40000-memory.dmp healer behavioral1/memory/2960-65-0x00000000005E0000-0x0000000000A40000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4e252B.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4e252B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4e252B.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4e252B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4e252B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4e252B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4e252B.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4e252B.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4e252B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4e252B.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B00D8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2p2950.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3N94z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e252B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3N94z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B00D8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e252B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2p2950.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2p2950.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e252B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B00D8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3N94z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1B00D8.exe -
Executes dropped EXE 9 IoCs
pid Process 4820 K8c82.exe 4656 x2W75.exe 2920 1B00D8.exe 5012 skotes.exe 4764 2p2950.exe 392 3N94z.exe 2960 4e252B.exe 2420 skotes.exe 1920 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1B00D8.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2p2950.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3N94z.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4e252B.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4e252B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4e252B.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" K8c82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2W75.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2920 1B00D8.exe 5012 skotes.exe 4764 2p2950.exe 392 3N94z.exe 2960 4e252B.exe 2420 skotes.exe 1920 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B00D8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2336 392 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e252B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K8c82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2W75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B00D8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2p2950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3N94z.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3N94z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3N94z.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2920 1B00D8.exe 2920 1B00D8.exe 5012 skotes.exe 5012 skotes.exe 4764 2p2950.exe 4764 2p2950.exe 392 3N94z.exe 392 3N94z.exe 392 3N94z.exe 392 3N94z.exe 2960 4e252B.exe 2960 4e252B.exe 2960 4e252B.exe 2960 4e252B.exe 2420 skotes.exe 2420 skotes.exe 1920 skotes.exe 1920 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2960 4e252B.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 1B00D8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4820 4068 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe 83 PID 4068 wrote to memory of 4820 4068 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe 83 PID 4068 wrote to memory of 4820 4068 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe 83 PID 4820 wrote to memory of 4656 4820 K8c82.exe 84 PID 4820 wrote to memory of 4656 4820 K8c82.exe 84 PID 4820 wrote to memory of 4656 4820 K8c82.exe 84 PID 4656 wrote to memory of 2920 4656 x2W75.exe 85 PID 4656 wrote to memory of 2920 4656 x2W75.exe 85 PID 4656 wrote to memory of 2920 4656 x2W75.exe 85 PID 2920 wrote to memory of 5012 2920 1B00D8.exe 86 PID 2920 wrote to memory of 5012 2920 1B00D8.exe 86 PID 2920 wrote to memory of 5012 2920 1B00D8.exe 86 PID 4656 wrote to memory of 4764 4656 x2W75.exe 87 PID 4656 wrote to memory of 4764 4656 x2W75.exe 87 PID 4656 wrote to memory of 4764 4656 x2W75.exe 87 PID 4820 wrote to memory of 392 4820 K8c82.exe 89 PID 4820 wrote to memory of 392 4820 K8c82.exe 89 PID 4820 wrote to memory of 392 4820 K8c82.exe 89 PID 4068 wrote to memory of 2960 4068 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe 110 PID 4068 wrote to memory of 2960 4068 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe 110 PID 4068 wrote to memory of 2960 4068 33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe"C:\Users\Admin\AppData\Local\Temp\33d74d9b6a0e62163eec0f0945a4c6747de22d824bf176a15cf88d4c005e781c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K8c82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K8c82.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2W75.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2W75.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B00D8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B00D8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2p2950.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2p2950.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N94z.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N94z.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 15644⤵
- Program crash
PID:2336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e252B.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e252B.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 392 -ip 3921⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56b5c46ef101f1514c6a76c2adad390e6
SHA1a5c79ae023cef430bd2192d55a739298b637ba07
SHA2567484ef96999b317aecbf4a1a7a24e1085fedaca44e5897fca2b26f9cc84a10a9
SHA51220e7d323bef13d1c7f442196c5a5e83ec54440423ce1721f182ac4dd81ff8b481fd294cfab7a5ad288325b1f29873b02d4f567b0761ec81aff442883e0ac5320
-
Filesize
5.2MB
MD5b1e4e3faab2e7728ac25ea011a3e671e
SHA1699b6eace2178892cb1da5b9d6286e23b40bb20b
SHA256584a7387d91a2dbb02390ea4cd940dda2710a153d513ff55a54906dd978500c1
SHA5122b6098ed75949ed7dfcae346f187c9c4ed9611810c6d704b454c497ee9f4201a02abd33c39dd412a4d5ee1e83269fd11f5bd33c07caba80d97d899ba01e5680f
-
Filesize
1.7MB
MD583065aedb74a916c72a8dfdf8a5da4c5
SHA1ace88826a1d2d2ace0d01a013394dc5a719499ed
SHA2564bd09cf18bd1f5aff3545195b31ba49cceb43c47da56fbeb1f095b724f1d151d
SHA5124811027ab2d84b3bdddcedcc7a2f8e244301bfc1f588dabdd9ddd2108e4e9a1f70d309b1d57b03c467a6d4d7b0a28c3ecb52a3ee58b68365f6b4a3b985bd02f1
-
Filesize
3.4MB
MD5ea9d4f684d03201e713707f28cb5a6ce
SHA11b436dffd7f5e9f341dde6c8bcd4625336203321
SHA256ef1666f4bc8e5a9cbb94c9f60507868e9d6f068ea43f3f9c1f479d08685730b4
SHA512b0171f0f457e8b33052d3de86cb182ebeb8c82ddccc71b5dabd1934f9e994f6226e018c12dfaf02fd328e0b24a857631b058ee528820eafcc2b8bd351bd9497e
-
Filesize
3.1MB
MD52062dcdc01cc90cfb899a5edb335321c
SHA12c1e3b929b604cb5b613d21b575c1af80a257fc8
SHA25680d201f199f9369804d56514acf60612bdda4efee14e6706b82fa236e8219176
SHA51293970d655fb52aee667a27ff5e9ae107ba93df6989f3bd65dbdacc47bf11badccda70b91ec5aaac057883ee7402fd557c4bf65b4c62892e679451adcf0f0b605
-
Filesize
3.0MB
MD5365bd725085ce5884e88224f933c579c
SHA1e0873bc3b410a64eeb3606ccf024e9be52340846
SHA256ab03addde6dced8a7eddffeddcd9a0f37287806349cc3f0f974ca636728d336a
SHA5126a73b9ea144f15091751cded0be9d23f9015bb6c6eb5977689ab1a83ca0578c5e46680abd22d2c435c89be2fc1d7b5fe0f73ba20b07ef9f021aab2ffab5d8813