Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 09:50
Static task
static1
General
-
Target
9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe
-
Size
6.8MB
-
MD5
0c2e9c4df198147c1a6c18702c766c13
-
SHA1
6f6f7c12603479ed116083c964a02df224f5b60d
-
SHA256
9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610
-
SHA512
d4b87bc33c73964bffef84a89a8945f9799262e215fb2938f16bd44f0fff2c2f4e7c9e13cc6e9f169437c4f77f0c9e54e349939908d8e5e197413f4c2488eccc
-
SSDEEP
98304:bjlCzhG2uwbBpbwMkCCMjGQPHLBhvNDbrhlgZmq7Faau019szmKGNmFjTSg+C0BN:N2Y2R1pbwMk6GQPBfvca81SCUjB+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/756-57-0x0000000000770000-0x0000000000A2E000-memory.dmp healer behavioral1/memory/756-58-0x0000000000770000-0x0000000000A2E000-memory.dmp healer behavioral1/memory/756-66-0x0000000000770000-0x0000000000A2E000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4R586o.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4R586o.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4R586o.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4R586o.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3X60G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4R586o.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1N25c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2N4137.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2N4137.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4R586o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4R586o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1N25c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3X60G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1N25c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2N4137.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3X60G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1N25c2.exe -
Executes dropped EXE 9 IoCs
pid Process 664 c2s22.exe 3436 j0B47.exe 1740 1N25c2.exe 1908 skotes.exe 3156 2N4137.exe 5076 3X60G.exe 756 4R586o.exe 2056 skotes.exe 1808 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2N4137.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3X60G.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4R586o.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1N25c2.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4R586o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4R586o.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" j0B47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" c2s22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1740 1N25c2.exe 1908 skotes.exe 3156 2N4137.exe 5076 3X60G.exe 756 4R586o.exe 2056 skotes.exe 1808 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1N25c2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5112 5076 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1N25c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2N4137.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3X60G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4R586o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2s22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j0B47.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3X60G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3X60G.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1740 1N25c2.exe 1740 1N25c2.exe 1908 skotes.exe 1908 skotes.exe 3156 2N4137.exe 3156 2N4137.exe 5076 3X60G.exe 5076 3X60G.exe 5076 3X60G.exe 5076 3X60G.exe 756 4R586o.exe 756 4R586o.exe 756 4R586o.exe 756 4R586o.exe 2056 skotes.exe 2056 skotes.exe 1808 skotes.exe 1808 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 756 4R586o.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 1N25c2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 448 wrote to memory of 664 448 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe 84 PID 448 wrote to memory of 664 448 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe 84 PID 448 wrote to memory of 664 448 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe 84 PID 664 wrote to memory of 3436 664 c2s22.exe 85 PID 664 wrote to memory of 3436 664 c2s22.exe 85 PID 664 wrote to memory of 3436 664 c2s22.exe 85 PID 3436 wrote to memory of 1740 3436 j0B47.exe 86 PID 3436 wrote to memory of 1740 3436 j0B47.exe 86 PID 3436 wrote to memory of 1740 3436 j0B47.exe 86 PID 1740 wrote to memory of 1908 1740 1N25c2.exe 87 PID 1740 wrote to memory of 1908 1740 1N25c2.exe 87 PID 1740 wrote to memory of 1908 1740 1N25c2.exe 87 PID 3436 wrote to memory of 3156 3436 j0B47.exe 88 PID 3436 wrote to memory of 3156 3436 j0B47.exe 88 PID 3436 wrote to memory of 3156 3436 j0B47.exe 88 PID 664 wrote to memory of 5076 664 c2s22.exe 90 PID 664 wrote to memory of 5076 664 c2s22.exe 90 PID 664 wrote to memory of 5076 664 c2s22.exe 90 PID 448 wrote to memory of 756 448 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe 109 PID 448 wrote to memory of 756 448 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe 109 PID 448 wrote to memory of 756 448 9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe"C:\Users\Admin\AppData\Local\Temp\9d892990e6a65928dba3e790f3f9ad7e10d425c561c5ef9c6cbf410f47ce3610.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c2s22.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c2s22.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0B47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0B47.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N25c2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N25c2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2N4137.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2N4137.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X60G.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X60G.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 15444⤵
- Program crash
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R586o.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R586o.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5076 -ip 50761⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD53160e4f39b2c1a0a7249f31af7150988
SHA1b6ea8ac3caae9bf6c985abdccf9871f9b5fdb41d
SHA25628d12c9dc46ffd71a54496fc689d808aa0dc1e7ba52fa213b2dc73f2a1f644eb
SHA512b726b074b8148e880b0e7487917a033ea77b99314c3fa4d6214c1f565a73e70b276ef3b40f68b24be3d267c2fa63240587823e4dca187cf92ad169cb86d1de25
-
Filesize
5.2MB
MD5f8469f250916868ccd1ca305996c7c05
SHA1494b99569976e70bf3d4247759495c9372b5cbb4
SHA256f11d310fee7ba05f105ce3fa550c99c4ac832555bf34d8f9d619c1641f35652c
SHA512f96c0870ad89ee6c12bcec56d03a1051ba4b5ab502cef4236eb67dfd06a26ef929523b4134f4f29616474ac1d86d97a50de84406d9e3d5606cad2aecaf9071f2
-
Filesize
1.7MB
MD50b11da9f066fe2274bb6279b16d670bf
SHA12a767706454bf4770c369233415a8285864c400d
SHA256a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69
SHA512fcd421e8c944219d05791c945eca8f5ebde003f12360ad8cb3f0bbe200a586f380725076925833e2b90201c069cae400898818fc2c3f620d60e3dd234a36ef55
-
Filesize
3.4MB
MD51ef13c1d9e0cf280641fdcc643046c2d
SHA16e70228f9dce23226e6f5273e250ff159437effa
SHA256bad730256bf37f38eb4da71988348a1e8c052539e8f1969240040d24f6da04be
SHA512c764e44d4f2b33eeb5802ba1472377c1d19655c9bb578c6387912b0dc4bcce844cb1386d14406030c09aec26b3cad3d7769361cce8ec72e2caf8453e2a4b290a
-
Filesize
3.1MB
MD5ae79503bebe569117982e95d21fae5bc
SHA1c27bb08d93bb158ec3927d56218f177106bce996
SHA256d3a9b5f9e9852ea879639de743f6850609b39960cc94e5284fbea1e24d4cdf9f
SHA512fdc606dc268a880c74aa7bce87e95eb847f46c1a620c9573f771bd5ea83600f149e322d32985662bbc3f7d71466cdf946177edb02f936ffe212a75622a61e568
-
Filesize
2.9MB
MD5be767bbecfa446f9dfc0b373bc6527c3
SHA166fcd30d68f57e73ea4c0926fcf4b707bb9e95dd
SHA256553d5918141cb4da62a80742d6d36d5f0eb0254ecb8e94cd898c99211c1b85c0
SHA512572b8f8926bca41655e11a24c49edc8e88f6f71ba89764c6a43b5adbc6f2cab27e80524dc7ebe6c17129db3d09d15d5826dd8c247844f6fb07ffa8a300285765