Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 06:21
Static task
static1
General
-
Target
1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe
-
Size
6.6MB
-
MD5
8eba795bba6c6402e0f7c3feb92605f5
-
SHA1
75558db3e769fc2417cbd5103a1ffd886f44f5ad
-
SHA256
1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d
-
SHA512
1e6b39e4ff5be87336f0d74e629f0b88567563d5e784683636fdc4f1044efe94a57fb5d17bc13d681e0f4553a2583b0660516a26a669748482add5502c4669a3
-
SSDEEP
196608:KRXi3qJBtrQnqd7oMeh+3B58NUKNc2ag04/j2:ki32JdLK+R58yKGsy
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3280-50-0x00000000007E0000-0x0000000000A96000-memory.dmp healer behavioral1/memory/3280-51-0x00000000007E0000-0x0000000000A96000-memory.dmp healer behavioral1/memory/3280-58-0x00000000007E0000-0x0000000000A96000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4h588O.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4h588O.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4h588O.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4h588O.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4h588O.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4h588O.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4h588O.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4h588O.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4h588O.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4h588O.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B03R6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2j2462.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3L25W.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4h588O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2j2462.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4h588O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3L25W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B03R6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4h588O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B03R6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2j2462.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3L25W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1B03R6.exe -
Executes dropped EXE 9 IoCs
pid Process 2056 c5p61.exe 4864 O5c50.exe 4548 1B03R6.exe 964 skotes.exe 2872 2j2462.exe 3920 3L25W.exe 3280 4h588O.exe 680 skotes.exe 3540 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1B03R6.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2j2462.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3L25W.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4h588O.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4h588O.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4h588O.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" c5p61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" O5c50.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4548 1B03R6.exe 964 skotes.exe 2872 2j2462.exe 3920 3L25W.exe 3280 4h588O.exe 680 skotes.exe 3540 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B03R6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5p61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O5c50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B03R6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2j2462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3L25W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4h588O.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4548 1B03R6.exe 4548 1B03R6.exe 964 skotes.exe 964 skotes.exe 2872 2j2462.exe 2872 2j2462.exe 3920 3L25W.exe 3920 3L25W.exe 3280 4h588O.exe 3280 4h588O.exe 3280 4h588O.exe 3280 4h588O.exe 680 skotes.exe 680 skotes.exe 3540 skotes.exe 3540 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3280 4h588O.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4548 1B03R6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2056 1440 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe 85 PID 1440 wrote to memory of 2056 1440 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe 85 PID 1440 wrote to memory of 2056 1440 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe 85 PID 2056 wrote to memory of 4864 2056 c5p61.exe 86 PID 2056 wrote to memory of 4864 2056 c5p61.exe 86 PID 2056 wrote to memory of 4864 2056 c5p61.exe 86 PID 4864 wrote to memory of 4548 4864 O5c50.exe 87 PID 4864 wrote to memory of 4548 4864 O5c50.exe 87 PID 4864 wrote to memory of 4548 4864 O5c50.exe 87 PID 4548 wrote to memory of 964 4548 1B03R6.exe 88 PID 4548 wrote to memory of 964 4548 1B03R6.exe 88 PID 4548 wrote to memory of 964 4548 1B03R6.exe 88 PID 4864 wrote to memory of 2872 4864 O5c50.exe 89 PID 4864 wrote to memory of 2872 4864 O5c50.exe 89 PID 4864 wrote to memory of 2872 4864 O5c50.exe 89 PID 2056 wrote to memory of 3920 2056 c5p61.exe 91 PID 2056 wrote to memory of 3920 2056 c5p61.exe 91 PID 2056 wrote to memory of 3920 2056 c5p61.exe 91 PID 1440 wrote to memory of 3280 1440 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe 92 PID 1440 wrote to memory of 3280 1440 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe 92 PID 1440 wrote to memory of 3280 1440 1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe"C:\Users\Admin\AppData\Local\Temp\1cb1cdf5450eb35c00055e3eb53e138621baabddd7f7ad553710b997d469327d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5p61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5p61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O5c50.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O5c50.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B03R6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B03R6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j2462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j2462.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3L25W.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3L25W.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4h588O.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4h588O.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:680
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3540
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD504f07c25f3855110a24d43a833839a1a
SHA18d56ba5b4912214977600285c04949ea36dcd13e
SHA256a6ad5817502c76e0f7cbfac65972f8a29b37db25c706858396c5e8a90fdd456c
SHA512171b0544a757ff395623088260df7116afecf770ed15705f210038c611478dde74a64d9650018d8f5adaeaf4bf289430ce8946df4139485aeec8b876976c6d3a
-
Filesize
5.0MB
MD556d5034564c6cb75fc8326d792b05acb
SHA1e2445d0754f09945b1d2a8b14f4ed45a26f5fc3c
SHA256f5a31e0ae5b70c3dfc0996743a70e97f5136f580de88c45c408ff54d08a1845a
SHA5120698dcd6b26bbaf1650714ec0743f1151c637fcd0333fadedc4e94bef1dfa41cb61c8496d12276615d2141e0da21c4ab7913d90de418e2ecb585f72ab16a0af3
-
Filesize
5.0MB
MD54c44fd974b119681f69872a1483b411b
SHA1c3a8e48524af6b4d9732b0f778408d2e2b1e4dd5
SHA256605d8ff14cbc4fd21c860371f046c9812414b41ca0beec6ed9fc294000fbd4a8
SHA512af515feb1e4bab390a7225c5fcf97a4ecc17835d0abafcd617aab157c023fe4cfbb6f7b982eb170749a003024a43c81d1f543a317d11c7af5e8a081fc63a2f95
-
Filesize
3.4MB
MD5f5a58d674c450a0222c1a37af2636ce4
SHA1852c4f09a3be69dfa1347db72f758f8a2b4fcab6
SHA256f42a7f7680cabc6860ac2ea42c151443cc3e44366ea09c3e67f0250f0bef1997
SHA5120b7988a523c3a649682654305602b488aa2182ba017b5e6138acf35689bd5aa6f5d993edb6c5a4fa46de86285e03be1d83c06df07a2362a0a76e3e21a24c256e
-
Filesize
3.1MB
MD56ed7c63b12a31a727ceebcad2f1580bf
SHA1c3b0c3ba3cbb82dd2e9b663259ad278ede87f00a
SHA256664f92d46e2e1eb31e5c7c73427f500ee44da3897d5ac032f5d23c29aaac1cbe
SHA51220a507e69f31ec996919e0058631a5bffa548b5dce72700b543df9d546115bc4f6f70252ffab5d25d15520547ef21ebda325ca272fbc8b91cdfb9ca0061fc6e1
-
Filesize
3.0MB
MD54019b15117c0d2a95ac4dc75b187f264
SHA196d201c4fc4824a1d7fa80027dc3ee1fc5156fc7
SHA256476d846d3750d90fa5d1e70a2e1b422c662437159fd2316a34fa58e802f4d847
SHA5128fbe8acd07c25489e00958039a97945fff6fb7aae11cd56414d41c909e29fcb4487aae36afbf2cdd943e92949861d23399ba5e3800d8b4931f9cf9a565ac2e25