Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 08:24
Static task
static1
General
-
Target
55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe
-
Size
6.6MB
-
MD5
66e0895d69e826b7f8b59d6080a41b55
-
SHA1
30b0ea22ace421768639d24ad1579bb0c242cbee
-
SHA256
55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd
-
SHA512
b5cfec1de1200beb47098b9d019fa932aa60777d16b1eb4af18ba50113765365c8ae5e211094e0461829d5910890703c6258e02179e34cda19f7635773d7269a
-
SSDEEP
196608:eadU+p1Oxs4Yi9rywvFHuIAcYBxp+KBRTmAo7gg+b:dx1y9rj8dcY3p+qTqs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4460-50-0x0000000000660000-0x000000000090A000-memory.dmp healer behavioral1/memory/4460-51-0x0000000000660000-0x000000000090A000-memory.dmp healer behavioral1/memory/4460-58-0x0000000000660000-0x000000000090A000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4X647b.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4X647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4X647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4X647b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4X647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4X647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4X647b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4X647b.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4X647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4X647b.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J18r5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a1145.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3J19G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4X647b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J18r5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a1145.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4X647b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4X647b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J18r5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a1145.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3J19G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3J19G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1J18r5.exe -
Executes dropped EXE 10 IoCs
pid Process 4496 g8W81.exe 2728 J7z23.exe 5112 1J18r5.exe 2840 skotes.exe 3580 2a1145.exe 4272 3J19G.exe 4460 4X647b.exe 1716 skotes.exe 3088 skotes.exe 1444 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3J19G.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4X647b.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1J18r5.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2a1145.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4X647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4X647b.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" g8W81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" J7z23.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 5112 1J18r5.exe 2840 skotes.exe 3580 2a1145.exe 4272 3J19G.exe 4460 4X647b.exe 1716 skotes.exe 3088 skotes.exe 1444 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1J18r5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4X647b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8W81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J7z23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J18r5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3J19G.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5112 1J18r5.exe 5112 1J18r5.exe 2840 skotes.exe 2840 skotes.exe 3580 2a1145.exe 3580 2a1145.exe 4272 3J19G.exe 4272 3J19G.exe 4460 4X647b.exe 4460 4X647b.exe 4460 4X647b.exe 4460 4X647b.exe 1716 skotes.exe 1716 skotes.exe 3088 skotes.exe 3088 skotes.exe 1444 skotes.exe 1444 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 4X647b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4496 5088 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe 82 PID 5088 wrote to memory of 4496 5088 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe 82 PID 5088 wrote to memory of 4496 5088 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe 82 PID 4496 wrote to memory of 2728 4496 g8W81.exe 83 PID 4496 wrote to memory of 2728 4496 g8W81.exe 83 PID 4496 wrote to memory of 2728 4496 g8W81.exe 83 PID 2728 wrote to memory of 5112 2728 J7z23.exe 84 PID 2728 wrote to memory of 5112 2728 J7z23.exe 84 PID 2728 wrote to memory of 5112 2728 J7z23.exe 84 PID 5112 wrote to memory of 2840 5112 1J18r5.exe 85 PID 5112 wrote to memory of 2840 5112 1J18r5.exe 85 PID 5112 wrote to memory of 2840 5112 1J18r5.exe 85 PID 2728 wrote to memory of 3580 2728 J7z23.exe 86 PID 2728 wrote to memory of 3580 2728 J7z23.exe 86 PID 2728 wrote to memory of 3580 2728 J7z23.exe 86 PID 4496 wrote to memory of 4272 4496 g8W81.exe 87 PID 4496 wrote to memory of 4272 4496 g8W81.exe 87 PID 4496 wrote to memory of 4272 4496 g8W81.exe 87 PID 5088 wrote to memory of 4460 5088 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe 90 PID 5088 wrote to memory of 4460 5088 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe 90 PID 5088 wrote to memory of 4460 5088 55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe"C:\Users\Admin\AppData\Local\Temp\55f05f5a711492e5ed85db47517d41d8c80e829ceae328922da423713275acbd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8W81.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8W81.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\J7z23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\J7z23.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J18r5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J18r5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a1145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a1145.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J19G.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J19G.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X647b.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X647b.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a39f6f4b20f97ff659f7e6af48dab180
SHA148f6d669e91861e020f7680eadb9b073c7d3b056
SHA2566ab2827528efa430431e065b2f7973549d3787b027c859679f789aacac8914bf
SHA512a560f2c4f9153f63df8da04a7187da713c739c42cb18f3a9885f61be793cd2f9babc07a5cd575e71ef13104f8567ce60c4602a95f0ae118cb396acdcb1abdf1a
-
Filesize
5.1MB
MD5c36c379fcfcafb9b291997577ff56023
SHA18a6c318f7b2a3134b8941bdd48ffac82eb5f552b
SHA2566189e9f83a2926f7b3bfc3e64c8384d58950ca927c095af0b194490a565bd8a0
SHA5125e5c31452aa33c5282e87eddf1f3ea326144e3079198089768d4cd6a178093d9f5451eed8b2025ec13080aee8391ae3ff22016e26b99321e5c78e5bf0b1add38
-
Filesize
4.9MB
MD548575481fb3b42ee40e6e2076c17428b
SHA1d5fca3c02ab4c0ae6d6a2701008fdeb4f5bb78e0
SHA256f6ba046ab0fe30b63d4aad134e666f63130d4adf2782a48bdfb904e3a6eef643
SHA512131c00189e25ad2bb8b096df865352e3a94d71ff84e5fffdcdaa1a7413e9bdb5f6b9f30567a9a200dc942a93ac06f72c8480189f86ae2b5b2b57e24287b355e6
-
Filesize
3.4MB
MD5633e115e3677466a7b90dff179825801
SHA16662c6fa1d4f2b957efe41b5dfabb7e782e545d1
SHA256332c774a9592f184e62fdcfa32b616e82b0917dc7abe0aee244e2852a33d6387
SHA51225ee05d651effb23d56a8facacb654d09be14aef9e82da57d948e94cc8dce9dd37eb61e50b9152d1541beea194b9c2770d80727446ba2d3e52a45ba004a02759
-
Filesize
3.1MB
MD53fb49282f1c411d2d84177bacf897e08
SHA197d9a1e8ccb78640a74824e1e3172b9a45626552
SHA2567b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6
SHA512bf9d31d629836445a12c8b5d6869950ac0e6b6bdec505ad28d08721fc48ad89728bd84961e6a4625ac2c57f707665c58d3e11e066067d4104b78fa5884067e61
-
Filesize
3.0MB
MD55e7e3e29c13e09f9b922a4c1645d0443
SHA1297c4e046d91255a9e234343cfb5c04ebcfd6bcf
SHA256bcaefd18ac6d92d6e59863fdc1761fccb259c0790d082d6fa42d468ff08d28c3
SHA51245c2b14005c1849ebf3164043c56ca8b0c2919c664830aeb9412f205cddb73b3bd434113264d954265e099fef7b34daace0aabdc9dbfbd217999cfca69de8914