Resubmissions
15/02/2025, 17:38
250215-v7s4wavqer 915/02/2025, 16:59
250215-vhpedsvlbs 1015/02/2025, 16:37
250215-t447astqav 10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15/02/2025, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
8ZSZQ_random.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral2
Sample
8ZSZQ_random.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral3
Sample
8ZSZQ_random.exe
Resource
win11-20250210-en
Behavioral task
behavioral4
Sample
8ZSZQ_random.exe
Resource
win7-20250207-en
Behavioral task
behavioral5
Sample
8ZSZQ_random.exe
Resource
macos-20241106-en
General
-
Target
8ZSZQ_random.exe
-
Size
1.8MB
-
MD5
411303148c2c132ec3b30a97c1936cf9
-
SHA1
9693f9e29924d1bbb1bf87f10707c74d1df7e996
-
SHA256
dc9c553a3ff7574b1007f70a911f10ca22590a7661dfb84a25c5009d1b564fbb
-
SHA512
f27dce51cbed73bb3f1b8fb977d3168f5778bab24b4c762f16333adfb9d93ce1b476a3277d994ee429781919385846c68c618c5d72b38ca6a7bc82f9c658dbdd
-
SSDEEP
24576:5oplyMtRrcEVZQuiws76pon4/JaaT2cEMeUkt2BgHTczSS/yyvX6em4yWgw:5opPR5ZQuiws76p/iSiAllyyvdm4I
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8ZSZQ_random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13V13Y5H3VVVP0265R7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H8G4YEAG651N5OWG.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 25 2608 8ZSZQ_random.exe 38 2920 Process not Found 42 4720 skotes.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13V13Y5H3VVVP0265R7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13V13Y5H3VVVP0265R7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H8G4YEAG651N5OWG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H8G4YEAG651N5OWG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8ZSZQ_random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8ZSZQ_random.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Control Panel\International\Geo\Nation H8G4YEAG651N5OWG.exe -
Executes dropped EXE 7 IoCs
pid Process 4652 13V13Y5H3VVVP0265R7.exe 1216 H8G4YEAG651N5OWG.exe 4720 skotes.exe 1428 skotes.exe 924 bbb330fb1e.exe 4436 bbb330fb1e.exe 220 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Software\Wine 8ZSZQ_random.exe Key opened \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Software\Wine 13V13Y5H3VVVP0265R7.exe Key opened \REGISTRY\USER\S-1-5-21-456577188-2570430586-3070635863-1000\Software\Wine H8G4YEAG651N5OWG.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2608 8ZSZQ_random.exe 4652 13V13Y5H3VVVP0265R7.exe 1216 H8G4YEAG651N5OWG.exe 4720 skotes.exe 1428 skotes.exe 220 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 924 set thread context of 4436 924 bbb330fb1e.exe 95 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job H8G4YEAG651N5OWG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2868 924 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13V13Y5H3VVVP0265R7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H8G4YEAG651N5OWG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbb330fb1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbb330fb1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ZSZQ_random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2956 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2608 8ZSZQ_random.exe 2608 8ZSZQ_random.exe 2608 8ZSZQ_random.exe 2608 8ZSZQ_random.exe 2608 8ZSZQ_random.exe 2608 8ZSZQ_random.exe 4652 13V13Y5H3VVVP0265R7.exe 4652 13V13Y5H3VVVP0265R7.exe 1216 H8G4YEAG651N5OWG.exe 1216 H8G4YEAG651N5OWG.exe 4720 skotes.exe 4720 skotes.exe 1428 skotes.exe 1428 skotes.exe 220 skotes.exe 220 skotes.exe 4436 bbb330fb1e.exe 4436 bbb330fb1e.exe 4436 bbb330fb1e.exe 4436 bbb330fb1e.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2608 wrote to memory of 4652 2608 8ZSZQ_random.exe 89 PID 2608 wrote to memory of 4652 2608 8ZSZQ_random.exe 89 PID 2608 wrote to memory of 4652 2608 8ZSZQ_random.exe 89 PID 2608 wrote to memory of 1216 2608 8ZSZQ_random.exe 91 PID 2608 wrote to memory of 1216 2608 8ZSZQ_random.exe 91 PID 2608 wrote to memory of 1216 2608 8ZSZQ_random.exe 91 PID 1216 wrote to memory of 4720 1216 H8G4YEAG651N5OWG.exe 92 PID 1216 wrote to memory of 4720 1216 H8G4YEAG651N5OWG.exe 92 PID 1216 wrote to memory of 4720 1216 H8G4YEAG651N5OWG.exe 92 PID 4720 wrote to memory of 924 4720 skotes.exe 94 PID 4720 wrote to memory of 924 4720 skotes.exe 94 PID 4720 wrote to memory of 924 4720 skotes.exe 94 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95 PID 924 wrote to memory of 4436 924 bbb330fb1e.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ZSZQ_random.exe"C:\Users\Admin\AppData\Local\Temp\8ZSZQ_random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\13V13Y5H3VVVP0265R7.exe"C:\Users\Admin\AppData\Local\Temp\13V13Y5H3VVVP0265R7.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\H8G4YEAG651N5OWG.exe"C:\Users\Admin\AppData\Local\Temp\H8G4YEAG651N5OWG.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\1014060001\bbb330fb1e.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\bbb330fb1e.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\1014060001\bbb330fb1e.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\bbb330fb1e.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 8245⤵
- Program crash
PID:2868
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2956
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 924 -ip 9241⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:220
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD51a119b286d5616df4441a9c746c0214d
SHA1c6f4ea62a0cfabe904b8800da19521f0d551af0a
SHA256268ab7cd89f77eb147718766428f4ea5dd4e54af254fd9b8892e95a0c5d9597f
SHA512491c6d617ced73a7458ad01354e201285cac660f750ea9ef16eb289eae39e778462139651751e606afca3d6b531b0ba5853d82f5af9fd49f119fa3d8f59ae5ee
-
Filesize
1.7MB
MD5d3e074bca12877821e2a4faaa7e24c1c
SHA1a8657111112a69501c5272b1332f808df6003a0f
SHA2565d7c92da666f854348665f2768b79343e6a93d84212f65e845721af04838b7b8
SHA5120605ee1dcc030b01f95e8f72496082f1a3fd9019a7caba83124f80cc8d399268a25bea4e4c54c962d96cbd798b30549bc5be09b4eeb544ee6d6f1c2fc49ed1fd
-
Filesize
2.1MB
MD5569e59d6838517ef40ad5d42d5ffe3ab
SHA106e6b6e5fa09611b56aa56bc81173cfcbd138640
SHA256772137b7c1ca4002181b9252143c9793c9f45c0935564a75d44fbc6d2aa33d30
SHA5121ac54228ffa2a71de44dba4e68b24426db3c17a09140fd441be8be92c7f5758fc46bb7f0e9501019efce68e3a745eece7da4284c89d5dd039f4b3c0e5434b768