Analysis
-
max time kernel
142s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe
Resource
win10v2004-20250217-en
General
-
Target
abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe
-
Size
5.6MB
-
MD5
1067e42ecb4ca7700662037e0630d319
-
SHA1
951542869a55506bac4575e6ac0c46a21b975744
-
SHA256
abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa
-
SHA512
5315973824e199e37904ca151f2364ca188906c9d90e1627960e1f55b731598a6bf57f0589152bf7f8aa70675ae9afdcb7e2fd138fdfc6157d94d336c0d011d3
-
SSDEEP
98304:0sRoZGmAZH2UkiCqDMOjCeFDOr/AGx7yy30VRMjfU/9+hIBYdigu71nib:0VqHrv9tOGUNmRMYBYluxk
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1C05b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2u9270.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3y33N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1C05b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2u9270.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2u9270.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3y33N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3y33N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1C05b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation 1C05b9.exe -
Executes dropped EXE 8 IoCs
pid Process 4852 m6D05.exe 2996 1C05b9.exe 3480 skotes.exe 3248 2u9270.exe 4404 3y33N.exe 3548 skotes.exe 1796 skotes.exe 4876 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 2u9270.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3y33N.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 1C05b9.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" m6D05.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2996 1C05b9.exe 3480 skotes.exe 3248 2u9270.exe 4404 3y33N.exe 3548 skotes.exe 1796 skotes.exe 4876 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1C05b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4384 4404 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C05b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2u9270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3y33N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m6D05.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3y33N.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3y33N.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2996 1C05b9.exe 2996 1C05b9.exe 3480 skotes.exe 3480 skotes.exe 3248 2u9270.exe 3248 2u9270.exe 3248 2u9270.exe 3248 2u9270.exe 3248 2u9270.exe 3248 2u9270.exe 4404 3y33N.exe 4404 3y33N.exe 3548 skotes.exe 3548 skotes.exe 4404 3y33N.exe 4404 3y33N.exe 1796 skotes.exe 1796 skotes.exe 4876 skotes.exe 4876 skotes.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4852 4888 abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe 84 PID 4888 wrote to memory of 4852 4888 abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe 84 PID 4888 wrote to memory of 4852 4888 abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe 84 PID 4852 wrote to memory of 2996 4852 m6D05.exe 86 PID 4852 wrote to memory of 2996 4852 m6D05.exe 86 PID 4852 wrote to memory of 2996 4852 m6D05.exe 86 PID 2996 wrote to memory of 3480 2996 1C05b9.exe 88 PID 2996 wrote to memory of 3480 2996 1C05b9.exe 88 PID 2996 wrote to memory of 3480 2996 1C05b9.exe 88 PID 4852 wrote to memory of 3248 4852 m6D05.exe 89 PID 4852 wrote to memory of 3248 4852 m6D05.exe 89 PID 4852 wrote to memory of 3248 4852 m6D05.exe 89 PID 4888 wrote to memory of 4404 4888 abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe 91 PID 4888 wrote to memory of 4404 4888 abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe 91 PID 4888 wrote to memory of 4404 4888 abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe"C:\Users\Admin\AppData\Local\Temp\abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6D05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6D05.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1C05b9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1C05b9.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2u9270.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2u9270.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3y33N.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3y33N.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 15643⤵
- Program crash
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4404 -ip 44041⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5dc7fb0b215e5bd885059328d836e9334
SHA1831e495173035a86fa95f95dbb049e5c9b2d5021
SHA25629400490a7e6d89ffe8f731ffdc56e7f13f830b98378b1f24650a9c07d2e4bbb
SHA512e6bfd880e07c26dd1e0a8e250683d0828ed670c34de0b587735bfe45197f3c5cfe8903ac1a5aae2ab53f1c202f40631bdf9416e086b1c1bf7c46341fa93777d0
-
Filesize
3.7MB
MD5de2fe9ab06fb5ba2a3535f9f20f05ae9
SHA197af503ab59a9534f079c54d1baaff56a978013e
SHA256b3afebc0be875d29878a8cda4a292cbfd708fae95098ba0b784d1db18a2bb257
SHA51245373c570310d0733a669a9469b711ccc879800be339ad8a9c03db59498c9e5db4a925f9815e1b4b146415f5fa6c45d3836f188a88e769a9af4d8fc5a2cba233
-
Filesize
2.0MB
MD518fcabff159ae0d49818cd13b071e037
SHA1616f14286195bfd36b28bbf0aa8523b9a3496b7b
SHA2564c669385dddec75d0166d88ae377ef18d5e84c5367f043126a4090b386a3807d
SHA5120642ee32cc76098ff89dabfeb312c6bdefc7ceaa70bf4eddcf302623edc38849a71820a3e7690d5084c4b8535359eb451fa50e3a2675bd6cda50c69ea1f8b6d3
-
Filesize
1.8MB
MD5fb5aea14154f324ee64d60209828557c
SHA12d2d3ad90bf761cf7176c96f468faf0c4151d6f0
SHA2568ff6a404f974d7150d62edb435b0d022cf262104faf6a9b00260e566d0255ebe
SHA512926ad12fa9fb3262af4ffc4beedf02fec20c726a57bd733753a1f3b3fbf74c17fe2860ccd55ff6b5883648d7524a76d3e0290d230ef9e0e1b360e49370f70d3e