Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
26d02c92e4385bfa786ea70807a91037.exe
Resource
win10v2004-20250217-en
General
-
Target
26d02c92e4385bfa786ea70807a91037.exe
-
Size
5.5MB
-
MD5
26d02c92e4385bfa786ea70807a91037
-
SHA1
b85408cd519ba7c577111be782efc0f214c8a2a2
-
SHA256
e9789f716fac51bdcfb51f4851d4ed4f87d3bb3c12a60f6b45f27ae295b9195f
-
SHA512
247177622d3167a27d105b9a299c68e0f50b7d5e1acacf28186eef3d55b87433d0b06fb2ff71e05fb69f5bdbd36b58dc8373757fdae088858f55961d6d61bed6
-
SSDEEP
98304:4217pWJbBleGBv4SuxjwKXYz+KOqQuVwpEKbT3xfornnoFDyAXtisFbD10Rj:bGbBlnBpuuOsuHTBUnor93Fbix
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9dcf7a9471.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1i65e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2g8144.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3u39G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 44 228 skotes.exe 41 228 skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9dcf7a9471.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1i65e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1i65e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2g8144.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2g8144.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3u39G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3u39G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9dcf7a9471.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation 1i65e6.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 2972 X0V02.exe 5060 1i65e6.exe 228 skotes.exe 4008 2g8144.exe 4164 4656d966e7.exe 792 skotes.exe 2472 3u39G.exe 1236 skotes.exe 440 9dcf7a9471.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 1i65e6.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 2g8144.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 3u39G.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 9dcf7a9471.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9dcf7a9471.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1092171001\\9dcf7a9471.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26d02c92e4385bfa786ea70807a91037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" X0V02.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 5060 1i65e6.exe 228 skotes.exe 4008 2g8144.exe 792 skotes.exe 2472 3u39G.exe 1236 skotes.exe 440 9dcf7a9471.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1i65e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26d02c92e4385bfa786ea70807a91037.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X0V02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1i65e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2g8144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4656d966e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dcf7a9471.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3u39G.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 5060 1i65e6.exe 5060 1i65e6.exe 228 skotes.exe 228 skotes.exe 4008 2g8144.exe 4008 2g8144.exe 4008 2g8144.exe 4008 2g8144.exe 4008 2g8144.exe 4008 2g8144.exe 792 skotes.exe 792 skotes.exe 2472 3u39G.exe 2472 3u39G.exe 1236 skotes.exe 1236 skotes.exe 440 9dcf7a9471.exe 440 9dcf7a9471.exe 440 9dcf7a9471.exe 440 9dcf7a9471.exe 440 9dcf7a9471.exe 440 9dcf7a9471.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5060 1i65e6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2972 1952 26d02c92e4385bfa786ea70807a91037.exe 87 PID 1952 wrote to memory of 2972 1952 26d02c92e4385bfa786ea70807a91037.exe 87 PID 1952 wrote to memory of 2972 1952 26d02c92e4385bfa786ea70807a91037.exe 87 PID 2972 wrote to memory of 5060 2972 X0V02.exe 88 PID 2972 wrote to memory of 5060 2972 X0V02.exe 88 PID 2972 wrote to memory of 5060 2972 X0V02.exe 88 PID 5060 wrote to memory of 228 5060 1i65e6.exe 92 PID 5060 wrote to memory of 228 5060 1i65e6.exe 92 PID 5060 wrote to memory of 228 5060 1i65e6.exe 92 PID 2972 wrote to memory of 4008 2972 X0V02.exe 93 PID 2972 wrote to memory of 4008 2972 X0V02.exe 93 PID 2972 wrote to memory of 4008 2972 X0V02.exe 93 PID 228 wrote to memory of 4164 228 skotes.exe 98 PID 228 wrote to memory of 4164 228 skotes.exe 98 PID 228 wrote to memory of 4164 228 skotes.exe 98 PID 1952 wrote to memory of 2472 1952 26d02c92e4385bfa786ea70807a91037.exe 111 PID 1952 wrote to memory of 2472 1952 26d02c92e4385bfa786ea70807a91037.exe 111 PID 1952 wrote to memory of 2472 1952 26d02c92e4385bfa786ea70807a91037.exe 111 PID 228 wrote to memory of 440 228 skotes.exe 115 PID 228 wrote to memory of 440 228 skotes.exe 115 PID 228 wrote to memory of 440 228 skotes.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d02c92e4385bfa786ea70807a91037.exe"C:\Users\Admin\AppData\Local\Temp\26d02c92e4385bfa786ea70807a91037.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X0V02.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X0V02.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1i65e6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1i65e6.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\1092062001\4656d966e7.exe"C:\Users\Admin\AppData\Local\Temp\1092062001\4656d966e7.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\1092171001\9dcf7a9471.exe"C:\Users\Admin\AppData\Local\Temp\1092171001\9dcf7a9471.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2g8144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2g8144.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3u39G.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3u39G.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:792
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD5a92d6465d69430b38cbc16bf1c6a7210
SHA1421fadebee484c9d19b9cb18faf3b0f5d9b7a554
SHA2563cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77
SHA5120fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345
-
Filesize
3.0MB
MD55e79df97975b488e901487db545d5de8
SHA12cc617e5bd4cf348b8a1fccf2716686cf2c63fe6
SHA256aa38c813aafc36532f6d8e826f2f7665b26c2c0ef2ff7395c21230f2640cb966
SHA5125bbfee010c11ba03ef2db2a7a0280aae19f94aced5b2bb2085d5ea97a5d321d89368912cf8d563cbeb7de0f755ef5990adf9199b5f172d115bdc6e6e4442571f
-
Filesize
1.7MB
MD5be387fa24001fc6815aaa56fd034e158
SHA1ea2116971dc1c9e20250d6e895a467033d3b66cc
SHA25697a0714c97ef7d24d3e6724c9101e4fa035159eab3dd194b4b8f2c3fe927ced3
SHA5128f7ce5bd72a87b7147c65a341b0f6902d68af49b1400bd6a42bcbe2b90719da218a5568eac26ca24e9f6c045ab784a446cd9e81bcf3d8ea212f96c7b9422f1da
-
Filesize
3.7MB
MD5dbd88528720e86b217dbd9a8cff854ce
SHA152dae3bbb552f4c043eacfc0b97061104e9b630c
SHA256e86826f8c52ee462db7190e72d9f44db70b6c168cdda389f80d3d950b5720fac
SHA512a47da18f3270a6758a7114b773c3f81c414dcae3ed365cdfc1b6b6231c6d97a634359401d5fe92c37565b143c894552c1bf47729e857cf420e187768c2c7bf5c
-
Filesize
2.0MB
MD5190126600c4f0d6f6f75c7bd47081ce9
SHA17fce3c146cb29413dcbe133013f7bf760fb3d6d1
SHA25604a56891b310acf9bb0397f078f1ac1c117754423f6ebc76bd2b0c7182cf3825
SHA5128ee42e579c04a085bca667cc797b07fe63e26d5379f95d15471c877f26e5f22fb478986c717ecb1871ccbb2758eea7f523f7ce0ab2231b358a17d41223f73384
-
Filesize
1.8MB
MD5411303148c2c132ec3b30a97c1936cf9
SHA19693f9e29924d1bbb1bf87f10707c74d1df7e996
SHA256dc9c553a3ff7574b1007f70a911f10ca22590a7661dfb84a25c5009d1b564fbb
SHA512f27dce51cbed73bb3f1b8fb977d3168f5778bab24b4c762f16333adfb9d93ce1b476a3277d994ee429781919385846c68c618c5d72b38ca6a7bc82f9c658dbdd