Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 00:09
Static task
static1
General
-
Target
4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe
-
Size
7.0MB
-
MD5
e0ded4a87612d3928cffc18b0b6c9254
-
SHA1
ad6271623f189d0a9296812051249f2fa75c3010
-
SHA256
4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9
-
SHA512
5d2c85d9757269d8a9a3f5def8448dc695457340e825d8c61c128c5a8df1f171df46e7c03e31db8ce77a07c2941b7ecf0ebdfa9e72d98929056f1d85952279d5
-
SSDEEP
196608:MPhdHGx5o+SveoEFNLnxoJqOCXhVXFj1yZRoOQ/oV:MPhdmXofYNrWJqOCx9d1SoO4oV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://property-imper.sbs/api
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/696-58-0x0000000000E00000-0x00000000010C6000-memory.dmp healer behavioral1/memory/696-59-0x0000000000E00000-0x00000000010C6000-memory.dmp healer behavioral1/memory/696-65-0x0000000000E00000-0x00000000010C6000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4B471I.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4B471I.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4B471I.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4B471I.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4fcd3f1228.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1N24W4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3t97u.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4B471I.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44e667cbf0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z8801.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 20 4896 skotes.exe 60 4896 skotes.exe 60 4896 skotes.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44e667cbf0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z8801.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z8801.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3t97u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4fcd3f1228.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3t97u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4fcd3f1228.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1N24W4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4B471I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44e667cbf0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1N24W4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4B471I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 1N24W4.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 224 Z8l79.exe 1456 y0m71.exe 2196 1N24W4.exe 4896 skotes.exe 3320 2Z8801.exe 4596 skotes.exe 664 3t97u.exe 696 4B471I.exe 4192 skotes.exe 5044 4fcd3f1228.exe 4856 44e667cbf0.exe 224 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 4B471I.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 44e667cbf0.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 1N24W4.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 2Z8801.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 4fcd3f1228.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 3t97u.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4B471I.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\44e667cbf0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1095382001\\44e667cbf0.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z8l79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0m71.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4fcd3f1228.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1095381001\\4fcd3f1228.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2196 1N24W4.exe 4896 skotes.exe 3320 2Z8801.exe 4596 skotes.exe 664 3t97u.exe 696 4B471I.exe 4192 skotes.exe 5044 4fcd3f1228.exe 4856 44e667cbf0.exe 224 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1N24W4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0m71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1N24W4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z8801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3t97u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fcd3f1228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44e667cbf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z8l79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4B471I.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 44e667cbf0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 44e667cbf0.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2196 1N24W4.exe 2196 1N24W4.exe 4896 skotes.exe 4896 skotes.exe 3320 2Z8801.exe 3320 2Z8801.exe 4596 skotes.exe 4596 skotes.exe 664 3t97u.exe 664 3t97u.exe 696 4B471I.exe 696 4B471I.exe 696 4B471I.exe 696 4B471I.exe 4192 skotes.exe 4192 skotes.exe 5044 4fcd3f1228.exe 5044 4fcd3f1228.exe 5044 4fcd3f1228.exe 5044 4fcd3f1228.exe 5044 4fcd3f1228.exe 5044 4fcd3f1228.exe 4856 44e667cbf0.exe 4856 44e667cbf0.exe 4856 44e667cbf0.exe 4856 44e667cbf0.exe 224 skotes.exe 224 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 4B471I.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 1N24W4.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5620 wrote to memory of 224 5620 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 86 PID 5620 wrote to memory of 224 5620 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 86 PID 5620 wrote to memory of 224 5620 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 86 PID 224 wrote to memory of 1456 224 Z8l79.exe 89 PID 224 wrote to memory of 1456 224 Z8l79.exe 89 PID 224 wrote to memory of 1456 224 Z8l79.exe 89 PID 1456 wrote to memory of 2196 1456 y0m71.exe 91 PID 1456 wrote to memory of 2196 1456 y0m71.exe 91 PID 1456 wrote to memory of 2196 1456 y0m71.exe 91 PID 2196 wrote to memory of 4896 2196 1N24W4.exe 92 PID 2196 wrote to memory of 4896 2196 1N24W4.exe 92 PID 2196 wrote to memory of 4896 2196 1N24W4.exe 92 PID 1456 wrote to memory of 3320 1456 y0m71.exe 93 PID 1456 wrote to memory of 3320 1456 y0m71.exe 93 PID 1456 wrote to memory of 3320 1456 y0m71.exe 93 PID 224 wrote to memory of 664 224 Z8l79.exe 99 PID 224 wrote to memory of 664 224 Z8l79.exe 99 PID 224 wrote to memory of 664 224 Z8l79.exe 99 PID 5620 wrote to memory of 696 5620 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 100 PID 5620 wrote to memory of 696 5620 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 100 PID 5620 wrote to memory of 696 5620 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 100 PID 4896 wrote to memory of 5044 4896 skotes.exe 111 PID 4896 wrote to memory of 5044 4896 skotes.exe 111 PID 4896 wrote to memory of 5044 4896 skotes.exe 111 PID 4896 wrote to memory of 4856 4896 skotes.exe 113 PID 4896 wrote to memory of 4856 4896 skotes.exe 113 PID 4896 wrote to memory of 4856 4896 skotes.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe"C:\Users\Admin\AppData\Local\Temp\4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8l79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8l79.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0m71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0m71.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N24W4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N24W4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\1095381001\4fcd3f1228.exe"C:\Users\Admin\AppData\Local\Temp\1095381001\4fcd3f1228.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\1095382001\44e667cbf0.exe"C:\Users\Admin\AppData\Local\Temp\1095382001\44e667cbf0.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z8801.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z8801.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t97u.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t97u.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B471I.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B471I.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:224
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD588b313efa71a862c52fa1d192a7bebca
SHA1533fc18f00f1fa41ad294baec73c208edb8b0e55
SHA25668ad5fe5e088f889cd07f00d3ff60805117e4963fd9b0a60cc2730c194271b21
SHA512657d2c6979d90331e271ffbfe145f14a01858d138ddbda159a86a0da0dc3d7a99de618ec652dfd6e859cf0e3452642971e90ddab6c48d03c5e503a6e367684d9
-
Filesize
2.9MB
MD57d49c508d668584ae2c4c8e48d7c4778
SHA1c4e0f9513e9808321996ee3aeb6fc6606d19150b
SHA2561e3aec15db2c1f4385bae1d9599196cdd7419a4fd23a0c2920d6c9e4f16b7fd1
SHA51290015a6a457c8a38bd788c9c757380324df40903f1712fd2c12bf377a34f41f8493b33557ec7c752263c2139eea0cc78e026bbd5d6e18f1cfd73f0154526af14
-
Filesize
1.7MB
MD598b95f8f11752386203063c20b0e407e
SHA1be6c83d1e828fe22c31ec6d13e5848fc230104e7
SHA2566eb8c1366e41c42dc9bc540a8463aacda5809b2aa0a0ec68eb6a53e3bb55dd03
SHA512dc3c6ef151eff50734da8577600c9d178c10071bf6b94b91231254ec423784c9dc8b0a3c3c77c24c5a2079afd335d9ca595e8161a1310a0b5960cd548d165bd7
-
Filesize
2.7MB
MD52f65c9188c6ddfd96c196966c65e9aa7
SHA17ca6da9960fccd280fd036deeefa65b275b5f792
SHA256290b5a60c8fa715c5b46137fd5c99506276b6342fd42a27b5928fcc7bb29df9d
SHA51230feff5ff13740152ce57ceec5d2dc55438b54cd02c1e7643a8522f5d0c8a61df5dfe48908b1cd83bebfc533c277066bc1a9a7723f37aeb2a940fce0e325b6d2
-
Filesize
5.4MB
MD52024fb92bda6a08eea217ef06b2ebafb
SHA16859ae6b7d962b447a94ddeb5b0e9466d22f41d2
SHA256d012a77fe8284cc00f0834e27a9dba130f456cb4adbebfade357e0ab5f66dc5e
SHA5124fa2e75a848c053c734018e70ece6f4d6ac040e42316fe9fb577c1a872f14aa40487f5901e0417de2a9438b3c08d0c29331be65b2fe09bc11c15258905373480
-
Filesize
1.7MB
MD59afe225738179bdd84a982743ce6298a
SHA1df35f5add9f22f5a139dbb00f61c64109dcae505
SHA2569a24faceebda1a2dfa1fa5e1278e412ea83d3cb3b26f2f15088fba1dcc5f0c35
SHA51230ca1d5ec088c82e7e9117662f4259b6e7c1ace35c0bcdc455e91439a7474d8f1a6561f96f8fb147c7ef3c083fd955908bb79adc392715859127a2f25d5d2a35
-
Filesize
3.7MB
MD5589c2ca4c7780f81c0a9573b88c47d77
SHA1751aaf8018076025f4a8049ab107c265be870290
SHA25635f5a7c7bfd9027f61ed98fc9973e55213f1a6e9467c9cb13eb7e17d6c55b227
SHA512574f86597c72b9c5017a85be0470192b85d6ff052de05ec17a99a727ff006931a41276428d9196046b9cefe7976141a923a2b2dafb0187a6af953315515e2cf5
-
Filesize
1.8MB
MD5a1c953f923e4be116841c83804ac7291
SHA1788f595f67634c655126cfe557d6ac97910fdd3a
SHA256719a9b32734e31c4494274d6260673d297801e454b2c2817c09da21b635a30bd
SHA51265866df54204cf32448342dde8023020d74c76b3f59d76569b1736a814493a5640db26230a91474cdf83ed12bc935f522cf7943ff521906e123ea1cdb679b16d
-
Filesize
1.8MB
MD5c38e8b23e6d883cb93ae7a667e156593
SHA1be7454d7110cbcb6281396a912878eec8a3e4cad
SHA25691126811484fcbbc5b56d9e90b7663fa70439eb194a767ab66da76d22d976233
SHA51216449fd40c388bb2161b8ad3c68a6e02bdcaaedaed11cd0ec039776e2617d6ec8af8796c3904e194d58d92a203d46268d835e722a309e2d01e73925202452cd2