Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe
Resource
win7-20240903-en
General
-
Target
b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe
-
Size
3.1MB
-
MD5
7bc3610d75c156640b9918f00a3fe50f
-
SHA1
44790160233bb2ca3233d7a8698c83740a794456
-
SHA256
b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d
-
SHA512
fac7229b4515f20bf89aa0a08ba476b38ebbe90271be38128fcdc1f9d1d86d0751a393bddd98c89baab2579df96c761259480d7f0aea4e4cb9bcd42db09ce0a1
-
SSDEEP
49152:nc9ThuYz3W8wAv1YnGE/iVxIT7ku7x2zO0GbyzyNbFfnOGrZdV:c9TRz3W8wAv1YnGLePYa0Ef5Zd
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 767ad55d76.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5b2e6c0217.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 767ad55d76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 767ad55d76.exe -
Executes dropped EXE 4 IoCs
pid Process 2292 skotes.exe 576 DLER214.exe 2420 767ad55d76.exe 2652 5b2e6c0217.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 767ad55d76.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 5b2e6c0217.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe -
Loads dropped DLL 11 IoCs
pid Process 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 2292 skotes.exe 2380 WerFault.exe 2380 WerFault.exe 2380 WerFault.exe 2380 WerFault.exe 2380 WerFault.exe 2292 skotes.exe 2292 skotes.exe 2292 skotes.exe 2292 skotes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\767ad55d76.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004086001\\767ad55d76.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 2292 skotes.exe 2420 767ad55d76.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 576 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLER214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 767ad55d76.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 2292 skotes.exe 2420 767ad55d76.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 576 DLER214.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2292 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 30 PID 2372 wrote to memory of 2292 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 30 PID 2372 wrote to memory of 2292 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 30 PID 2372 wrote to memory of 2292 2372 b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe 30 PID 2292 wrote to memory of 576 2292 skotes.exe 33 PID 2292 wrote to memory of 576 2292 skotes.exe 33 PID 2292 wrote to memory of 576 2292 skotes.exe 33 PID 2292 wrote to memory of 576 2292 skotes.exe 33 PID 576 wrote to memory of 2380 576 DLER214.exe 34 PID 576 wrote to memory of 2380 576 DLER214.exe 34 PID 576 wrote to memory of 2380 576 DLER214.exe 34 PID 576 wrote to memory of 2380 576 DLER214.exe 34 PID 2292 wrote to memory of 2420 2292 skotes.exe 35 PID 2292 wrote to memory of 2420 2292 skotes.exe 35 PID 2292 wrote to memory of 2420 2292 skotes.exe 35 PID 2292 wrote to memory of 2420 2292 skotes.exe 35 PID 2292 wrote to memory of 2652 2292 skotes.exe 37 PID 2292 wrote to memory of 2652 2292 skotes.exe 37 PID 2292 wrote to memory of 2652 2292 skotes.exe 37 PID 2292 wrote to memory of 2652 2292 skotes.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe"C:\Users\Admin\AppData\Local\Temp\b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 576 -s 10764⤵
- Loads dropped DLL
- Program crash
PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004086001\767ad55d76.exe"C:\Users\Admin\AppData\Local\Temp\1004086001\767ad55d76.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\1004087001\5b2e6c0217.exe"C:\Users\Admin\AppData\Local\Temp\1004087001\5b2e6c0217.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD554ec587044fdff4bfd0029946041a109
SHA1242cc5fdd5c75a02776f1f5e526cc42cf138b313
SHA256e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf
SHA5126e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046
-
Filesize
3.0MB
MD5c4aece08b50819dbb642d0e4478c0921
SHA1a79e8c4f6c1c880e0d8bf95d3e4618e5e1b9bc2d
SHA2566163126132b59b1178d2a9eb5dd0228694cb573bf6f96f54c2f04168f467d62f
SHA51277b6a94f4fe388a38ae4ae3ab67520a15ab4640328ffa80c22246708c7d0e08b784be7fc93112d21a77721b7f3761d948b2f32102a050fc39280d87be59c0f8c
-
Filesize
2.0MB
MD5633f9512e18ffeee9daf308fc33c080c
SHA12b18defa7720c46b847a3e81c67296fe5b4e3efd
SHA25663d5dae30a2008d6a858e421ed4716c83b4aa8677c56d804e1ef96086ecff920
SHA512247e92acf56bcd8dfdaa6816cdb565efaf9e02d2a5b71cfeae700168390fd6bad0fb27dde7371a6baf51bb4398222941f1c9e75c2bad2b9d115fd301919aa5a4
-
Filesize
3.1MB
MD57bc3610d75c156640b9918f00a3fe50f
SHA144790160233bb2ca3233d7a8698c83740a794456
SHA256b27cead89f5b755e257992d0dae512bd499a94043125d3da9d1261f76bad9f4d
SHA512fac7229b4515f20bf89aa0a08ba476b38ebbe90271be38128fcdc1f9d1d86d0751a393bddd98c89baab2579df96c761259480d7f0aea4e4cb9bcd42db09ce0a1