Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
e35ed56f80a7af0634754dfecd4195ef
-
SHA1
f6fea977c73c0eb49527c92ee98bde249ec6fc93
-
SHA256
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c
-
SHA512
4a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431
-
SSDEEP
49152:7qBqsKm7aqtAChDwviQSLzaQvrVtzqy2S0tG8dBP4:7qkLmmq6ODwviQ2aQv5w93M2B
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b8d7db192a.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b8d7db192a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b8d7db192a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 4 IoCs
pid Process 2276 skotes.exe 2456 DLER214.exe 2948 DLER214.exe 1916 b8d7db192a.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine b8d7db192a.exe -
Loads dropped DLL 15 IoCs
pid Process 2524 file.exe 2276 skotes.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 2276 skotes.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 2276 skotes.exe 2276 skotes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\b8d7db192a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004091001\\b8d7db192a.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2524 file.exe 2276 skotes.exe 1916 b8d7db192a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 692 2456 WerFault.exe 33 1500 2948 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLER214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8d7db192a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLER214.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2524 file.exe 2276 skotes.exe 1916 b8d7db192a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2456 DLER214.exe Token: SeDebugPrivilege 2948 DLER214.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 file.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2276 2524 file.exe 30 PID 2524 wrote to memory of 2276 2524 file.exe 30 PID 2524 wrote to memory of 2276 2524 file.exe 30 PID 2524 wrote to memory of 2276 2524 file.exe 30 PID 2276 wrote to memory of 2456 2276 skotes.exe 33 PID 2276 wrote to memory of 2456 2276 skotes.exe 33 PID 2276 wrote to memory of 2456 2276 skotes.exe 33 PID 2276 wrote to memory of 2456 2276 skotes.exe 33 PID 2456 wrote to memory of 692 2456 DLER214.exe 34 PID 2456 wrote to memory of 692 2456 DLER214.exe 34 PID 2456 wrote to memory of 692 2456 DLER214.exe 34 PID 2456 wrote to memory of 692 2456 DLER214.exe 34 PID 2276 wrote to memory of 2948 2276 skotes.exe 35 PID 2276 wrote to memory of 2948 2276 skotes.exe 35 PID 2276 wrote to memory of 2948 2276 skotes.exe 35 PID 2276 wrote to memory of 2948 2276 skotes.exe 35 PID 2948 wrote to memory of 1500 2948 DLER214.exe 36 PID 2948 wrote to memory of 1500 2948 DLER214.exe 36 PID 2948 wrote to memory of 1500 2948 DLER214.exe 36 PID 2948 wrote to memory of 1500 2948 DLER214.exe 36 PID 2276 wrote to memory of 1916 2276 skotes.exe 37 PID 2276 wrote to memory of 1916 2276 skotes.exe 37 PID 2276 wrote to memory of 1916 2276 skotes.exe 37 PID 2276 wrote to memory of 1916 2276 skotes.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 10724⤵
- Loads dropped DLL
- Program crash
PID:692
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe"C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 10764⤵
- Loads dropped DLL
- Program crash
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004091001\b8d7db192a.exe"C:\Users\Admin\AppData\Local\Temp\1004091001\b8d7db192a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD554ec587044fdff4bfd0029946041a109
SHA1242cc5fdd5c75a02776f1f5e526cc42cf138b313
SHA256e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf
SHA5126e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046
-
Filesize
3.0MB
MD5ba522860f862e763f886c9099ef1fd37
SHA15f94ca5cd5c518874f15a004fbec03a1bd84a09c
SHA256abc5a50c65982099bf8dba62bac35297fb08c490a62f872f66a739ec409fcd60
SHA51250c02a4d1ddbdd7be58c036055dcf1b9f223269d2def491c5a582cdd983e30ca9d5ee541790e441f6f495c445b1086b0ba1b36ff6585b9c9cc4687c240ea5556
-
Filesize
3.1MB
MD5e35ed56f80a7af0634754dfecd4195ef
SHA1f6fea977c73c0eb49527c92ee98bde249ec6fc93
SHA256d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c
SHA5124a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431