Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe
Resource
win7-20241023-en
General
-
Target
526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe
-
Size
3.0MB
-
MD5
219da011bad6ca9985808a7b2ef7c533
-
SHA1
20a1cc202b667a1646ba8dc862fc6b83863270f1
-
SHA256
526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d
-
SHA512
0c3741c1ff33d6b40be3a11611d0e99f201ba976b70467aa54720443e5bddd3177e419324173a89ec46492e64c33f33b542e8e8f5c3ac6bc18cccad75e69df4b
-
SSDEEP
49152:uy6wMYLfP1XiKZjadNJWuLSAxYMms6tpFAp7LBBdItN+CsTy3KvRa5W3PZfX:uy6wMYzNXiKBEJ5SAxp6h+NTnJ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0297de1096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0297de1096.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 0297de1096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0297de1096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0297de1096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0297de1096.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0297de1096.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0297de1096.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0297de1096.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 3 IoCs
pid Process 2132 skotes.exe 1968 babababa.exe 1892 0297de1096.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 0297de1096.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 2132 skotes.exe 2132 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 0297de1096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0297de1096.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\0297de1096.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006063001\\0297de1096.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 2132 skotes.exe 1892 0297de1096.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0297de1096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 2132 skotes.exe 1892 0297de1096.exe 1892 0297de1096.exe 1892 0297de1096.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 0297de1096.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2132 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 30 PID 2536 wrote to memory of 2132 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 30 PID 2536 wrote to memory of 2132 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 30 PID 2536 wrote to memory of 2132 2536 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 30 PID 2132 wrote to memory of 1968 2132 skotes.exe 33 PID 2132 wrote to memory of 1968 2132 skotes.exe 33 PID 2132 wrote to memory of 1968 2132 skotes.exe 33 PID 2132 wrote to memory of 1968 2132 skotes.exe 33 PID 2132 wrote to memory of 1892 2132 skotes.exe 35 PID 2132 wrote to memory of 1892 2132 skotes.exe 35 PID 2132 wrote to memory of 1892 2132 skotes.exe 35 PID 2132 wrote to memory of 1892 2132 skotes.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe"C:\Users\Admin\AppData\Local\Temp\526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\1006055001\babababa.exe"C:\Users\Admin\AppData\Local\Temp\1006055001\babababa.exe"3⤵
- Executes dropped EXE
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\1006063001\0297de1096.exe"C:\Users\Admin\AppData\Local\Temp\1006063001\0297de1096.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33.3MB
MD58fb77810c61e160a657298815346996e
SHA14268420571bb1a858bc6a9744c0742d6fd738a83
SHA256a0840c581f8f1d606fdc43bc98bd386755433bf1fb36647ecf2165eea433ff66
SHA512b0d0aea14bfbb5dfa17536b1669d85fc1325140f6a0176ae1c04870efa3adc902d5755f0df00d305f01120960e95bfc40c37c7519ec2827797ebaa95097cfeb2
-
Filesize
2.7MB
MD5943339c27f115fcb173c991bfc77ee8b
SHA17753f00706ebf2558fd38543984244ee62db528a
SHA256adbaf41442e5f34fa4927097a33aab9171c5ad65ea152ca90635919d96ec3619
SHA5124678ef9ec85ce7c9ff5ebcc38a4c6dd392e410766a5b6d532188faa4ff6c603135c17caa670da0a1987ca6a79a31d5001e6acd84b736185df3caa0036e5a7617
-
Filesize
3.0MB
MD5219da011bad6ca9985808a7b2ef7c533
SHA120a1cc202b667a1646ba8dc862fc6b83863270f1
SHA256526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d
SHA5120c3741c1ff33d6b40be3a11611d0e99f201ba976b70467aa54720443e5bddd3177e419324173a89ec46492e64c33f33b542e8e8f5c3ac6bc18cccad75e69df4b