Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
2IHJC_file.exe
Resource
win7-20240903-en
General
-
Target
2IHJC_file.exe
-
Size
1.8MB
-
MD5
5ca58d76edc0e7291bf3d6bad7edbbe9
-
SHA1
694124bf2e8d817b7f188706bbc49d0088317fe2
-
SHA256
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
-
SHA512
82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
SSDEEP
49152:JzqRbJAOwImTwJuvYsiI5kDbZF6j9FWHK:wRVA8xobiI566j9Aq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
2IHJC_file.exeskotes.exeda72d24727.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2IHJC_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da72d24727.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2IHJC_file.exeskotes.exeda72d24727.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2IHJC_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2IHJC_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da72d24727.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da72d24727.exe -
Executes dropped EXE 3 IoCs
Processes:
skotes.exeda72d24727.exe05L6BBv.exepid Process 824 skotes.exe 1732 da72d24727.exe 2928 05L6BBv.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
2IHJC_file.exeskotes.exeda72d24727.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 2IHJC_file.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine da72d24727.exe -
Loads dropped DLL 4 IoCs
Processes:
2IHJC_file.exeskotes.exepid Process 2368 2IHJC_file.exe 2368 2IHJC_file.exe 824 skotes.exe 824 skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
2IHJC_file.exeskotes.exeda72d24727.exepid Process 2368 2IHJC_file.exe 824 skotes.exe 1732 da72d24727.exe -
Drops file in Windows directory 1 IoCs
Processes:
2IHJC_file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 2IHJC_file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2IHJC_file.exeskotes.exeda72d24727.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2IHJC_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da72d24727.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
2IHJC_file.exeskotes.exeda72d24727.exepid Process 2368 2IHJC_file.exe 824 skotes.exe 1732 da72d24727.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2IHJC_file.exepid Process 2368 2IHJC_file.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2IHJC_file.exeskotes.exedescription pid Process procid_target PID 2368 wrote to memory of 824 2368 2IHJC_file.exe 30 PID 2368 wrote to memory of 824 2368 2IHJC_file.exe 30 PID 2368 wrote to memory of 824 2368 2IHJC_file.exe 30 PID 2368 wrote to memory of 824 2368 2IHJC_file.exe 30 PID 824 wrote to memory of 1732 824 skotes.exe 33 PID 824 wrote to memory of 1732 824 skotes.exe 33 PID 824 wrote to memory of 1732 824 skotes.exe 33 PID 824 wrote to memory of 1732 824 skotes.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2IHJC_file.exe"C:\Users\Admin\AppData\Local\Temp\2IHJC_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\1008616001\da72d24727.exe"C:\Users\Admin\AppData\Local\Temp\1008616001\da72d24727.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\1008618001\05L6BBv.exe"C:\Users\Admin\AppData\Local\Temp\1008618001\05L6BBv.exe"3⤵
- Executes dropped EXE
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5f35acf76c5ace4e007dc64fcde784dbe
SHA18c3fbdc41b3d357b06902049e2ad6f2e4d136344
SHA25686088c0dfa1761f1989204ae2d46a3a0b3defaf379a2ccd0b81b0067aae8ec07
SHA51281c0f7526b83b76e9dbf8fa1256baa0945df7337dc876f45b774651449ef98d776b371d0ec91ff771dad0e722bdb2358205bfeaefc5559e738da157111f3002a
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
1.8MB
MD55ca58d76edc0e7291bf3d6bad7edbbe9
SHA1694124bf2e8d817b7f188706bbc49d0088317fe2
SHA256d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
SHA51282b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad