Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe
Resource
win7-20241010-en
General
-
Target
2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe
-
Size
1.8MB
-
MD5
0d9087b4e05e08975b36ee2980e7062b
-
SHA1
b0cf4583cdf36276debee8cb1d6a790906c60809
-
SHA256
2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266
-
SHA512
aa311c743793a78ceabf559e221bd412556a395604b9885747423149b178f10d60e412d800d5a5b8498a1dfc42dbd88438134ede28cd27af7a36f7cc0c2cb84d
-
SSDEEP
49152:yfV8Z1DGHENWq16VBPcHcINISYq2mHu1X9FELsY5LU:jZKENGcTIoZmX9FEwY5o
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/files/0x000500000001a484-55.dat family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a146b6231.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a961eedaa0.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a146b6231.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a146b6231.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a961eedaa0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a961eedaa0.exe -
Executes dropped EXE 6 IoCs
pid Process 2776 skotes.exe 768 1Shasou.exe 1692 a961eedaa0.exe 2160 vg9qcBa.exe 2872 vg9qcBa.exe 2184 5a146b6231.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine a961eedaa0.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 5a146b6231.exe -
Loads dropped DLL 10 IoCs
pid Process 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 2776 skotes.exe 2776 skotes.exe 2776 skotes.exe 2776 skotes.exe 2776 skotes.exe 2776 skotes.exe 2160 vg9qcBa.exe 2776 skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\5a146b6231.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009243001\\5a146b6231.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 2776 skotes.exe 1692 a961eedaa0.exe 2184 5a146b6231.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2872 2160 vg9qcBa.exe 37 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Shasou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a961eedaa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a146b6231.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 skotes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 skotes.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 2776 skotes.exe 1692 a961eedaa0.exe 2184 5a146b6231.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2776 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 30 PID 2772 wrote to memory of 2776 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 30 PID 2772 wrote to memory of 2776 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 30 PID 2772 wrote to memory of 2776 2772 2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe 30 PID 2776 wrote to memory of 768 2776 skotes.exe 32 PID 2776 wrote to memory of 768 2776 skotes.exe 32 PID 2776 wrote to memory of 768 2776 skotes.exe 32 PID 2776 wrote to memory of 768 2776 skotes.exe 32 PID 2776 wrote to memory of 1692 2776 skotes.exe 34 PID 2776 wrote to memory of 1692 2776 skotes.exe 34 PID 2776 wrote to memory of 1692 2776 skotes.exe 34 PID 2776 wrote to memory of 1692 2776 skotes.exe 34 PID 2776 wrote to memory of 2160 2776 skotes.exe 35 PID 2776 wrote to memory of 2160 2776 skotes.exe 35 PID 2776 wrote to memory of 2160 2776 skotes.exe 35 PID 2776 wrote to memory of 2160 2776 skotes.exe 35 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2160 wrote to memory of 2872 2160 vg9qcBa.exe 37 PID 2776 wrote to memory of 2184 2776 skotes.exe 38 PID 2776 wrote to memory of 2184 2776 skotes.exe 38 PID 2776 wrote to memory of 2184 2776 skotes.exe 38 PID 2776 wrote to memory of 2184 2776 skotes.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe"C:\Users\Admin\AppData\Local\Temp\2c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\1009157001\1Shasou.exe"C:\Users\Admin\AppData\Local\Temp\1009157001\1Shasou.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\1009237001\a961eedaa0.exe"C:\Users\Admin\AppData\Local\Temp\1009237001\a961eedaa0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009243001\5a146b6231.exe"C:\Users\Admin\AppData\Local\Temp\1009243001\5a146b6231.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5d0038532ae6cec64be83bc19d0b8f695
SHA117a23380f80068d15ebc014cb2b1748bb45fb5c1
SHA256b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5
SHA512af269471f7093445fb05bc6d6d185f9e48d0666674a3de50c4217757d3fdf39b067668bf2ca37eac91d5cb203c3ce3d4d634661e470d84d12c80c332344503ea
-
Filesize
4.2MB
MD5b4de34dcc96d16ec82f6fa3a7d037d4f
SHA1a61abdbcf17bd347b2f0733d921100bf5503e844
SHA256176260afa9071597e2a1a9947ae1394acf082932fbbb78b3c830c6d7c63bfa76
SHA512619dd38b27a461164a5541a42d4796b5f946df776d7e8e5e0849580c7148a6bbd7afb50db9e7ee0fb0f2dce02962a260fa7545c14d70f1e005243e1fd600aa33
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
1.8MB
MD5e4b5250f65686e87e82210c71f5d5870
SHA12c9d0de98a7cbcf69d6cb496ed85bece6aa2e3f1
SHA2564e5951866d4ca4fdd5e76ace99b49d8d92f13c28289b78d3989957069bc1799a
SHA51280c6e789bdedc6a95aa47e65e0fab15c1d3bfec3daf8c79629b60296e8b508421a55e9e978689cb9f661f0702c56c2ed3f7f59ab722eec9241aac1903d438b92
-
Filesize
1.8MB
MD50d9087b4e05e08975b36ee2980e7062b
SHA1b0cf4583cdf36276debee8cb1d6a790906c60809
SHA2562c701d9e522632ec94eef57488bee5a500b4918b68b1cfe4425145e4283ab266
SHA512aa311c743793a78ceabf559e221bd412556a395604b9885747423149b178f10d60e412d800d5a5b8498a1dfc42dbd88438134ede28cd27af7a36f7cc0c2cb84d