Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe
Resource
win7-20240903-en
General
-
Target
40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe
-
Size
1.9MB
-
MD5
fa098b363f56394eb669a96201d3521d
-
SHA1
76ecc170b800c1ec06e738a7b5e36e71233f8f2a
-
SHA256
40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f
-
SHA512
0c16d78ab94169f9b82dbbe5fabba0a1b4d8dc7294bb8cd7186334cd9e324a1b09d12bc40c10e661101247f85fdae1c1a409750d4d906b1a54ec59b9a030b66f
-
SSDEEP
49152:kxjt3XoWPCffcrq4+mGRpxe+mHg7OwhW3mtu90feqNB9ULK+Ea:iVomCffCGmGRnetcTEckNqNcK+Ea
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF be61550134.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be61550134.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be61550134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be61550134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 5 IoCs
pid Process 4540 skotes.exe 4840 be61550134.exe 1580 skotes.exe 2036 skotes.exe 2396 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine be61550134.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe 4540 skotes.exe 4840 be61550134.exe 1580 skotes.exe 2036 skotes.exe 2396 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be61550134.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe 4540 skotes.exe 4540 skotes.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 4840 be61550134.exe 1580 skotes.exe 1580 skotes.exe 2036 skotes.exe 2036 skotes.exe 2396 skotes.exe 2396 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 8 wrote to memory of 4540 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe 84 PID 8 wrote to memory of 4540 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe 84 PID 8 wrote to memory of 4540 8 40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe 84 PID 4540 wrote to memory of 4840 4540 skotes.exe 98 PID 4540 wrote to memory of 4840 4540 skotes.exe 98 PID 4540 wrote to memory of 4840 4540 skotes.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe"C:\Users\Admin\AppData\Local\Temp\40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\1009583001\be61550134.exe"C:\Users\Admin\AppData\Local\Temp\1009583001\be61550134.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD53beab4cdfbfc8f7b3dee6ca2e71a7ebd
SHA19035de067ce4ead5c1a680f6dee46e74f7c2e785
SHA256adaf3c05363dec98316d49d41baccc7087de4a3571bd6cbf37461a3c2da142ca
SHA512437af0ee3ae26a555e88ac33591acc779f751cbc6ed3b80743b36c465c5ec2e96b46a303d3ad789a2b5772216c68410201b60852147296126ddedb7e84d7ded4
-
Filesize
1.9MB
MD5fa098b363f56394eb669a96201d3521d
SHA176ecc170b800c1ec06e738a7b5e36e71233f8f2a
SHA25640fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f
SHA5120c16d78ab94169f9b82dbbe5fabba0a1b4d8dc7294bb8cd7186334cd9e324a1b09d12bc40c10e661101247f85fdae1c1a409750d4d906b1a54ec59b9a030b66f