Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
5cc43c13e14113d07197871708ba3d6a
-
SHA1
3fd30c8b2df49f949086aa654ca67e67bc963a08
-
SHA256
e147291b4b3f7e51599ff3e03f07cc2f556d35d7a0fa1c8ed284498ca6efc7f2
-
SHA512
515ca57618a4e09eaafe432e8a345f712d29488b97cc3b88299179694c1facb0a61c5bbc019e14481ee6b2258b531a0d5d4eff9ae187404e01451ed12ef5bb02
-
SSDEEP
49152:rvlYcKpLjavBk95yL7Po+Yamr9EuBlKJUqq/yNXlxwPw:rv6vgv295yL7Po+w9EuBIuqr5w
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
5.04
397a17
http://89.110.69.103
http://94.156.177.33
-
install_dir
0efeaab28d
-
install_file
Gxtuum.exe
-
strings_key
6dea7a0890c1d404d1b67c90aea6ece4
-
url_paths
/Lv2D7fGdopb/index.php
/b9kdj3s3C0/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 11 IoCs
pid Process 2332 skotes.exe 2040 qtmPs7h.exe 3060 word.exe 2328 word.exe 1884 word.exe 2824 vector.exe 2184 vector.exe 812 vector.exe 2684 vector.exe 2844 vector.exe 2692 vector.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe -
Loads dropped DLL 14 IoCs
pid Process 2148 file.exe 2148 file.exe 2332 skotes.exe 2332 skotes.exe 1964 cmd.exe 1964 cmd.exe 3060 word.exe 2328 word.exe 964 AddInProcess32.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\word = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\word.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2148 file.exe 2332 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 964 3060 word.exe 43 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtmPs7h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 864 PING.EXE 1964 cmd.exe 288 PING.EXE 1996 PING.EXE 1716 cmd.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 864 PING.EXE 288 PING.EXE 1996 PING.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2148 file.exe 2332 skotes.exe 2040 qtmPs7h.exe 2040 qtmPs7h.exe 2040 qtmPs7h.exe 2040 qtmPs7h.exe 2040 qtmPs7h.exe 2040 qtmPs7h.exe 3060 word.exe 3060 word.exe 3060 word.exe 3060 word.exe 2328 word.exe 1884 word.exe 1884 word.exe 1884 word.exe 3060 word.exe 3060 word.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe 2824 vector.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2040 qtmPs7h.exe Token: SeDebugPrivilege 3060 word.exe Token: SeDebugPrivilege 2328 word.exe Token: SeDebugPrivilege 1884 word.exe Token: SeDebugPrivilege 2824 vector.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 file.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2332 2148 file.exe 30 PID 2148 wrote to memory of 2332 2148 file.exe 30 PID 2148 wrote to memory of 2332 2148 file.exe 30 PID 2148 wrote to memory of 2332 2148 file.exe 30 PID 2332 wrote to memory of 2040 2332 skotes.exe 33 PID 2332 wrote to memory of 2040 2332 skotes.exe 33 PID 2332 wrote to memory of 2040 2332 skotes.exe 33 PID 2332 wrote to memory of 2040 2332 skotes.exe 33 PID 2040 wrote to memory of 1716 2040 qtmPs7h.exe 34 PID 2040 wrote to memory of 1716 2040 qtmPs7h.exe 34 PID 2040 wrote to memory of 1716 2040 qtmPs7h.exe 34 PID 2040 wrote to memory of 1716 2040 qtmPs7h.exe 34 PID 1716 wrote to memory of 864 1716 cmd.exe 36 PID 1716 wrote to memory of 864 1716 cmd.exe 36 PID 1716 wrote to memory of 864 1716 cmd.exe 36 PID 1716 wrote to memory of 864 1716 cmd.exe 36 PID 2040 wrote to memory of 1964 2040 qtmPs7h.exe 37 PID 2040 wrote to memory of 1964 2040 qtmPs7h.exe 37 PID 2040 wrote to memory of 1964 2040 qtmPs7h.exe 37 PID 2040 wrote to memory of 1964 2040 qtmPs7h.exe 37 PID 1964 wrote to memory of 288 1964 cmd.exe 39 PID 1964 wrote to memory of 288 1964 cmd.exe 39 PID 1964 wrote to memory of 288 1964 cmd.exe 39 PID 1964 wrote to memory of 288 1964 cmd.exe 39 PID 1716 wrote to memory of 2928 1716 cmd.exe 40 PID 1716 wrote to memory of 2928 1716 cmd.exe 40 PID 1716 wrote to memory of 2928 1716 cmd.exe 40 PID 1716 wrote to memory of 2928 1716 cmd.exe 40 PID 1964 wrote to memory of 1996 1964 cmd.exe 41 PID 1964 wrote to memory of 1996 1964 cmd.exe 41 PID 1964 wrote to memory of 1996 1964 cmd.exe 41 PID 1964 wrote to memory of 1996 1964 cmd.exe 41 PID 1964 wrote to memory of 3060 1964 cmd.exe 42 PID 1964 wrote to memory of 3060 1964 cmd.exe 42 PID 1964 wrote to memory of 3060 1964 cmd.exe 42 PID 1964 wrote to memory of 3060 1964 cmd.exe 42 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 964 3060 word.exe 43 PID 3060 wrote to memory of 2328 3060 word.exe 44 PID 3060 wrote to memory of 2328 3060 word.exe 44 PID 3060 wrote to memory of 2328 3060 word.exe 44 PID 3060 wrote to memory of 2328 3060 word.exe 44 PID 2328 wrote to memory of 1884 2328 word.exe 45 PID 2328 wrote to memory of 1884 2328 word.exe 45 PID 2328 wrote to memory of 1884 2328 word.exe 45 PID 2328 wrote to memory of 1884 2328 word.exe 45 PID 964 wrote to memory of 2824 964 AddInProcess32.exe 47 PID 964 wrote to memory of 2824 964 AddInProcess32.exe 47 PID 964 wrote to memory of 2824 964 AddInProcess32.exe 47 PID 964 wrote to memory of 2824 964 AddInProcess32.exe 47 PID 2824 wrote to memory of 2184 2824 vector.exe 48 PID 2824 wrote to memory of 2184 2824 vector.exe 48 PID 2824 wrote to memory of 2184 2824 vector.exe 48 PID 2824 wrote to memory of 2184 2824 vector.exe 48 PID 2824 wrote to memory of 812 2824 vector.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 65⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:864
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && copy "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe" && ping 127.0.0.1 -n 9 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 95⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:288
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 95⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1996
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
PID:2692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5b183e5ff29a1532a84e5a38983ab9e4e
SHA1230c9cbd2e14598aaf73ae78c85c998a6b923a51
SHA25681a45f430c102365b46c663203ae5708b6befe2848f01efc7b702aff7170c901
SHA51231be2761821fb6bc81a010a3f68fa6901aa5e9768e9c57db53b52e0495c7340abccc9191500aa39540fef159578403e78d2af31ac364b89774d5f359b54c6c1e
-
Filesize
799KB
MD589bd66e4285cb7295300a941964af529
SHA1232d9fee67a3c3652a80e1c1a258f0d789c6a6cf
SHA256a46bf8412717f75bf098966cb1f5074836e78f5699bb5073dcc45d59ca790047
SHA51272d1c8c4b74bacca619a58062441203c6cfea81d064dc1933af7a3cb9758d924b011a6935e8d255aad58159a4ecbb3677cc6a6e80f6daa8b135711195a5c8498
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
88B
MD574da6d85ceb9426c95bb7d17203ce541
SHA163fcd287aa404702edf65311d83a1f128cf4d84b
SHA2565217c2b52a42b6254be7a4bc342e005f03eb117b2f20301e51bcd3b7bc1f50df
SHA512fce6c1ca8213847c797c71d5eb30433cbd0e2e7392d60916824ebd57d557c762bd9710bf1fabc9cf618c84beca12b6913ea10b0bcb92291c50008f016108c427
-
Filesize
91B
MD5339ee771f24c35f852b2a5a9b28f265b
SHA1717df1619fe0acc14bab13b54b6700307c31e737
SHA256bd2b2658e2eed24786c437983d0fd2eba355ff85fe6d87e42f930e41538d95ec
SHA512b79924c4c1b7cf93732231a9c6e9ed2dc6b2367f7c3e4246760e1997bba5606f37bf62f6f3cd13c969fe484bb02ffdeb559851a1d7b91170ee12f4c6b4ee2dac
-
Filesize
2.5MB
MD5d1e3f88d0caf949d5f1b4bf4efbb95a4
SHA161ffd2589a1965bf9cb874833c4c9b106b3e43e8
SHA256c505f3b2f40b8a68e7cacfe2a9925498ab0f7ef29aa7023bb472597021066b2e
SHA5125d4c43e858371f24ebafb56388a586c081d7b0289a3b039dbb2b011e9864e8e9f5dc7037fcb3e88f4bec4259a09ce5f3ccdae3161b43dff140e0e4ca7bff96c3
-
Filesize
3.1MB
MD55cc43c13e14113d07197871708ba3d6a
SHA13fd30c8b2df49f949086aa654ca67e67bc963a08
SHA256e147291b4b3f7e51599ff3e03f07cc2f556d35d7a0fa1c8ed284498ca6efc7f2
SHA512515ca57618a4e09eaafe432e8a345f712d29488b97cc3b88299179694c1facb0a61c5bbc019e14481ee6b2258b531a0d5d4eff9ae187404e01451ed12ef5bb02
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3