Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe
Resource
win7-20240903-en
General
-
Target
1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe
-
Size
3.0MB
-
MD5
9c5d114ce9d0008f2f10b8065b0f3bcd
-
SHA1
bb55eae46c7c5df146693981498e0c4bf22ee9e5
-
SHA256
1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d
-
SHA512
8dfe5e1369fc5b9f9518c50b9e64b460127905ac1eb81ddd592af4e3891a3f41c39057323fff965f8039464acd55da632d354d252ab25bd8d9377b5535623a30
-
SSDEEP
49152:zbqzGqEs/TRMr4ydSGWr3epgIrLvOUcCx9SUMK16dLeavoT5XJjlk0N:E0s/TRdydArkgInvcCx9vMKIdqavgxd
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mOqBQWc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfb52ad5d7.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfb52ad5d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mOqBQWc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfb52ad5d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mOqBQWc.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation mOqBQWc.exe -
Executes dropped EXE 6 IoCs
pid Process 3480 skotes.exe 5052 mOqBQWc.exe 4548 cfb52ad5d7.exe 3736 skotes.exe 2084 skotes.exe 1764 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine mOqBQWc.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine cfb52ad5d7.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe 3480 skotes.exe 5052 mOqBQWc.exe 4548 cfb52ad5d7.exe 3736 skotes.exe 2084 skotes.exe 1764 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 372 4548 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mOqBQWc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfb52ad5d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mOqBQWc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mOqBQWc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1084 timeout.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe 3480 skotes.exe 3480 skotes.exe 5052 mOqBQWc.exe 5052 mOqBQWc.exe 5052 mOqBQWc.exe 5052 mOqBQWc.exe 4548 cfb52ad5d7.exe 4548 cfb52ad5d7.exe 3736 skotes.exe 3736 skotes.exe 2084 skotes.exe 2084 skotes.exe 1764 skotes.exe 1764 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3144 wrote to memory of 3480 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe 83 PID 3144 wrote to memory of 3480 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe 83 PID 3144 wrote to memory of 3480 3144 1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe 83 PID 3480 wrote to memory of 5052 3480 skotes.exe 91 PID 3480 wrote to memory of 5052 3480 skotes.exe 91 PID 3480 wrote to memory of 5052 3480 skotes.exe 91 PID 3480 wrote to memory of 4548 3480 skotes.exe 98 PID 3480 wrote to memory of 4548 3480 skotes.exe 98 PID 3480 wrote to memory of 4548 3480 skotes.exe 98 PID 5052 wrote to memory of 1836 5052 mOqBQWc.exe 99 PID 5052 wrote to memory of 1836 5052 mOqBQWc.exe 99 PID 5052 wrote to memory of 1836 5052 mOqBQWc.exe 99 PID 1836 wrote to memory of 1084 1836 cmd.exe 101 PID 1836 wrote to memory of 1084 1836 cmd.exe 101 PID 1836 wrote to memory of 1084 1836 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe"C:\Users\Admin\AppData\Local\Temp\1658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\1013754001\mOqBQWc.exe"C:\Users\Admin\AppData\Local\Temp\1013754001\mOqBQWc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013754001\mOqBQWc.exe" & rd /s /q "C:\ProgramData\MOP8G4OPZ58Y" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013760001\cfb52ad5d7.exe"C:\Users\Admin\AppData\Local\Temp\1013760001\cfb52ad5d7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 6364⤵
- Program crash
PID:372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4548 -ip 45481⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
1.9MB
MD5b16a303612f8717a90851727a25fdf61
SHA120281be28ae8c170b6dff5939fabd5616e9b7d23
SHA25614a7faa5a16cbc6e031beb668ec24d78b04d8fe4959766cf11722932b93317dc
SHA512c1c83b89a760997dc6740d940628fb7d68e3d82018b55c428ac1fcec0cde4b81ca943ef3dfd247212a14dd5b0eac20e4b4ba7f55b6154ea33a75920be032e196
-
Filesize
3.0MB
MD59c5d114ce9d0008f2f10b8065b0f3bcd
SHA1bb55eae46c7c5df146693981498e0c4bf22ee9e5
SHA2561658f0e2c9dfe87a46080d606c06ebbfd93f4d85b92a00c0da651f756cf2d04d
SHA5128dfe5e1369fc5b9f9518c50b9e64b460127905ac1eb81ddd592af4e3891a3f41c39057323fff965f8039464acd55da632d354d252ab25bd8d9377b5535623a30