Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe
Resource
win7-20240708-en
General
-
Target
13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe
-
Size
2.9MB
-
MD5
117d5bc15e223805f55b2890713cd193
-
SHA1
a01bcb2fbea608834b0d644bc7cdcd9d304eca5b
-
SHA256
13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade
-
SHA512
f9d2668b08702dc76d4e7aa52938b3765a13bb4b71413ff3d328b5675bfc8cfd92b25dee4db68df84037410ae2d32f431921628d3238186bdbe2f41e6d36523d
-
SSDEEP
49152:7PIOh+mCXpv9KjHkwJIaImhEFm49THMCOV5V8yjODNO:7f0pvSE8IaIUEFkC65Vb6D
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 2 IoCs
pid Process 2868 skotes.exe 2424 ad3f625b48.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe -
Loads dropped DLL 4 IoCs
pid Process 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 2868 skotes.exe 2868 skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 2868 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 2868 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2868 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 30 PID 2092 wrote to memory of 2868 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 30 PID 2092 wrote to memory of 2868 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 30 PID 2092 wrote to memory of 2868 2092 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 30 PID 2868 wrote to memory of 2424 2868 skotes.exe 32 PID 2868 wrote to memory of 2424 2868 skotes.exe 32 PID 2868 wrote to memory of 2424 2868 skotes.exe 32 PID 2868 wrote to memory of 2424 2868 skotes.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe"C:\Users\Admin\AppData\Local\Temp\13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\1015876001\ad3f625b48.exe"C:\Users\Admin\AppData\Local\Temp\1015876001\ad3f625b48.exe"3⤵
- Executes dropped EXE
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
2.9MB
MD5117d5bc15e223805f55b2890713cd193
SHA1a01bcb2fbea608834b0d644bc7cdcd9d304eca5b
SHA25613da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade
SHA512f9d2668b08702dc76d4e7aa52938b3765a13bb4b71413ff3d328b5675bfc8cfd92b25dee4db68df84037410ae2d32f431921628d3238186bdbe2f41e6d36523d