Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe
Resource
win7-20240708-en
General
-
Target
07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe
-
Size
2.9MB
-
MD5
f7b231248b6be09b28fee0c76e893ff0
-
SHA1
c3f203454c46f43e8eb1322148c2ab0762fe4941
-
SHA256
07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6
-
SHA512
0690b14ffa17ce6a5854d6515b9b8ef3558ac7142b34f6b56a12fbc53393409eb30b220a7ab4b62188a4ab45002e17d4209e6bedf8440843fe8060dc9fcc81ad
-
SSDEEP
49152:aVlzUpabk4K0uM6uDjQSMBk7mKpJlsarEiBgWO:a/zUp2+0uME67mKfqWE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
pid Process 2560 skotes.exe 2556 8915fe36f2.exe 4392 8915fe36f2.exe 1652 skotes.exe 532 3adf4d469d.exe 4620 3adf4d469d.exe 3900 3adf4d469d.exe 2020 skotes.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe 2560 skotes.exe 1652 skotes.exe 2020 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2556 set thread context of 4392 2556 8915fe36f2.exe 85 PID 532 set thread context of 3900 532 3adf4d469d.exe 99 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8915fe36f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8915fe36f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3adf4d469d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3adf4d469d.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe 2560 skotes.exe 2560 skotes.exe 1652 skotes.exe 1652 skotes.exe 2020 skotes.exe 2020 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2560 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe 82 PID 1996 wrote to memory of 2560 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe 82 PID 1996 wrote to memory of 2560 1996 07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe 82 PID 2560 wrote to memory of 2556 2560 skotes.exe 83 PID 2560 wrote to memory of 2556 2560 skotes.exe 83 PID 2560 wrote to memory of 2556 2560 skotes.exe 83 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2556 wrote to memory of 4392 2556 8915fe36f2.exe 85 PID 2560 wrote to memory of 532 2560 skotes.exe 96 PID 2560 wrote to memory of 532 2560 skotes.exe 96 PID 2560 wrote to memory of 532 2560 skotes.exe 96 PID 532 wrote to memory of 4620 532 3adf4d469d.exe 98 PID 532 wrote to memory of 4620 532 3adf4d469d.exe 98 PID 532 wrote to memory of 4620 532 3adf4d469d.exe 98 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99 PID 532 wrote to memory of 3900 532 3adf4d469d.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe"C:\Users\Admin\AppData\Local\Temp\07ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\1016773001\8915fe36f2.exe"C:\Users\Admin\AppData\Local\Temp\1016773001\8915fe36f2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\1016773001\8915fe36f2.exe"C:\Users\Admin\AppData\Local\Temp\1016773001\8915fe36f2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016775001\3adf4d469d.exe"C:\Users\Admin\AppData\Local\Temp\1016775001\3adf4d469d.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\1016775001\3adf4d469d.exe"C:\Users\Admin\AppData\Local\Temp\1016775001\3adf4d469d.exe"4⤵
- Executes dropped EXE
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\1016775001\3adf4d469d.exe"C:\Users\Admin\AppData\Local\Temp\1016775001\3adf4d469d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD5aefb22af7cbb1941059d3a6d6f422ce9
SHA1ab7f54f5cfc977439058c7d98430186f6f8ca4a6
SHA2561df90b30b6f55bb37b14015a87acfd760ad99a245b2a588a5b656d2db82a844f
SHA512154afd8521e487d512fe527a6f21971fb31733f27de921083a237949971ffa9c068a316d92c6559bba931dd640b50e7581ef1153c4ba2f81985f7211b2c2f246
-
Filesize
747KB
MD58a9cb17c0224a01bd34b46495983c50a
SHA100296ea6a56f6e10a0f1450a20c5fb329b8856c1
SHA2563d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b
SHA5121472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840
-
Filesize
2.9MB
MD5f7b231248b6be09b28fee0c76e893ff0
SHA1c3f203454c46f43e8eb1322148c2ab0762fe4941
SHA25607ea371c105b118080fe316b39a8bc08a1eb083850fe442bdc5fa98e92ad98e6
SHA5120690b14ffa17ce6a5854d6515b9b8ef3558ac7142b34f6b56a12fbc53393409eb30b220a7ab4b62188a4ab45002e17d4209e6bedf8440843fe8060dc9fcc81ad