Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe
Resource
win7-20240903-en
General
-
Target
4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe
-
Size
2.8MB
-
MD5
5bf4d30eee7b7951072135193f435f40
-
SHA1
b0b712d7020ded9b13601c808d8e32a8a0a3cc3e
-
SHA256
4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf
-
SHA512
6e2ce78583fecc79d9ada4b935aa0012683524bb81346412d0d72a726160714716c4160ed703ff02f56c94e327fab0bd255d1e6641f38f777440144ff9212d9f
-
SSDEEP
24576:DxAq+jNJvAraB438wJItC8mKnd6ecW+KAVMaTqVaZjYAFIsBlGuS1oOkWo1ukL9J:2NlbBHtTd6ecfBn2kpH/AM22s1TgB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2024 created 1184 2024 97aa5d2045.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 494b28ab6b.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 494b28ab6b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97aa5d2045.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9f4bf59990.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 494b28ab6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97aa5d2045.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 494b28ab6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97aa5d2045.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9f4bf59990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9f4bf59990.exe -
Executes dropped EXE 4 IoCs
pid Process 2820 skotes.exe 1832 494b28ab6b.exe 2024 97aa5d2045.exe 288 9f4bf59990.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 97aa5d2045.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 9f4bf59990.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 494b28ab6b.exe -
Loads dropped DLL 7 IoCs
pid Process 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 2820 skotes.exe 2820 skotes.exe 2820 skotes.exe 2820 skotes.exe 2820 skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 2820 skotes.exe 1832 494b28ab6b.exe 2024 97aa5d2045.exe 288 9f4bf59990.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 494b28ab6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97aa5d2045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f4bf59990.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 2820 skotes.exe 1832 494b28ab6b.exe 1832 494b28ab6b.exe 1832 494b28ab6b.exe 1832 494b28ab6b.exe 1832 494b28ab6b.exe 1832 494b28ab6b.exe 2024 97aa5d2045.exe 2024 97aa5d2045.exe 2024 97aa5d2045.exe 2024 97aa5d2045.exe 2024 97aa5d2045.exe 2472 dialer.exe 2472 dialer.exe 2472 dialer.exe 2472 dialer.exe 288 9f4bf59990.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2820 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 30 PID 1672 wrote to memory of 2820 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 30 PID 1672 wrote to memory of 2820 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 30 PID 1672 wrote to memory of 2820 1672 4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe 30 PID 2820 wrote to memory of 1832 2820 skotes.exe 32 PID 2820 wrote to memory of 1832 2820 skotes.exe 32 PID 2820 wrote to memory of 1832 2820 skotes.exe 32 PID 2820 wrote to memory of 1832 2820 skotes.exe 32 PID 2820 wrote to memory of 2024 2820 skotes.exe 33 PID 2820 wrote to memory of 2024 2820 skotes.exe 33 PID 2820 wrote to memory of 2024 2820 skotes.exe 33 PID 2820 wrote to memory of 2024 2820 skotes.exe 33 PID 2024 wrote to memory of 2472 2024 97aa5d2045.exe 34 PID 2024 wrote to memory of 2472 2024 97aa5d2045.exe 34 PID 2024 wrote to memory of 2472 2024 97aa5d2045.exe 34 PID 2024 wrote to memory of 2472 2024 97aa5d2045.exe 34 PID 2024 wrote to memory of 2472 2024 97aa5d2045.exe 34 PID 2024 wrote to memory of 2472 2024 97aa5d2045.exe 34 PID 2820 wrote to memory of 288 2820 skotes.exe 35 PID 2820 wrote to memory of 288 2820 skotes.exe 35 PID 2820 wrote to memory of 288 2820 skotes.exe 35 PID 2820 wrote to memory of 288 2820 skotes.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe"C:\Users\Admin\AppData\Local\Temp\4832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\1016437001\494b28ab6b.exe"C:\Users\Admin\AppData\Local\Temp\1016437001\494b28ab6b.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\1016438001\97aa5d2045.exe"C:\Users\Admin\AppData\Local\Temp\1016438001\97aa5d2045.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\1016439001\9f4bf59990.exe"C:\Users\Admin\AppData\Local\Temp\1016439001\9f4bf59990.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:288
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD59bd5b9ceba49c19a9c2f80c23279d441
SHA158f855a1fd2fba52a9dab57da4b762e9620e437d
SHA256ede017ad6960a447c0f2337c5bee277d1ce62ee31fb9685e5a2a4628f0e6b31f
SHA5125a643d4afcd9eed9b2423256871c9d2859e14f5e8a36f6c8641efd95dfab5f86b82cbf2c1be32b85a954ce84c970e792759a5d29b7bb5d6bcdaa8a9e30a73f9a
-
Filesize
1.9MB
MD5129e9d731c27f28d25a824fecd066e54
SHA1c42fb09e9dbbb309db3a30deecf9a0edd285e7a1
SHA2560186a9725d8a17443751c82eee6683e68637fe4fd6f041f5d5855e6d8bd5ec47
SHA512a243cc3e7fd661bc37f90165f8494d45edb1a038e2e56513c256d1666d901298992d42390baed8c18f1ea68ac5400a8d2da9c25e49fc89315b6a2ae07e96f6fb
-
Filesize
1.8MB
MD5fd17d712c627b434e99749cfc82c7d51
SHA1bf00a1fe4d9efc63e963751201a383bf9df7d25e
SHA256af8729a17698880e54e9f23b48e6b68d73672179f58868c201c8cf54d1a578bc
SHA512b3f56a4457df967d9355f42316e8332813c46003b4d2e216fbabded7edcddcbefc72ee01fd706722cf81e2fb3e0986c31358a22270f7b36106e77a88b6c25c85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.8MB
MD55bf4d30eee7b7951072135193f435f40
SHA1b0b712d7020ded9b13601c808d8e32a8a0a3cc3e
SHA2564832db62e582a4f94a082189971f43e6570517486ea799a7661f795257e920cf
SHA5126e2ce78583fecc79d9ada4b935aa0012683524bb81346412d0d72a726160714716c4160ed703ff02f56c94e327fab0bd255d1e6641f38f777440144ff9212d9f