Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
b406ea5a7e49fac393c76ae7902269db
-
SHA1
b37dbbbe5b1aa93515c2347c328b372ef0149cbb
-
SHA256
7439a1cdf0d05d91d25d3be874ee54557494af5f6b2fc3373654c87266828504
-
SHA512
b495218372ffe3369a13def84318913638a96dba8295b77d23c821acb8ef4eca3c08beb45d0dd1a450ad339039b1f1589783fa58f3d495854d7081908e52c4e1
-
SSDEEP
49152:A2FzteCwImhdzbDf9BzYJ7+zI8AJ/WWs:A2LeCwImhdzbDfTE7+x
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1808 created 1212 1808 27c48e4c66.exe 21 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 27c48e4c66.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27c48e4c66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27c48e4c66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Executes dropped EXE 3 IoCs
pid Process 1920 skotes.exe 1488 796efe4a62.exe 1808 27c48e4c66.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 27c48e4c66.exe -
Loads dropped DLL 6 IoCs
pid Process 2504 file.exe 2504 file.exe 1920 skotes.exe 1920 skotes.exe 1920 skotes.exe 1920 skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2504 file.exe 1920 skotes.exe 1808 27c48e4c66.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27c48e4c66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2504 file.exe 1920 skotes.exe 1808 27c48e4c66.exe 1808 27c48e4c66.exe 1808 27c48e4c66.exe 1808 27c48e4c66.exe 1808 27c48e4c66.exe 2884 dialer.exe 2884 dialer.exe 2884 dialer.exe 2884 dialer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 file.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1920 2504 file.exe 30 PID 2504 wrote to memory of 1920 2504 file.exe 30 PID 2504 wrote to memory of 1920 2504 file.exe 30 PID 2504 wrote to memory of 1920 2504 file.exe 30 PID 1920 wrote to memory of 1488 1920 skotes.exe 33 PID 1920 wrote to memory of 1488 1920 skotes.exe 33 PID 1920 wrote to memory of 1488 1920 skotes.exe 33 PID 1920 wrote to memory of 1488 1920 skotes.exe 33 PID 1920 wrote to memory of 1808 1920 skotes.exe 35 PID 1920 wrote to memory of 1808 1920 skotes.exe 35 PID 1920 wrote to memory of 1808 1920 skotes.exe 35 PID 1920 wrote to memory of 1808 1920 skotes.exe 35 PID 1808 wrote to memory of 2884 1808 27c48e4c66.exe 36 PID 1808 wrote to memory of 2884 1808 27c48e4c66.exe 36 PID 1808 wrote to memory of 2884 1808 27c48e4c66.exe 36 PID 1808 wrote to memory of 2884 1808 27c48e4c66.exe 36 PID 1808 wrote to memory of 2884 1808 27c48e4c66.exe 36 PID 1808 wrote to memory of 2884 1808 27c48e4c66.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\1016648001\796efe4a62.exe"C:\Users\Admin\AppData\Local\Temp\1016648001\796efe4a62.exe"4⤵
- Executes dropped EXE
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\1016649001\27c48e4c66.exe"C:\Users\Admin\AppData\Local\Temp\1016649001\27c48e4c66.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.9MB
MD58317f4066452222fae09837c5df94ed2
SHA1af3dae4376723dea094f0caba585af5df3b24269
SHA256b363421afbee72e899d54508026f0c766bd04333ec087c8c96614c9bc735be56
SHA5128a26b6c4ec847733786efb5157358d3353e917b046be39d44ae9635ba31e98e7b0fc454aaf9d7b07b6648c5364218a749b4652ac941b813475f01bac6a3f2f8a
-
Filesize
2.9MB
MD5b406ea5a7e49fac393c76ae7902269db
SHA1b37dbbbe5b1aa93515c2347c328b372ef0149cbb
SHA2567439a1cdf0d05d91d25d3be874ee54557494af5f6b2fc3373654c87266828504
SHA512b495218372ffe3369a13def84318913638a96dba8295b77d23c821acb8ef4eca3c08beb45d0dd1a450ad339039b1f1589783fa58f3d495854d7081908e52c4e1