Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe
Resource
win7-20240903-en
General
-
Target
adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe
-
Size
2.9MB
-
MD5
9a764d69cfad04d9bca0f481b9aa3394
-
SHA1
f58792e51c6d46b5130869dbfd419f70de3c5437
-
SHA256
adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7
-
SHA512
a773d82069dd215a7e12eaebd2437ff63ba201711301d1aa81c8475c941238eb1212921a36b97d031079591c90ec4ca03d93b34a2432f2297bf428f9607ba9e9
-
SSDEEP
49152:amqU1NFMozxpjhCMVWHoPg8sCO9cRtAfR61WvjLCnoRs:aryFDzPjUMV4oTp6otAPvHooR
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1168 created 2660 1168 0e7dee85d3.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0e7dee85d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0e7dee85d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0e7dee85d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 4 IoCs
pid Process 2468 skotes.exe 1168 0e7dee85d3.exe 4004 skotes.exe 1324 skotes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 0e7dee85d3.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe 2468 skotes.exe 1168 0e7dee85d3.exe 4004 skotes.exe 1324 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1924 1168 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7dee85d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe 2468 skotes.exe 2468 skotes.exe 1168 0e7dee85d3.exe 1168 0e7dee85d3.exe 1168 0e7dee85d3.exe 1168 0e7dee85d3.exe 1168 0e7dee85d3.exe 1168 0e7dee85d3.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 3824 svchost.exe 4004 skotes.exe 4004 skotes.exe 1324 skotes.exe 1324 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2468 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe 82 PID 4884 wrote to memory of 2468 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe 82 PID 4884 wrote to memory of 2468 4884 adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe 82 PID 2468 wrote to memory of 1168 2468 skotes.exe 85 PID 2468 wrote to memory of 1168 2468 skotes.exe 85 PID 2468 wrote to memory of 1168 2468 skotes.exe 85 PID 1168 wrote to memory of 3824 1168 0e7dee85d3.exe 88 PID 1168 wrote to memory of 3824 1168 0e7dee85d3.exe 88 PID 1168 wrote to memory of 3824 1168 0e7dee85d3.exe 88 PID 1168 wrote to memory of 3824 1168 0e7dee85d3.exe 88 PID 1168 wrote to memory of 3824 1168 0e7dee85d3.exe 88
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2660
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe"C:\Users\Admin\AppData\Local\Temp\adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\1016812001\0e7dee85d3.exe"C:\Users\Admin\AppData\Local\Temp\1016812001\0e7dee85d3.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 5444⤵
- Program crash
PID:1924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1168 -ip 11681⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD569f8c74c8df30f4cb24914be23ea0f65
SHA1d3d87f52035a9363fab66cccfc349d31504001d3
SHA2569f62dad7fcef349974cac585e98b4bf2719eaf86f077e42917613aa3763a1c3e
SHA512c5bc99ddebaa02ccffcdc5a62a36e7688cb9994dcdec9fe218cfb596ada671717115403bb5f32de57aba04def8e2f8db30c95079baeb8311626ac29b16db785e
-
Filesize
2.9MB
MD59a764d69cfad04d9bca0f481b9aa3394
SHA1f58792e51c6d46b5130869dbfd419f70de3c5437
SHA256adbf3b490b2f6eeb173eb8c2734b86a290fe7ceebd65814ebed39453cca11ac7
SHA512a773d82069dd215a7e12eaebd2437ff63ba201711301d1aa81c8475c941238eb1212921a36b97d031079591c90ec4ca03d93b34a2432f2297bf428f9607ba9e9