Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe
Resource
win10v2004-20241007-en
General
-
Target
0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe
-
Size
2.9MB
-
MD5
d7113b1a5be08cf46656bcc72d1da368
-
SHA1
cb8c987c86f7eb7a884bb69e826b08e143d0e027
-
SHA256
0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e
-
SHA512
37728ff308accebcdedcc13e4d730d4e1ce1e97c1c372498090facc960bf31e8557009c59cc4254cb52fdfdd6bce3507e6d838bac70f028b9c93db29a17b175c
-
SSDEEP
49152:/P3rIIr3MtpBciwvsWcxVlYC5PsS2EOtQLp:33rIIr3MbBciwvsWcPlYIP8EOtq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
cryptbot
http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b6632767e8.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1e0699415.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b6632767e8.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1e0699415.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6632767e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6632767e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1e0699415.exe -
Executes dropped EXE 3 IoCs
pid Process 2912 skotes.exe 1480 a1e0699415.exe 1036 b6632767e8.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine a1e0699415.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine b6632767e8.exe -
Loads dropped DLL 5 IoCs
pid Process 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 2912 skotes.exe 2912 skotes.exe 2912 skotes.exe 2912 skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 2912 skotes.exe 1480 a1e0699415.exe 1036 b6632767e8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1e0699415.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6632767e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 2912 skotes.exe 1480 a1e0699415.exe 1036 b6632767e8.exe 1036 b6632767e8.exe 1036 b6632767e8.exe 1036 b6632767e8.exe 1036 b6632767e8.exe 1036 b6632767e8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 800 wrote to memory of 2912 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 28 PID 800 wrote to memory of 2912 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 28 PID 800 wrote to memory of 2912 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 28 PID 800 wrote to memory of 2912 800 0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe 28 PID 2912 wrote to memory of 1480 2912 skotes.exe 30 PID 2912 wrote to memory of 1480 2912 skotes.exe 30 PID 2912 wrote to memory of 1480 2912 skotes.exe 30 PID 2912 wrote to memory of 1480 2912 skotes.exe 30 PID 2912 wrote to memory of 1036 2912 skotes.exe 31 PID 2912 wrote to memory of 1036 2912 skotes.exe 31 PID 2912 wrote to memory of 1036 2912 skotes.exe 31 PID 2912 wrote to memory of 1036 2912 skotes.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe"C:\Users\Admin\AppData\Local\Temp\0f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\1017267001\a1e0699415.exe"C:\Users\Admin\AppData\Local\Temp\1017267001\a1e0699415.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\1017268001\b6632767e8.exe"C:\Users\Admin\AppData\Local\Temp\1017268001\b6632767e8.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
4.3MB
MD5d6cfec5f8c250d92d751030c95d46aec
SHA170439cf2611f97c84af487c44b88703d004a2bca
SHA2560200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611
SHA512a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.9MB
MD5d7113b1a5be08cf46656bcc72d1da368
SHA1cb8c987c86f7eb7a884bb69e826b08e143d0e027
SHA2560f24d4438de4579512f19caf0bda9182a23630286b23d6cfbff7299fa10f025e
SHA51237728ff308accebcdedcc13e4d730d4e1ce1e97c1c372498090facc960bf31e8557009c59cc4254cb52fdfdd6bce3507e6d838bac70f028b9c93db29a17b175c