Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 11:15

General

  • Target

    file.exe

  • Size

    2.8MB

  • MD5

    e4a2fce17d20f9501197dc633992b99c

  • SHA1

    fb6c2a1c7122d61926d264aea8dc586a393a0948

  • SHA256

    e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10

  • SHA512

    3f1273c1d69b8af3a538195bda756dc2bb63df74140f4710731454fa0071e4758f129f54cbd46bcbc30afa237e7f3a261953e971da35d9e91e6a09f316a12f40

  • SSDEEP

    49152:4D/Gf3HFtXn8J9i2ini7HOsuTMd/6FQcfT2JgD3:4D/Gf3nXi9i2RusuTIIQcaJgD

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

cryptbot

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\1017558001\e42ec3b2d5.exe
        "C:\Users\Admin\AppData\Local\Temp\1017558001\e42ec3b2d5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Users\Admin\AppData\Local\Temp\1017558001\e42ec3b2d5.exe
          "C:\Users\Admin\AppData\Local\Temp\1017558001\e42ec3b2d5.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
      • C:\Users\Admin\AppData\Local\Temp\1017559001\3a8b1f8eed.exe
        "C:\Users\Admin\AppData\Local\Temp\1017559001\3a8b1f8eed.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4552
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:916
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:5256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e42ec3b2d5.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Temp\1017558001\e42ec3b2d5.exe

    Filesize

    1.1MB

    MD5

    ef08a45833a7d881c90ded1952f96cb4

    SHA1

    f04aeeb63a1409bd916558d2c40fab8a5ed8168b

    SHA256

    33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

    SHA512

    74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

  • C:\Users\Admin\AppData\Local\Temp\1017559001\3a8b1f8eed.exe

    Filesize

    4.2MB

    MD5

    03ae071235d37edc3ea30848462bccbc

    SHA1

    d8425df6c157fc8699596f64a0bf996692ebc947

    SHA256

    72662d9e82835cb7e3210889828befd75dd7921c8bb6c45f5757c23602432536

    SHA512

    2ef13be57bdebf61bf59e7b39a5c522f91ddb9d003a1a9a66b3fa9c7ef35ead57626858050ef2615ed87da4a32759328121e63fb46b2b4ce2f949caeea8871dc

  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

    Filesize

    2.8MB

    MD5

    e4a2fce17d20f9501197dc633992b99c

    SHA1

    fb6c2a1c7122d61926d264aea8dc586a393a0948

    SHA256

    e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10

    SHA512

    3f1273c1d69b8af3a538195bda756dc2bb63df74140f4710731454fa0071e4758f129f54cbd46bcbc30afa237e7f3a261953e971da35d9e91e6a09f316a12f40

  • memory/916-2149-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/916-2151-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/1480-43-0x00000000002D0000-0x00000000003E6000-memory.dmp

    Filesize

    1.1MB

  • memory/1480-44-0x00000000077E0000-0x0000000007D84000-memory.dmp

    Filesize

    5.6MB

  • memory/1480-45-0x00000000072D0000-0x0000000007362000-memory.dmp

    Filesize

    584KB

  • memory/1480-70-0x0000000005290000-0x0000000005352000-memory.dmp

    Filesize

    776KB

  • memory/1480-68-0x00000000738AE000-0x00000000738AF000-memory.dmp

    Filesize

    4KB

  • memory/1480-42-0x00000000738AE000-0x00000000738AF000-memory.dmp

    Filesize

    4KB

  • memory/1480-48-0x0000000008920000-0x0000000008946000-memory.dmp

    Filesize

    152KB

  • memory/1480-47-0x00000000075B0000-0x000000000764C000-memory.dmp

    Filesize

    624KB

  • memory/1480-46-0x0000000004890000-0x000000000489A000-memory.dmp

    Filesize

    40KB

  • memory/2576-90-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-94-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-2145-0x00000000058F0000-0x0000000005956000-memory.dmp

    Filesize

    408KB

  • memory/2576-2144-0x0000000005670000-0x00000000056BC000-memory.dmp

    Filesize

    304KB

  • memory/2576-2143-0x00000000055E0000-0x000000000560C000-memory.dmp

    Filesize

    176KB

  • memory/2576-79-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-80-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-116-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-82-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-84-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-86-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-88-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-92-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-96-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-98-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-102-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-74-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2576-104-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-78-0x0000000005500000-0x0000000005598000-memory.dmp

    Filesize

    608KB

  • memory/2576-106-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-100-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-136-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-134-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-132-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-130-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-129-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-126-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-124-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-122-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-120-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-118-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-114-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-112-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-110-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2576-108-0x0000000005500000-0x0000000005591000-memory.dmp

    Filesize

    580KB

  • memory/2700-18-0x0000000000760000-0x0000000000A6E000-memory.dmp

    Filesize

    3.1MB

  • memory/2700-3-0x0000000000760000-0x0000000000A6E000-memory.dmp

    Filesize

    3.1MB

  • memory/2700-0-0x0000000000760000-0x0000000000A6E000-memory.dmp

    Filesize

    3.1MB

  • memory/2700-1-0x0000000077C94000-0x0000000077C96000-memory.dmp

    Filesize

    8KB

  • memory/2700-4-0x0000000000760000-0x0000000000A6E000-memory.dmp

    Filesize

    3.1MB

  • memory/2700-2-0x0000000000761000-0x000000000078F000-memory.dmp

    Filesize

    184KB

  • memory/3008-51-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-41-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-19-0x00000000000D1000-0x00000000000FF000-memory.dmp

    Filesize

    184KB

  • memory/3008-16-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-21-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-50-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-49-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-69-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-22-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/3008-20-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB

  • memory/4552-67-0x0000000000040000-0x0000000000B99000-memory.dmp

    Filesize

    11.3MB

  • memory/4552-71-0x0000000000040000-0x0000000000B99000-memory.dmp

    Filesize

    11.3MB

  • memory/4552-73-0x0000000000040000-0x0000000000B99000-memory.dmp

    Filesize

    11.3MB

  • memory/5256-2160-0x00000000000D0000-0x00000000003DE000-memory.dmp

    Filesize

    3.1MB