Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe
Resource
win7-20240903-en
General
-
Target
7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe
-
Size
2.9MB
-
MD5
375e153f654df2bfdb976c882b45f7ee
-
SHA1
3cfb6520e5738940933a67b55c604342f9524cac
-
SHA256
7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0
-
SHA512
7256dca53420886d81863fc80d5aa4cb3b6d97f089d3f43ea55b12cbb52608533c26a7b38edd2deb5a191ad06aa26ef9f563f6b48f3722d5c875646a9f4de2d5
-
SSDEEP
49152:cNhhKC1DLsZ9d7L1GjQyptUw9+4auCYjAuLd:cNhh/VLGJd4atkA+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 skotes.exe 1948 b66a29be10.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 2804 skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 2804 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b66a29be10.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 2804 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2804 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 31 PID 2128 wrote to memory of 2804 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 31 PID 2128 wrote to memory of 2804 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 31 PID 2128 wrote to memory of 2804 2128 7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe 31 PID 2804 wrote to memory of 1948 2804 skotes.exe 34 PID 2804 wrote to memory of 1948 2804 skotes.exe 34 PID 2804 wrote to memory of 1948 2804 skotes.exe 34 PID 2804 wrote to memory of 1948 2804 skotes.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe"C:\Users\Admin\AppData\Local\Temp\7e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1019251001\b66a29be10.exe"C:\Users\Admin\AppData\Local\Temp\1019251001\b66a29be10.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624KB
MD54e5f8bf841c806ec47c06f9b4ea80c92
SHA1cc4a08f441374762462353ff4d0c22b162e74051
SHA256099edc3c0ab6ae9dab2f528855441c921080ef395c5f0b75d011c40777b48999
SHA5122bc18830e565a8ef04e4f45a706c754496bfba86256f324841f6d2d5c62f13964569fd020a7157c238b7acba6d71469b84e9025b882baf4800be10e4db03cd8f
-
Filesize
2.9MB
MD5375e153f654df2bfdb976c882b45f7ee
SHA13cfb6520e5738940933a67b55c604342f9524cac
SHA2567e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0
SHA5127256dca53420886d81863fc80d5aa4cb3b6d97f089d3f43ea55b12cbb52608533c26a7b38edd2deb5a191ad06aa26ef9f563f6b48f3722d5c875646a9f4de2d5