Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe
Resource
win7-20241010-en
General
-
Target
89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe
-
Size
2.9MB
-
MD5
99a7a8ab2463dd70f90e0ab4e0aec4a8
-
SHA1
b9e2b99b7124d83df3b7cd052231cb35d1d6efcb
-
SHA256
89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61
-
SHA512
8e775104cc32b5426fbfe170632ca36949e66701a52b83fd8378b4eca239f928094dfca10ba9ae363c8aaad59f863260427fc5449ea7ca0e22ddda4256326e55
-
SSDEEP
49152:rXbVHNeIAyjLGBiZQo42rhxAZimUH0wH6faFgmiCk/uIL:rzxXnGBiZQo42rhxAZi0wHymU
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Gcleaner family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 01c4106279.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 01c4106279.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a96a9a7444.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a96a9a7444.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 01c4106279.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 01c4106279.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a96a9a7444.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 6 IoCs
pid Process 2536 skotes.exe 828 01c4106279.exe 4320 skotes.exe 4740 a96a9a7444.exe 1060 skotes.exe 4652 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 01c4106279.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine a96a9a7444.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe 2536 skotes.exe 828 01c4106279.exe 4320 skotes.exe 4740 a96a9a7444.exe 1060 skotes.exe 4652 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 676 4740 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a96a9a7444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01c4106279.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe 2536 skotes.exe 2536 skotes.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 828 01c4106279.exe 4320 skotes.exe 4320 skotes.exe 4740 a96a9a7444.exe 4740 a96a9a7444.exe 1060 skotes.exe 1060 skotes.exe 4652 skotes.exe 4652 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2536 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe 82 PID 3680 wrote to memory of 2536 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe 82 PID 3680 wrote to memory of 2536 3680 89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe 82 PID 2536 wrote to memory of 828 2536 skotes.exe 83 PID 2536 wrote to memory of 828 2536 skotes.exe 83 PID 2536 wrote to memory of 828 2536 skotes.exe 83 PID 2536 wrote to memory of 4740 2536 skotes.exe 89 PID 2536 wrote to memory of 4740 2536 skotes.exe 89 PID 2536 wrote to memory of 4740 2536 skotes.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe"C:\Users\Admin\AppData\Local\Temp\89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\1019819001\01c4106279.exe"C:\Users\Admin\AppData\Local\Temp\1019819001\01c4106279.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\1019820001\a96a9a7444.exe"C:\Users\Admin\AppData\Local\Temp\1019820001\a96a9a7444.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 6444⤵
- Program crash
PID:676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4740 -ip 47401⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
4.2MB
MD517830e6496a4fa2d4dc73ba36ce61725
SHA1b5bd42c48ba9fde8db5c37a9e11518f3f909eaed
SHA2566ee8b2cf092df2b52451c4b328d93d7abcb48f5ebc7dc3a5ab328ea633bd1785
SHA51279fd3bba3b5e30f6e864cbf5c9e9385b7b0c39a724f68975875a7add0f67c3eddcfa3251ef127a2fe3f0fce80992caea858a774999184ab9f22ebfee6672ef1f
-
Filesize
1.9MB
MD563941836d5c054b13ae7b96f743c38cb
SHA1194fca3efeb1c402150a20cbb78222e779319011
SHA256c18ee07ad8e0958f78b1c943cf49923b8c18e7a2851730325d1ff40f0da3d033
SHA51206ed190d98d3b9b20785ea2ae2c2a787c209e6dd34f3deb0254e5b092dd16ceb48ae2185fe9f943a3145e2683707530057c4c3fc4b9b9c719d2295b3bbd4e8e3
-
Filesize
2.9MB
MD599a7a8ab2463dd70f90e0ab4e0aec4a8
SHA1b9e2b99b7124d83df3b7cd052231cb35d1d6efcb
SHA25689601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61
SHA5128e775104cc32b5426fbfe170632ca36949e66701a52b83fd8378b4eca239f928094dfca10ba9ae363c8aaad59f863260427fc5449ea7ca0e22ddda4256326e55