Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe
Resource
win7-20240903-en
General
-
Target
e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe
-
Size
3.1MB
-
MD5
0a8673bbea31ae21e9e87be408752436
-
SHA1
a8c29df353c7af7928ce3e24a9f606f0787109ac
-
SHA256
e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c
-
SHA512
31d1336cf35adecbed5d42e6910b24fbe01e4671aa12815c5d1d00b27f93228f35f290f570c4142622d53f8b91b4adc764020ec2d52a5ed18794308ebc64aad3
-
SSDEEP
49152:aUnOVfsVG4mPq3wMSk7+7NNnAXbfHQfiXCbSByOPssk:vnafcXmPUwMSk7+TnuLyTO0
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f9ef93c16.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f9ef93c16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f9ef93c16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe -
Executes dropped EXE 5 IoCs
pid Process 2800 skotes.exe 2088 3f9ef93c16.exe 1316 axplong.exe 2508 Shnnfd.exe 876 3dRZ0DE06x77LYjk.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 3f9ef93c16.exe -
Loads dropped DLL 9 IoCs
pid Process 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 2800 skotes.exe 2800 skotes.exe 2088 3f9ef93c16.exe 2088 3f9ef93c16.exe 2800 skotes.exe 2800 skotes.exe 2508 Shnnfd.exe 2508 Shnnfd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 15 raw.githubusercontent.com 16 raw.githubusercontent.com 17 raw.githubusercontent.com 18 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 2800 skotes.exe 2088 3f9ef93c16.exe 1316 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 3f9ef93c16.exe File created C:\Windows\Tasks\skotes.job e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f9ef93c16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shnnfd.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e skotes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 skotes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 skotes.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 2800 skotes.exe 2088 3f9ef93c16.exe 1316 axplong.exe 2508 Shnnfd.exe 876 3dRZ0DE06x77LYjk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 2088 3f9ef93c16.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2800 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 30 PID 2400 wrote to memory of 2800 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 30 PID 2400 wrote to memory of 2800 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 30 PID 2400 wrote to memory of 2800 2400 e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe 30 PID 2800 wrote to memory of 2088 2800 skotes.exe 33 PID 2800 wrote to memory of 2088 2800 skotes.exe 33 PID 2800 wrote to memory of 2088 2800 skotes.exe 33 PID 2800 wrote to memory of 2088 2800 skotes.exe 33 PID 2088 wrote to memory of 1316 2088 3f9ef93c16.exe 34 PID 2088 wrote to memory of 1316 2088 3f9ef93c16.exe 34 PID 2088 wrote to memory of 1316 2088 3f9ef93c16.exe 34 PID 2088 wrote to memory of 1316 2088 3f9ef93c16.exe 34 PID 2800 wrote to memory of 2508 2800 skotes.exe 35 PID 2800 wrote to memory of 2508 2800 skotes.exe 35 PID 2800 wrote to memory of 2508 2800 skotes.exe 35 PID 2800 wrote to memory of 2508 2800 skotes.exe 35 PID 2508 wrote to memory of 876 2508 Shnnfd.exe 37 PID 2508 wrote to memory of 876 2508 Shnnfd.exe 37 PID 2508 wrote to memory of 876 2508 Shnnfd.exe 37 PID 2508 wrote to memory of 876 2508 Shnnfd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe"C:\Users\Admin\AppData\Local\Temp\e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\1022129001\3f9ef93c16.exe"C:\Users\Admin\AppData\Local\Temp\1022129001\3f9ef93c16.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1022466001\Shnnfd.exe"C:\Users\Admin\AppData\Local\Temp\1022466001\Shnnfd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\RwP9xj3E\3dRZ0DE06x77LYjk.exeC:\Users\Admin\AppData\Local\Temp\RwP9xj3E\3dRZ0DE06x77LYjk.exe 25084⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\1022466001\l1RSlYHjFRIRVGLZ.exeC:\Users\Admin\AppData\Local\Temp\1022466001\l1RSlYHjFRIRVGLZ.exe 25084⤵PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\1022466001\3sjIlSF7qrgRNvWL.exeC:\Users\Admin\AppData\Local\Temp\1022466001\3sjIlSF7qrgRNvWL.exe 25084⤵PID:3024
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD580c21c4b165f42f2379c542f4eb13c0d
SHA1927620d4760d86b6fcb9773a1bb670fecc25431b
SHA256316af19c816cddd0520b05484abdd39f3d27656594cc7d252727a67c26e9cdbb
SHA5122931fff6760ecc7e6853062bc55f5eac38096d545fdd20255f308352b8572b2bfef963704e48d752b7721f5b922543524d8ba74f6426c5695073776e3f4ab10c
-
Filesize
1.7MB
MD5e7768d0721abc2f32508bfdf8e93eaff
SHA1932bdc0fea88765b8b3c19f954d435795034501c
SHA25614a2acd49ca035c99cc44620b37195fbac3ebcb616e85e4b9bcb5d1da2df0ddc
SHA512802e61cc187a12bf30c4714aa8cc36b3cba0664b2d0cdb33cf361bd6c981889ad06f61f33f23e0cf87cb7f281ac59750f81bc5bbdfa3f4583065f05aa0af2985
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.6MB
MD515076665c6b283870bf123a76ee7c671
SHA11852ef621ef3337ff01a6f7977fc83c5c2853405
SHA2564ea1a1ca6f2657c2f9b7ac533cd30ad7b1b57bf5d8199c113c5d0b8155863856
SHA51284d36ae9fcb700d58e66543eedfb2621280641b52c1dafe6c46343098063c503f63b868cf3eab3d380205cd832bc5156a42c6585bea29c6ff6d8f3c1334e99a5
-
Filesize
3.1MB
MD50a8673bbea31ae21e9e87be408752436
SHA1a8c29df353c7af7928ce3e24a9f606f0787109ac
SHA256e2ae261a55bc83c0e3c9ab657a16d2c76a329b6a4ff40370119e079f2631b69c
SHA51231d1336cf35adecbed5d42e6910b24fbe01e4671aa12815c5d1d00b27f93228f35f290f570c4142622d53f8b91b4adc764020ec2d52a5ed18794308ebc64aad3