Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe
Resource
win7-20240903-en
General
-
Target
3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe
-
Size
3.1MB
-
MD5
54ac0a75d4f6e5a4fd5930904851b84d
-
SHA1
3a5a99a6fefea2f78b9c581a6a530c8e65c6f908
-
SHA256
3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8
-
SHA512
f06c7adab4ab2bc59eb70efbbbdf17d9fb0c7776bf10c263de173ddc78a09f7ee96ca7bb7cabd8c671f43d221d7508f2a6923e22426839b3c8dcaefd920a0a40
-
SSDEEP
49152:29atuP51AXhE7JlmTqs3J5nd7jQJMG+I00blNam3TnB6e9BkvY3wy:2Itu7AXy7JlmTqsZ5RQJM90KC7B+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Executes dropped EXE 2 IoCs
pid Process 1580 skotes.exe 2424 c1dccd5243.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 1580 skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 1580 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 1580 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1580 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 30 PID 2508 wrote to memory of 1580 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 30 PID 2508 wrote to memory of 1580 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 30 PID 2508 wrote to memory of 1580 2508 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 30 PID 1580 wrote to memory of 2424 1580 skotes.exe 33 PID 1580 wrote to memory of 2424 1580 skotes.exe 33 PID 1580 wrote to memory of 2424 1580 skotes.exe 33 PID 1580 wrote to memory of 2424 1580 skotes.exe 33 PID 1580 wrote to memory of 2424 1580 skotes.exe 33 PID 1580 wrote to memory of 2424 1580 skotes.exe 33 PID 1580 wrote to memory of 2424 1580 skotes.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe"C:\Users\Admin\AppData\Local\Temp\3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\1022088001\c1dccd5243.exe"C:\Users\Admin\AppData\Local\Temp\1022088001\c1dccd5243.exe"3⤵
- Executes dropped EXE
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.0MB
MD59249840d6ab2d508ee4a5f5cf8827acc
SHA1dd1ea35b14421bd6a2d4646ce1018dee47164be3
SHA25671d2512e91b769040d0e61e3c458c28926de623dc312e5a087f2d86401709ef2
SHA5127d7100c3f732f5d22cdd6d619a0b4ffb07fb06498e487af60a3dcedda57b031e5efbeb58e39fbd587ffb300db15aec14947160afaa8eb628d692b75187e5156d
-
Filesize
3.1MB
MD554ac0a75d4f6e5a4fd5930904851b84d
SHA13a5a99a6fefea2f78b9c581a6a530c8e65c6f908
SHA2563010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8
SHA512f06c7adab4ab2bc59eb70efbbbdf17d9fb0c7776bf10c263de173ddc78a09f7ee96ca7bb7cabd8c671f43d221d7508f2a6923e22426839b3c8dcaefd920a0a40