Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe
Resource
win7-20240903-en
General
-
Target
3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe
-
Size
3.1MB
-
MD5
54ac0a75d4f6e5a4fd5930904851b84d
-
SHA1
3a5a99a6fefea2f78b9c581a6a530c8e65c6f908
-
SHA256
3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8
-
SHA512
f06c7adab4ab2bc59eb70efbbbdf17d9fb0c7776bf10c263de173ddc78a09f7ee96ca7bb7cabd8c671f43d221d7508f2a6923e22426839b3c8dcaefd920a0a40
-
SSDEEP
49152:29atuP51AXhE7JlmTqs3J5nd7jQJMG+I00blNam3TnB6e9BkvY3wy:2Itu7AXy7JlmTqsZ5RQJM90KC7B+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/2260-56-0x0000000000C00000-0x0000000000E39000-memory.dmp family_vidar_v7 behavioral2/memory/2260-58-0x0000000000C00000-0x0000000000E39000-memory.dmp family_vidar_v7 behavioral2/memory/2260-65-0x0000000000C00000-0x0000000000E39000-memory.dmp family_vidar_v7 behavioral2/memory/2260-66-0x0000000000C00000-0x0000000000E39000-memory.dmp family_vidar_v7 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 4 IoCs
pid Process 4132 skotes.exe 3300 skotes.exe 4104 c1dccd5243.exe 1872 skotes.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 4132 skotes.exe 3300 skotes.exe 1872 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4104 set thread context of 2260 4104 c1dccd5243.exe 101 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1dccd5243.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2720 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 4132 skotes.exe 4132 skotes.exe 3300 skotes.exe 3300 skotes.exe 2260 BitLockerToGo.exe 2260 BitLockerToGo.exe 1872 skotes.exe 1872 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4132 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 83 PID 3596 wrote to memory of 4132 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 83 PID 3596 wrote to memory of 4132 3596 3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe 83 PID 4132 wrote to memory of 4104 4132 skotes.exe 99 PID 4132 wrote to memory of 4104 4132 skotes.exe 99 PID 4132 wrote to memory of 4104 4132 skotes.exe 99 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 4104 wrote to memory of 2260 4104 c1dccd5243.exe 101 PID 2260 wrote to memory of 1248 2260 BitLockerToGo.exe 103 PID 2260 wrote to memory of 1248 2260 BitLockerToGo.exe 103 PID 2260 wrote to memory of 1248 2260 BitLockerToGo.exe 103 PID 1248 wrote to memory of 2720 1248 cmd.exe 105 PID 1248 wrote to memory of 2720 1248 cmd.exe 105 PID 1248 wrote to memory of 2720 1248 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe"C:\Users\Admin\AppData\Local\Temp\3010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\1022088001\c1dccd5243.exe"C:\Users\Admin\AppData\Local\Temp\1022088001\c1dccd5243.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" & rd /s /q "C:\ProgramData\V3WLNGD26F3E" & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2720
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5869a379b11cc9dedb1466eee7d03f89e
SHA14c4437ed449474b136c2750e6e61b7c0e4b69fa5
SHA2566a603b5bea283177b1a4904ad3cc047c9eb8e9626d7b76141bf4e0ae711b5ee9
SHA5124e2f5113a1250403aa714e6e1c589ada920d7d79066cfa1c21bf0ab2eb71bbbfdc49936a4367a74862e1cd479a98d71a38fe691ed59d4e77237d0b1710ede7b9
-
Filesize
3.1MB
MD554ac0a75d4f6e5a4fd5930904851b84d
SHA13a5a99a6fefea2f78b9c581a6a530c8e65c6f908
SHA2563010960c4a1bafe8ef712440e65c702d80f7cd05ff6aa22fcef3071de819fcb8
SHA512f06c7adab4ab2bc59eb70efbbbdf17d9fb0c7776bf10c263de173ddc78a09f7ee96ca7bb7cabd8c671f43d221d7508f2a6923e22426839b3c8dcaefd920a0a40