Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 19:43
Static task
static1
General
-
Target
7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe
-
Size
3.6MB
-
MD5
28e8937556ae9a5b5176c90e415221e0
-
SHA1
0b911a97591793273245feab0dbbe11649e00844
-
SHA256
7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355f
-
SHA512
ae60d71af9d1ca5d2d4dee650cfdaaa0c396dd6308085415a4fd4bebffe9ef2c0af46d4b82745ca5e1b4494891013464b7566c6613fd66abb7a5c356c7543556
-
SSDEEP
98304:KYRi+MRXEDzVlldOohqSm+U2tOMf6SprBvf4iC2XS:p/M1QPlzqSmri6SlBhxi
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e59v5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e7735.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e59v5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e7735.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e7735.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e59v5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1e59v5.exe -
Executes dropped EXE 5 IoCs
pid Process 368 1e59v5.exe 976 skotes.exe 1848 2e7735.exe 3696 skotes.exe 5112 skotes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1e59v5.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2e7735.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 368 1e59v5.exe 976 skotes.exe 1848 2e7735.exe 3696 skotes.exe 5112 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1e59v5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e7735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e59v5.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 368 1e59v5.exe 368 1e59v5.exe 976 skotes.exe 976 skotes.exe 1848 2e7735.exe 1848 2e7735.exe 3696 skotes.exe 3696 skotes.exe 5112 skotes.exe 5112 skotes.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 960 wrote to memory of 368 960 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe 83 PID 960 wrote to memory of 368 960 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe 83 PID 960 wrote to memory of 368 960 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe 83 PID 368 wrote to memory of 976 368 1e59v5.exe 84 PID 368 wrote to memory of 976 368 1e59v5.exe 84 PID 368 wrote to memory of 976 368 1e59v5.exe 84 PID 960 wrote to memory of 1848 960 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe 85 PID 960 wrote to memory of 1848 960 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe 85 PID 960 wrote to memory of 1848 960 7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe"C:\Users\Admin\AppData\Local\Temp\7d49e1a1eb931284535678c149489ff573e71195e9aaafa86bda4f0bbc16355fN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1e59v5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1e59v5.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2e7735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2e7735.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e561b6e364aea1b25acad1319773f9c6
SHA1bfb821050c97947530713f5d2784e8b25e742c0e
SHA25634fb95bb02f6f53584eaefe99950aaafa68cac6fbcaaba201fe7ceff7cafc63c
SHA5125a2b1ae562aa54320da4f59adbf7aee2f8136e6f436a14ec41b414f38c448ff94b27c31ef7fb2039e5004f0e3e09f1a0990b3cffc9d474f9cb7a43386395612a
-
Filesize
1.8MB
MD5fa6d16ce8d95428b4d8016eb5a497666
SHA1258f6e54ffc8ed9c8a7f24fd749700b8876fe68e
SHA2561d78d31fc4a2f38a624178de6aba3c671884012cefb492a6cafaf6c74e0e4c5d
SHA512ec671ccb40726b69802d831b6aa606148ffcd4c96f302351a720136cbe7426c56d8cc9ce94976277da14384241c14a36a1f591200240562bd586db478bd40fc6