Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 17:02
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
7.3MB
-
MD5
68ed6eb42e4f604269632fb1f140454e
-
SHA1
865d58f1e293028bf1e2ccd923f2ca3e67d68b2b
-
SHA256
10b72f151dee3d7075be704a726e609b0a42bff9f75420b5bf952e03757e8ea6
-
SHA512
5d4fbb011839d60c5d6da8a6c6f83ef0b1bbf6809514117c96d1f9e9eed0fd6d962479861eebb6f71a660cbee73fa3b551289b34f750e00551ca77fa2f947199
-
SSDEEP
196608:5J6UczK1DpX5jlVUpjCWhOKiV91FsWTxZKsQIZIzAsTqot0e9:5N0KbX5jEpj9hlaPsoxZGdWe
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1k73S7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2m8966.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1k73S7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2m8966.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2m8966.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1k73S7.exe -
Executes dropped EXE 5 IoCs
pid Process 2840 s5F60.exe 3000 H7n39.exe 2708 1k73S7.exe 792 skotes.exe 2000 2m8966.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 2m8966.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 1k73S7.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe -
Loads dropped DLL 13 IoCs
pid Process 2756 random.exe 2840 s5F60.exe 2840 s5F60.exe 3000 H7n39.exe 3000 H7n39.exe 3000 H7n39.exe 2708 1k73S7.exe 2708 1k73S7.exe 2708 1k73S7.exe 792 skotes.exe 3000 H7n39.exe 3000 H7n39.exe 2000 2m8966.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" s5F60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" H7n39.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2708 1k73S7.exe 792 skotes.exe 2000 2m8966.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1k73S7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2m8966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s5F60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H7n39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1k73S7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2708 1k73S7.exe 792 skotes.exe 2000 2m8966.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 1k73S7.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2756 wrote to memory of 2840 2756 random.exe 30 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 2840 wrote to memory of 3000 2840 s5F60.exe 31 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 3000 wrote to memory of 2708 3000 H7n39.exe 32 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 2708 wrote to memory of 792 2708 1k73S7.exe 33 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34 PID 3000 wrote to memory of 2000 3000 H7n39.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5F60.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5F60.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\H7n39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\H7n39.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k73S7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k73S7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2m8966.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2m8966.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD58a79ba240db70a299cb5d58c69d053cb
SHA1ab3f168f4b9bbbbc430012750295bc9997c19c74
SHA25681727e0284291811b884c77854486190f7a1e99fc80e9983399494b18ff94580
SHA5120871b9933e3499fb19ae21cbdd3cd43943c4343bfbbdc53484cf0f5a874233a29c5ce91cac29afe8b09d1667f9e2e94347edefc4d4e0d8a3ecce00fd5e4c1749
-
Filesize
5.5MB
MD5ab887861d0251753f5fbe626c20198e3
SHA14fcc5954a4a98923c2caf0d8d4eb1b53c2e0abe9
SHA256b5f1dc814ecd6bef988353fcb726c0d30e9f212974f967cfa7d97f0a70a9c453
SHA5129ced542e00e906b7a78987b85d224733b845abb57515eda0b6ccd81eb5a074c88d8bf6e476f7de9d6eb8556daa152e025fc423d1de6ec22a5e414742a99ed2bd
-
Filesize
1.8MB
MD52c780bd0b93d85afbad23124cf8994c2
SHA1267288b40a48cdb0aee1bcf8972f4e25ff72f4ff
SHA25696a1eea0f525785429d36cff82916e54227be6a3750796e05d594e952a213ec2
SHA512d2eb2bb12b7484a10f9517c2bb1f1095e5d234aedfa7730b9196e95b004d3db0fb79095a97d1643ee13db04b66f1718f9ab1a479e6fa97f811a6fb503b91bbe9
-
Filesize
1.8MB
MD56086c2c27043a6e017f55556c3356747
SHA1baaff58e47a168b45ea4284338263065fc5826ff
SHA2563a97a7fc9f3ba2e678694a42d704bbc75ae15b81790d78cc18e27761ecb3a8d3
SHA512cc2b305aaacf23f4346f1e1828dbdcad5f4ef76553b7186739ac290806570062afe5431dba8d527788e5724dd88ff083dc2e38ad408920df79b7b24d4a94b0d4