Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 07:18
Static task
static1
Behavioral task
behavioral1
Sample
03fb2ac03f145a4411d1db59685c829e.exe
Resource
win7-20240903-en
General
-
Target
03fb2ac03f145a4411d1db59685c829e.exe
-
Size
1.8MB
-
MD5
03fb2ac03f145a4411d1db59685c829e
-
SHA1
41149472c0f571264c7d7e4023d23ec72bd55048
-
SHA256
4caeb908f24f021a04e69d0affb42cfd7730be17215e2b9c0a0ebbce6749e91e
-
SHA512
71c040d22505bf1b4a6c8650de610cea28d43fa5164d6747c859b17f1b46f0057c3884cca818c105311bb18889964fdbcc03e2fd04f41d9db373777e1797ac8a
-
SSDEEP
49152:mWMSFWJctAkD/BU1nvyQLRArw3f3MvkFxHMSiXt8XGlIfrnVm:4vQgnvkrCWkzHg9vlIf
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 03fb2ac03f145a4411d1db59685c829e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 03fb2ac03f145a4411d1db59685c829e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 03fb2ac03f145a4411d1db59685c829e.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 03fb2ac03f145a4411d1db59685c829e.exe -
Executes dropped EXE 3 IoCs
pid Process 3328 skotes.exe 2220 skotes.exe 1220 skotes.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 03fb2ac03f145a4411d1db59685c829e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2440 03fb2ac03f145a4411d1db59685c829e.exe 3328 skotes.exe 2220 skotes.exe 1220 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 03fb2ac03f145a4411d1db59685c829e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03fb2ac03f145a4411d1db59685c829e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2440 03fb2ac03f145a4411d1db59685c829e.exe 2440 03fb2ac03f145a4411d1db59685c829e.exe 3328 skotes.exe 3328 skotes.exe 2220 skotes.exe 2220 skotes.exe 1220 skotes.exe 1220 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 03fb2ac03f145a4411d1db59685c829e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3328 2440 03fb2ac03f145a4411d1db59685c829e.exe 85 PID 2440 wrote to memory of 3328 2440 03fb2ac03f145a4411d1db59685c829e.exe 85 PID 2440 wrote to memory of 3328 2440 03fb2ac03f145a4411d1db59685c829e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\03fb2ac03f145a4411d1db59685c829e.exe"C:\Users\Admin\AppData\Local\Temp\03fb2ac03f145a4411d1db59685c829e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD503fb2ac03f145a4411d1db59685c829e
SHA141149472c0f571264c7d7e4023d23ec72bd55048
SHA2564caeb908f24f021a04e69d0affb42cfd7730be17215e2b9c0a0ebbce6749e91e
SHA51271c040d22505bf1b4a6c8650de610cea28d43fa5164d6747c859b17f1b46f0057c3884cca818c105311bb18889964fdbcc03e2fd04f41d9db373777e1797ac8a