Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2025 00:39

General

  • Target

    8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe

  • Size

    7.0MB

  • MD5

    b3de44608133aae76040013a1ab7d076

  • SHA1

    54bf1a264064a07d6708649c4e00c62ad6a787b4

  • SHA256

    8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723

  • SHA512

    8fd858e421e8353cd466732cbcc6c726f9982703bace226bb976cbafafdf89bf517aeb19636256b16352243af18aeb2a5e7cda063cddd2fc99101e72cfcf4aa9

  • SSDEEP

    196608:AxhnvcWlXjv4vDu1hP3M/0SE5UVl/7xKkaBiL1/qaD:ATlXjv4vD8d3M/7iY7xKkGYBxD

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe
    "C:\Users\Admin\AppData\Local\Temp\8a26b41888be8eb2f54f37f92587a5b68925ac2f1ba460125a1c7effeaeda723.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D2A14.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D2A14.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7c05.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7c05.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05d9.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05d9.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4032
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y9871.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y9871.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z05r.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z05r.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 1552
          4⤵
          • Program crash
          PID:1740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4l009G.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4l009G.exe
      2⤵
      • Modifies Windows Defender DisableAntiSpyware settings
      • Modifies Windows Defender Real-time Protection settings
      • Modifies Windows Defender TamperProtection settings
      • Modifies Windows Defender notification settings
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Windows security modification
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4144 -ip 4144
    1⤵
      PID:1612
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3260
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4l009G.exe

      Filesize

      1.7MB

      MD5

      5b6fbe93e4551c6d85847ed01a027ecb

      SHA1

      19619b28057c4cbeef3ddc3945a66e02f4f5782d

      SHA256

      c6a39ac6f40d876507ef829c2d083be996f6ecb9b3b121e8ed341e5893c22150

      SHA512

      15b3c3d5d5749612a0773a23bd15457ab15ab04ce8830a48c7a03347fa21ca19b797da583e36a1b5efaad91a215c3d3fba83c9f96f918279f583424fefd4a954

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D2A14.exe

      Filesize

      5.2MB

      MD5

      e7e2ed1422fcb6adbbb7e318a69a91f8

      SHA1

      96bafbee3b2316efe91e25d9c28df78536385bc5

      SHA256

      c9e3b26c3fccc20b2601256f6eff29796dc994af04ca19f4ef1ed0dd2eb33c96

      SHA512

      a15cac78d2e279539c857dc2b988ffeaaef841e28538922293497233ec1306cb8d60387987e7db4fda1c82994f837ae0595e4843a36a5de3ef96631729167804

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z05r.exe

      Filesize

      1.7MB

      MD5

      7556cfc61d6c9b652ab946e86254b8b9

      SHA1

      a73c8c885d2b10be4b534b2f79a46665b421d0ac

      SHA256

      55cfd403887d49db21b5f57811385ee6aad3cb227dffa94a09e562e245ec299d

      SHA512

      cf16e89abb9f0ffba94dc5c203847cae4f2189c7a52fa1b0f20ab06819a401ba9105b2aaed6025677453da092b0fd14253ad34fa469a762f12a6f0c07dfe226f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A7c05.exe

      Filesize

      3.4MB

      MD5

      967d51163bf0c8673cb8842cf8312524

      SHA1

      ba46d25946b63b67a79f3528b62103dfee6743cc

      SHA256

      7f903015cae036887bd730dd607f18dfd036eac89c0298fd33aad664d330496a

      SHA512

      6101c664cc7f0217cf7c5e17db3b503d01741cfbcfd53217d336385b309f8b9cf0dd5d22f16b1aee548f90ad8f9d22cb581eeda380ab43559661d91721d1d108

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05d9.exe

      Filesize

      3.1MB

      MD5

      0fbe9ba291837e4e16ff3b5c49444680

      SHA1

      5c6b98943bd8b2328d219e8967204537db0e4c6c

      SHA256

      5bd061d7524a1455cc126fa5614fdcbce711416c7c896ad0939979c59e5dcef0

      SHA512

      3483533c13c8b594035f4cd5a0728d4a7b88fd2958fca666f0a5c381fea4fd44808b5b5f16411675f6b3dbd8ec709c6b9cd9be00a5879df3e3746adf268b9bcd

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y9871.exe

      Filesize

      3.0MB

      MD5

      7c11f700ed5f7a6d1e4d55c13486b680

      SHA1

      a1399a616b8b5ab8cdeca1ea513bf803132c1702

      SHA256

      27f4e39190071ee72ef6cc3a17a08b587e457bb8039f0e043a3ff071e7509a19

      SHA512

      50b6b74616ce5017c7574d0f576dcb5ebaa3d5488635fb7141bca645dc317de310ffc87f9c7c4e905bc14131cf1208b28929db977381457aa59f8538cdf7d297

    • memory/404-66-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-76-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-33-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-74-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-73-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-44-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-45-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-72-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-47-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-69-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-49-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-68-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-75-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-67-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-65-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/404-59-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/1444-39-0x0000000000900000-0x0000000000C09000-memory.dmp

      Filesize

      3.0MB

    • memory/1444-38-0x0000000000900000-0x0000000000C09000-memory.dmp

      Filesize

      3.0MB

    • memory/3260-58-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/3396-71-0x0000000000B10000-0x0000000000E2B000-memory.dmp

      Filesize

      3.1MB

    • memory/4032-21-0x0000000000710000-0x0000000000A2B000-memory.dmp

      Filesize

      3.1MB

    • memory/4032-32-0x0000000000710000-0x0000000000A2B000-memory.dmp

      Filesize

      3.1MB

    • memory/4144-48-0x0000000000BD0000-0x0000000001269000-memory.dmp

      Filesize

      6.6MB

    • memory/4144-50-0x0000000000BD0000-0x0000000001269000-memory.dmp

      Filesize

      6.6MB

    • memory/4144-46-0x0000000000BD0000-0x0000000001269000-memory.dmp

      Filesize

      6.6MB

    • memory/4144-42-0x0000000000BD0000-0x0000000001269000-memory.dmp

      Filesize

      6.6MB

    • memory/5016-55-0x00000000001E0000-0x0000000000636000-memory.dmp

      Filesize

      4.3MB

    • memory/5016-64-0x00000000001E0000-0x0000000000636000-memory.dmp

      Filesize

      4.3MB

    • memory/5016-53-0x00000000001E0000-0x0000000000636000-memory.dmp

      Filesize

      4.3MB

    • memory/5016-61-0x00000000001E0000-0x0000000000636000-memory.dmp

      Filesize

      4.3MB

    • memory/5016-56-0x00000000001E0000-0x0000000000636000-memory.dmp

      Filesize

      4.3MB