Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 08:14
Static task
static1
Behavioral task
behavioral1
Sample
7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe
Resource
win7-20240729-en
General
-
Target
7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe
-
Size
3.1MB
-
MD5
3fb49282f1c411d2d84177bacf897e08
-
SHA1
97d9a1e8ccb78640a74824e1e3172b9a45626552
-
SHA256
7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6
-
SHA512
bf9d31d629836445a12c8b5d6869950ac0e6b6bdec505ad28d08721fc48ad89728bd84961e6a4625ac2c57f707665c58d3e11e066067d4104b78fa5884067e61
-
SSDEEP
49152:9OMI28YSlwJngtXZyzBptdDXFJ7evWS4RRB:g28FwJngtJyzBZDVUvZ4vB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 22 2024 skotes.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 4 IoCs
pid Process 2024 skotes.exe 1504 13Z5sqy.exe 100 skotes.exe 4788 skotes.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe 2024 skotes.exe 100 skotes.exe 4788 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 4696 1504 13Z5sqy.exe 102 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe 2024 skotes.exe 2024 skotes.exe 100 skotes.exe 100 skotes.exe 4788 skotes.exe 4788 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2024 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe 83 PID 2524 wrote to memory of 2024 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe 83 PID 2524 wrote to memory of 2024 2524 7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe 83 PID 2024 wrote to memory of 1504 2024 skotes.exe 97 PID 2024 wrote to memory of 1504 2024 skotes.exe 97 PID 2024 wrote to memory of 1504 2024 skotes.exe 97 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102 PID 1504 wrote to memory of 4696 1504 13Z5sqy.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe"C:\Users\Admin\AppData\Local\Temp\7b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:100
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
3.1MB
MD53fb49282f1c411d2d84177bacf897e08
SHA197d9a1e8ccb78640a74824e1e3172b9a45626552
SHA2567b3bf81aab1f05c1a2dcf0be6a815da74d2f1e5f47cf29ba977561b47a3ad9d6
SHA512bf9d31d629836445a12c8b5d6869950ac0e6b6bdec505ad28d08721fc48ad89728bd84961e6a4625ac2c57f707665c58d3e11e066067d4104b78fa5884067e61