Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 15:14
Static task
static1
Behavioral task
behavioral1
Sample
43e14b016c4a24d8cc0ecd8ddca196a5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43e14b016c4a24d8cc0ecd8ddca196a5.exe
Resource
win10v2004-20250207-en
General
-
Target
43e14b016c4a24d8cc0ecd8ddca196a5.exe
-
Size
2.1MB
-
MD5
43e14b016c4a24d8cc0ecd8ddca196a5
-
SHA1
986e2d3427e5140cd224dd4d7e2f4c608aa6f953
-
SHA256
90256ffaecaef72d4ea2147a53d2030dd8bcf3cde5fa5e2dc1f09a58f491b740
-
SHA512
b2e26e7a177652783ac6f0c0d6557bc37fb8f129baf445021acf52c0b437634801ee39606d53d8ea525f760e3815bfd9824ee8e7256c232e422f524342ca1d75
-
SSDEEP
49152:EFJiuorHb2Mcfui+rFEYXVxeqJovev8Kd/:6JiuojbevYlxeB4Xd/
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43e14b016c4a24d8cc0ecd8ddca196a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 51 316 Process not Found 21 3532 skotes.exe 58 3532 skotes.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43e14b016c4a24d8cc0ecd8ddca196a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43e14b016c4a24d8cc0ecd8ddca196a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation 43e14b016c4a24d8cc0ecd8ddca196a5.exe Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 3 IoCs
pid Process 3532 skotes.exe 4780 skotes.exe 716 skotes.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine 43e14b016c4a24d8cc0ecd8ddca196a5.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe 3532 skotes.exe 4780 skotes.exe 716 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 43e14b016c4a24d8cc0ecd8ddca196a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43e14b016c4a24d8cc0ecd8ddca196a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2352 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe 3532 skotes.exe 3532 skotes.exe 4780 skotes.exe 4780 skotes.exe 716 skotes.exe 716 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3532 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe 89 PID 2392 wrote to memory of 3532 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe 89 PID 2392 wrote to memory of 3532 2392 43e14b016c4a24d8cc0ecd8ddca196a5.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\43e14b016c4a24d8cc0ecd8ddca196a5.exe"C:\Users\Admin\AppData\Local\Temp\43e14b016c4a24d8cc0ecd8ddca196a5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDQ5MjgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxNzQzMjM4OTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODkyNjU0NzUyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2352
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD582830f00f6f0545e3fba2c75e707b63f
SHA19c413d26547df823cae367852c3d340ea71cacbe
SHA256ebc1a4c7191e13762935cf3fbbbe86e71ae200fd32349bddf23572b7b3d0d071
SHA512379798fcf0f51845c773b779f6a87b2b6cf2e03cf2f572daf583dc87335eabaec65d7fd786a979d16be3bc679f54fdc20edecfc0f7a816342c37e49e76f5f01c
-
Filesize
2.1MB
MD543e14b016c4a24d8cc0ecd8ddca196a5
SHA1986e2d3427e5140cd224dd4d7e2f4c608aa6f953
SHA25690256ffaecaef72d4ea2147a53d2030dd8bcf3cde5fa5e2dc1f09a58f491b740
SHA512b2e26e7a177652783ac6f0c0d6557bc37fb8f129baf445021acf52c0b437634801ee39606d53d8ea525f760e3815bfd9824ee8e7256c232e422f524342ca1d75