Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2025 16:30
Static task
static1
Behavioral task
behavioral1
Sample
1c2a965503442aefec5a31cc9a77bc8a.exe
Resource
win10v2004-20250207-en
General
-
Target
1c2a965503442aefec5a31cc9a77bc8a.exe
-
Size
2.0MB
-
MD5
1c2a965503442aefec5a31cc9a77bc8a
-
SHA1
c789388b2281acb363f903d4b34a245e8276df67
-
SHA256
bc6ca29ebc9460bfbd2d01913a31a73c0f75fe66d3bb515813fd66b46527a0e8
-
SHA512
f799bde5edbdda7fd81ab832df8362e48b65977205a2bbea9aed7c651921b45fa0ed60f03080ee4401bbddacb9a7e2ce4f56fa948984d9391790a2b485ec5de3
-
SSDEEP
49152:tMWZUA6jGrqAu8CfGy2JxISM/B6/wPe+YrnAVqoizLlf5nGU3n:hf+uFbISMY/wPeDAYzL/nGU
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c2a965503442aefec5a31cc9a77bc8a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 9 1240 skotes.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c2a965503442aefec5a31cc9a77bc8a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c2a965503442aefec5a31cc9a77bc8a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation 1c2a965503442aefec5a31cc9a77bc8a.exe -
Executes dropped EXE 2 IoCs
pid Process 1240 skotes.exe 4080 skotes.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Software\Wine 1c2a965503442aefec5a31cc9a77bc8a.exe Key opened \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Software\Wine skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 1240 skotes.exe 4080 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1c2a965503442aefec5a31cc9a77bc8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c2a965503442aefec5a31cc9a77bc8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 464 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 1240 skotes.exe 1240 skotes.exe 4080 skotes.exe 4080 skotes.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2212 taskmgr.exe Token: SeSystemProfilePrivilege 2212 taskmgr.exe Token: SeCreateGlobalPrivilege 2212 taskmgr.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe 2212 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1240 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 89 PID 4752 wrote to memory of 1240 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 89 PID 4752 wrote to memory of 1240 4752 1c2a965503442aefec5a31cc9a77bc8a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c2a965503442aefec5a31cc9a77bc8a.exe"C:\Users\Admin\AppData\Local\Temp\1c2a965503442aefec5a31cc9a77bc8a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2212
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QjQxNzA5NzItMzc2QS00NkFGLTg4MUUtQTNENEI4Qjg2NkE2fSIgdXNlcmlkPSJ7RjE2RjdBQTUtRTMxQy00MTEzLTg5ODAtMzg1RTY4NzlBQTE0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MjUwNTE4MUItRTBDRi00Q0RELUFEQ0YtRUJGRTBFREJENjkxfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTA1MjE1NTYxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51c2a965503442aefec5a31cc9a77bc8a
SHA1c789388b2281acb363f903d4b34a245e8276df67
SHA256bc6ca29ebc9460bfbd2d01913a31a73c0f75fe66d3bb515813fd66b46527a0e8
SHA512f799bde5edbdda7fd81ab832df8362e48b65977205a2bbea9aed7c651921b45fa0ed60f03080ee4401bbddacb9a7e2ce4f56fa948984d9391790a2b485ec5de3