Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2025 19:34
Static task
static1
Behavioral task
behavioral1
Sample
f9393cab0312e8fe8d137dee1cab8e89.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f9393cab0312e8fe8d137dee1cab8e89.exe
Resource
win10v2004-20250129-en
General
-
Target
f9393cab0312e8fe8d137dee1cab8e89.exe
-
Size
2.0MB
-
MD5
f9393cab0312e8fe8d137dee1cab8e89
-
SHA1
42bbc486cb4c6851bf57e44a7aee43e0bdd395c9
-
SHA256
4f21fa7d1daaab88aaa4ffccab5145e36a6ee21ef9da888338f47ed2eafffee1
-
SHA512
9672909346896ccfa3d0899984285a7f04e734150cd39b04345e32bf2d9cf23282edc1d5645aebcd838c2ef1f429ed3abcd3c3e98c503612c4817b68a5e100ec
-
SSDEEP
49152:QRWsflRk8YpyLbvvdSlG/76F+vqGtJmEDL4456wjNRuEey8KzXZJxIvigIk4vfFJ:oWL8AwDHe+XIiS4vfqorz2Ehiy
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Panda Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/2960-100-0x0000000000570000-0x0000000000964000-memory.dmp family_pandastealer behavioral2/memory/2960-101-0x0000000000570000-0x0000000000964000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Pandastealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9393cab0312e8fe8d137dee1cab8e89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 86 4552 skotes.exe 26 4552 skotes.exe 87 4552 skotes.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9393cab0312e8fe8d137dee1cab8e89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9393cab0312e8fe8d137dee1cab8e89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation f9393cab0312e8fe8d137dee1cab8e89.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 5 IoCs
pid Process 4552 skotes.exe 4604 skotes.exe 4420 skotes.exe 2960 0l1LuE1.exe 4116 X7kkUXr.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Wine f9393cab0312e8fe8d137dee1cab8e89.exe Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Wine skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4864 f9393cab0312e8fe8d137dee1cab8e89.exe 4552 skotes.exe 4604 skotes.exe 4420 skotes.exe 2960 0l1LuE1.exe 2960 0l1LuE1.exe 2960 0l1LuE1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f9393cab0312e8fe8d137dee1cab8e89.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9393cab0312e8fe8d137dee1cab8e89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0l1LuE1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X7kkUXr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4864 f9393cab0312e8fe8d137dee1cab8e89.exe 4864 f9393cab0312e8fe8d137dee1cab8e89.exe 4552 skotes.exe 4552 skotes.exe 4604 skotes.exe 4604 skotes.exe 4420 skotes.exe 4420 skotes.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 0l1LuE1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4552 4864 f9393cab0312e8fe8d137dee1cab8e89.exe 87 PID 4864 wrote to memory of 4552 4864 f9393cab0312e8fe8d137dee1cab8e89.exe 87 PID 4864 wrote to memory of 4552 4864 f9393cab0312e8fe8d137dee1cab8e89.exe 87 PID 4552 wrote to memory of 2960 4552 skotes.exe 118 PID 4552 wrote to memory of 2960 4552 skotes.exe 118 PID 4552 wrote to memory of 2960 4552 skotes.exe 118 PID 4552 wrote to memory of 4116 4552 skotes.exe 119 PID 4552 wrote to memory of 4116 4552 skotes.exe 119 PID 4552 wrote to memory of 4116 4552 skotes.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9393cab0312e8fe8d137dee1cab8e89.exe"C:\Users\Admin\AppData\Local\Temp\f9393cab0312e8fe8d137dee1cab8e89.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\1074370001\0l1LuE1.exe"C:\Users\Admin\AppData\Local\Temp\1074370001\0l1LuE1.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\1074534001\X7kkUXr.exe"C:\Users\Admin\AppData\Local\Temp\1074534001\X7kkUXr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5bd73ad8f194321e36dc1bc9883c39312
SHA18b4d87d5d202aaa546c0231a75704a1719cafd09
SHA2569edbd2252d7e11896eb5a57edf3a1424f0baa9492d7d98ca16604436fa49f225
SHA512c4737bac24ed5cdac19a592994f187717721e58bbd31639f34c0e94025c740863d408cd24e0dbcf223b856a96a6af5f12b6c5e0f91402fdca156c5ae0e4b5b92
-
Filesize
1.4MB
MD55b17a03a0b5c94c375c32700f075bb02
SHA164aa47ddef5c2cd0969010ce4a5f01316f28a13b
SHA256a3dd5e28b1b551cbb99219d143efe1e888180cb6d7e20e22b78172e17e046336
SHA5120ba5e0bc997d0f44fab6bf9c8ba46e56992c56aa4e5fe1f4aed4420f958f26c684341d46ca0000bab3cc7141b232a163e6a309268945149a3d9f7417d50cf96c
-
Filesize
54KB
MD5d95631369450a1ede473b641659b3a4d
SHA18eea5065ca03338da5446bf7a11114d70e7edfe8
SHA2569bae68d8ff44273bb5989678f644957d5f7808e6809edf0df5bbc2ae45a2f595
SHA51296a6e8575f4487d763fb40b7c37131b5987da36ea3b0554223687b1b8402157544c03cc5a1f18609b7be5c60c1075ab21970160190e8cd5a1748007921645e20
-
Filesize
2.0MB
MD5f9393cab0312e8fe8d137dee1cab8e89
SHA142bbc486cb4c6851bf57e44a7aee43e0bdd395c9
SHA2564f21fa7d1daaab88aaa4ffccab5145e36a6ee21ef9da888338f47ed2eafffee1
SHA5129672909346896ccfa3d0899984285a7f04e734150cd39b04345e32bf2d9cf23282edc1d5645aebcd838c2ef1f429ed3abcd3c3e98c503612c4817b68a5e100ec