Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/02/2025, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
581073aad7a20307a9d8b1ae25591204.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
581073aad7a20307a9d8b1ae25591204.exe
Resource
win10v2004-20250207-en
General
-
Target
581073aad7a20307a9d8b1ae25591204.exe
-
Size
2.1MB
-
MD5
581073aad7a20307a9d8b1ae25591204
-
SHA1
7a480497dcbf5a778a67a570507296190879d231
-
SHA256
10f74f3eb9a3efa714be7afa4503c6655f6502d3891497b96ce4418e0017f0f9
-
SHA512
0c9fee13c7723ba09449cbec55b88898ece66a53481250d84bd137cf8c972f5a2b3755bedf428595c43077d62fc3377626ee266c432988751f1f056c924d62ab
-
SSDEEP
49152:Lk9Akf6yHbZTZIR0i+vywkTzn2W+hWr2vI:Lk9FdTZxPaVN+hWivI
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 581073aad7a20307a9d8b1ae25591204.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3fb02e9d74.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 7 2720 skotes.exe 5 2720 skotes.exe 10 1452 3fb02e9d74.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3fb02e9d74.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 581073aad7a20307a9d8b1ae25591204.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 581073aad7a20307a9d8b1ae25591204.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3fb02e9d74.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 skotes.exe 1452 3fb02e9d74.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 581073aad7a20307a9d8b1ae25591204.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 3fb02e9d74.exe -
Loads dropped DLL 4 IoCs
pid Process 1624 581073aad7a20307a9d8b1ae25591204.exe 1624 581073aad7a20307a9d8b1ae25591204.exe 2720 skotes.exe 2720 skotes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\3fb02e9d74.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1075534001\\3fb02e9d74.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1624 581073aad7a20307a9d8b1ae25591204.exe 2720 skotes.exe 1452 3fb02e9d74.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 581073aad7a20307a9d8b1ae25591204.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 581073aad7a20307a9d8b1ae25591204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fb02e9d74.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3fb02e9d74.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3fb02e9d74.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1624 581073aad7a20307a9d8b1ae25591204.exe 2720 skotes.exe 1452 3fb02e9d74.exe 1452 3fb02e9d74.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 581073aad7a20307a9d8b1ae25591204.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2720 1624 581073aad7a20307a9d8b1ae25591204.exe 30 PID 1624 wrote to memory of 2720 1624 581073aad7a20307a9d8b1ae25591204.exe 30 PID 1624 wrote to memory of 2720 1624 581073aad7a20307a9d8b1ae25591204.exe 30 PID 1624 wrote to memory of 2720 1624 581073aad7a20307a9d8b1ae25591204.exe 30 PID 2720 wrote to memory of 1452 2720 skotes.exe 33 PID 2720 wrote to memory of 1452 2720 skotes.exe 33 PID 2720 wrote to memory of 1452 2720 skotes.exe 33 PID 2720 wrote to memory of 1452 2720 skotes.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\581073aad7a20307a9d8b1ae25591204.exe"C:\Users\Admin\AppData\Local\Temp\581073aad7a20307a9d8b1ae25591204.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\1075534001\3fb02e9d74.exe"C:\Users\Admin\AppData\Local\Temp\1075534001\3fb02e9d74.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD50c11efc908f93c03ad208566c35ed51c
SHA1a0989ba8190b1a61c0155b6785da4a46f56f83d3
SHA25621a0b8634ae6241929fd3668e6f4f21e1b8492b4cca8d0bb3d3996ce23ece231
SHA5122e4de5c6d5dfb9b06ddf7534991beb741a673d1c2797501024ccac97c872366b9421205c29ed2467be7953e2dd799f89ec7a7d8ab2c7b6fe038d927be31c0b80
-
Filesize
1.7MB
MD5688f1ec9a89efa9b837f53ffdc8b6079
SHA1149ce4a2d9ab8d02b15f1902ed2e76d795f3c0a0
SHA256d56b67c02d720f7cb8ab3c6fa4d1e866e73e8cba6b2639c24ca90337f37c3ad8
SHA5122f5fc9a2c8fcfe385ceda63e90d3c1b186fe34a4748583185ae2c6b55c8f9703906d9ce3cd7e1c30d202ee696ac56d9e714d37ec369816d8bd3d49a91a3f20a4
-
Filesize
2.1MB
MD5581073aad7a20307a9d8b1ae25591204
SHA17a480497dcbf5a778a67a570507296190879d231
SHA25610f74f3eb9a3efa714be7afa4503c6655f6502d3891497b96ce4418e0017f0f9
SHA5120c9fee13c7723ba09449cbec55b88898ece66a53481250d84bd137cf8c972f5a2b3755bedf428595c43077d62fc3377626ee266c432988751f1f056c924d62ab