Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 06:32
Static task
static1
Behavioral task
behavioral1
Sample
ffa05200d7a741017eb476eef981b041.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ffa05200d7a741017eb476eef981b041.exe
Resource
win10v2004-20250217-en
General
-
Target
ffa05200d7a741017eb476eef981b041.exe
-
Size
2.1MB
-
MD5
ffa05200d7a741017eb476eef981b041
-
SHA1
2272ca724539b2e2bef16f3017c1e1e3db9e9485
-
SHA256
2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001
-
SHA512
55be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9
-
SSDEEP
49152:1CYg6rMK/aiLLsFf8lTlcZuY+1HSkB1SOpIBC8MiH:i6rbaiEiWH+YklIBC8MiH
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffa05200d7a741017eb476eef981b041.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffa05200d7a741017eb476eef981b041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffa05200d7a741017eb476eef981b041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 skotes.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine ffa05200d7a741017eb476eef981b041.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 2772 ffa05200d7a741017eb476eef981b041.exe 2772 ffa05200d7a741017eb476eef981b041.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2772 ffa05200d7a741017eb476eef981b041.exe 2928 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ffa05200d7a741017eb476eef981b041.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa05200d7a741017eb476eef981b041.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 ffa05200d7a741017eb476eef981b041.exe 2928 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 ffa05200d7a741017eb476eef981b041.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2928 2772 ffa05200d7a741017eb476eef981b041.exe 30 PID 2772 wrote to memory of 2928 2772 ffa05200d7a741017eb476eef981b041.exe 30 PID 2772 wrote to memory of 2928 2772 ffa05200d7a741017eb476eef981b041.exe 30 PID 2772 wrote to memory of 2928 2772 ffa05200d7a741017eb476eef981b041.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffa05200d7a741017eb476eef981b041.exe"C:\Users\Admin\AppData\Local\Temp\ffa05200d7a741017eb476eef981b041.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5ffa05200d7a741017eb476eef981b041
SHA12272ca724539b2e2bef16f3017c1e1e3db9e9485
SHA2562e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001
SHA51255be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9