Analysis

  • max time kernel
    142s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2025, 10:27

General

  • Target

    abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe

  • Size

    5.6MB

  • MD5

    1067e42ecb4ca7700662037e0630d319

  • SHA1

    951542869a55506bac4575e6ac0c46a21b975744

  • SHA256

    abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa

  • SHA512

    5315973824e199e37904ca151f2364ca188906c9d90e1627960e1f55b731598a6bf57f0589152bf7f8aa70675ae9afdcb7e2fd138fdfc6157d94d336c0d011d3

  • SSDEEP

    98304:0sRoZGmAZH2UkiCqDMOjCeFDOr/AGx7yy30VRMjfU/9+hIBYdigu71nib:0VqHrv9tOGUNmRMYBYluxk

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe
    "C:\Users\Admin\AppData\Local\Temp\abed9f43ef0c2fa06633ea97a28e62b3051a74d06d926ffce92c647c689386aa.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6D05.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6D05.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1C05b9.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1C05b9.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2u9270.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2u9270.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3y33N.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3y33N.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:4404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 1564
        3⤵
        • Program crash
        PID:4384
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3548
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4404 -ip 4404
    1⤵
      PID:4220
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1796
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3y33N.exe

      Filesize

      1.8MB

      MD5

      dc7fb0b215e5bd885059328d836e9334

      SHA1

      831e495173035a86fa95f95dbb049e5c9b2d5021

      SHA256

      29400490a7e6d89ffe8f731ffdc56e7f13f830b98378b1f24650a9c07d2e4bbb

      SHA512

      e6bfd880e07c26dd1e0a8e250683d0828ed670c34de0b587735bfe45197f3c5cfe8903ac1a5aae2ab53f1c202f40631bdf9416e086b1c1bf7c46341fa93777d0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6D05.exe

      Filesize

      3.7MB

      MD5

      de2fe9ab06fb5ba2a3535f9f20f05ae9

      SHA1

      97af503ab59a9534f079c54d1baaff56a978013e

      SHA256

      b3afebc0be875d29878a8cda4a292cbfd708fae95098ba0b784d1db18a2bb257

      SHA512

      45373c570310d0733a669a9469b711ccc879800be339ad8a9c03db59498c9e5db4a925f9815e1b4b146415f5fa6c45d3836f188a88e769a9af4d8fc5a2cba233

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1C05b9.exe

      Filesize

      2.0MB

      MD5

      18fcabff159ae0d49818cd13b071e037

      SHA1

      616f14286195bfd36b28bbf0aa8523b9a3496b7b

      SHA256

      4c669385dddec75d0166d88ae377ef18d5e84c5367f043126a4090b386a3807d

      SHA512

      0642ee32cc76098ff89dabfeb312c6bdefc7ceaa70bf4eddcf302623edc38849a71820a3e7690d5084c4b8535359eb451fa50e3a2675bd6cda50c69ea1f8b6d3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2u9270.exe

      Filesize

      1.8MB

      MD5

      fb5aea14154f324ee64d60209828557c

      SHA1

      2d2d3ad90bf761cf7176c96f468faf0c4151d6f0

      SHA256

      8ff6a404f974d7150d62edb435b0d022cf262104faf6a9b00260e566d0255ebe

      SHA512

      926ad12fa9fb3262af4ffc4beedf02fec20c726a57bd733753a1f3b3fbf74c17fe2860ccd55ff6b5883648d7524a76d3e0290d230ef9e0e1b360e49370f70d3e

    • memory/1796-61-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/1796-60-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/2996-15-0x0000000077974000-0x0000000077976000-memory.dmp

      Filesize

      8KB

    • memory/2996-33-0x00000000005D1000-0x0000000000639000-memory.dmp

      Filesize

      416KB

    • memory/2996-19-0x00000000005D0000-0x0000000000A7F000-memory.dmp

      Filesize

      4.7MB

    • memory/2996-17-0x00000000005D0000-0x0000000000A7F000-memory.dmp

      Filesize

      4.7MB

    • memory/2996-31-0x00000000005D0000-0x0000000000A7F000-memory.dmp

      Filesize

      4.7MB

    • memory/2996-16-0x00000000005D1000-0x0000000000639000-memory.dmp

      Filesize

      416KB

    • memory/2996-14-0x00000000005D0000-0x0000000000A7F000-memory.dmp

      Filesize

      4.7MB

    • memory/3248-37-0x0000000000710000-0x0000000000BC4000-memory.dmp

      Filesize

      4.7MB

    • memory/3248-38-0x0000000000710000-0x0000000000BC4000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-56-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-32-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-68-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-66-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-65-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-48-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-64-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-63-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-52-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-62-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-54-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-55-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-43-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-57-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-44-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3480-59-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3548-50-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/3548-49-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB

    • memory/4404-42-0x00000000004B0000-0x0000000000B5F000-memory.dmp

      Filesize

      6.7MB

    • memory/4404-53-0x00000000004B0000-0x0000000000B5F000-memory.dmp

      Filesize

      6.7MB

    • memory/4404-51-0x00000000004B0000-0x0000000000B5F000-memory.dmp

      Filesize

      6.7MB

    • memory/4404-46-0x00000000004B0000-0x0000000000B5F000-memory.dmp

      Filesize

      6.7MB

    • memory/4404-45-0x00000000004B0000-0x0000000000B5F000-memory.dmp

      Filesize

      6.7MB

    • memory/4876-69-0x0000000000310000-0x00000000007BF000-memory.dmp

      Filesize

      4.7MB