Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 19:49
Static task
static1
Behavioral task
behavioral1
Sample
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe
Resource
win10v2004-20220812-en
General
-
Target
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe
-
Size
284KB
-
MD5
652f1d03ec3ac30fe796c586f6297580
-
SHA1
86b8c0bd2a1f976886d9302ba94f2149db7c4682
-
SHA256
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf
-
SHA512
3807113ac0b42f19390bf351ba50097364615677a47b54b7af0b65b963f4697dcbbf1d547344e8fcc74d4ac66fe5fbd330039e462b5ef4b3caef2e056039ceb5
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\5517 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msshelam.scr" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 860 skyrpe.exe 1816 skyrpe.exe 4336 skyrpe.exe -
resource yara_rule behavioral2/memory/4920-135-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4920-137-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4920-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4920-141-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4920-150-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4920-162-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1816-167-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1816-169-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3068 set thread context of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 860 set thread context of 1816 860 skyrpe.exe 94 PID 860 set thread context of 4336 860 skyrpe.exe 95 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msshelam.scr svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4336 skyrpe.exe 4336 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4336 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe Token: SeDebugPrivilege 1816 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 860 skyrpe.exe 1816 skyrpe.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 3068 wrote to memory of 4920 3068 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 82 PID 4920 wrote to memory of 2472 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 83 PID 4920 wrote to memory of 2472 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 83 PID 4920 wrote to memory of 2472 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 83 PID 2472 wrote to memory of 5004 2472 cmd.exe 86 PID 2472 wrote to memory of 5004 2472 cmd.exe 86 PID 2472 wrote to memory of 5004 2472 cmd.exe 86 PID 4920 wrote to memory of 860 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 87 PID 4920 wrote to memory of 860 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 87 PID 4920 wrote to memory of 860 4920 aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe 87 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 1816 860 skyrpe.exe 94 PID 860 wrote to memory of 4336 860 skyrpe.exe 95 PID 860 wrote to memory of 4336 860 skyrpe.exe 95 PID 860 wrote to memory of 4336 860 skyrpe.exe 95 PID 860 wrote to memory of 4336 860 skyrpe.exe 95 PID 860 wrote to memory of 4336 860 skyrpe.exe 95 PID 860 wrote to memory of 4336 860 skyrpe.exe 95 PID 4336 wrote to memory of 4412 4336 skyrpe.exe 96 PID 4336 wrote to memory of 4412 4336 skyrpe.exe 96 PID 4336 wrote to memory of 4412 4336 skyrpe.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe"C:\Users\Admin\AppData\Local\Temp\aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe"C:\Users\Admin\AppData\Local\Temp\aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XKMHF.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:5004
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:4412
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD5bdaf7ccdafebfb0e8f5f7577c0077208
SHA1b1d769d90a3e160b1c58637556d7081f582d5d25
SHA256eae13c5e90b0ba25f33bd6fdd4cb995c01d7ff8ae8336a64291a9691b30107f4
SHA512094fec17be970050ac9962b8fb9f33e8ef6ac4f529b806b686b4204f8dd4508c15a03844355d11326ea847abea50fbdfb22ec357e93bebc1e785b84a0bf88cf4
-
Filesize
284KB
MD5bdaf7ccdafebfb0e8f5f7577c0077208
SHA1b1d769d90a3e160b1c58637556d7081f582d5d25
SHA256eae13c5e90b0ba25f33bd6fdd4cb995c01d7ff8ae8336a64291a9691b30107f4
SHA512094fec17be970050ac9962b8fb9f33e8ef6ac4f529b806b686b4204f8dd4508c15a03844355d11326ea847abea50fbdfb22ec357e93bebc1e785b84a0bf88cf4
-
Filesize
284KB
MD5bdaf7ccdafebfb0e8f5f7577c0077208
SHA1b1d769d90a3e160b1c58637556d7081f582d5d25
SHA256eae13c5e90b0ba25f33bd6fdd4cb995c01d7ff8ae8336a64291a9691b30107f4
SHA512094fec17be970050ac9962b8fb9f33e8ef6ac4f529b806b686b4204f8dd4508c15a03844355d11326ea847abea50fbdfb22ec357e93bebc1e785b84a0bf88cf4
-
Filesize
284KB
MD5bdaf7ccdafebfb0e8f5f7577c0077208
SHA1b1d769d90a3e160b1c58637556d7081f582d5d25
SHA256eae13c5e90b0ba25f33bd6fdd4cb995c01d7ff8ae8336a64291a9691b30107f4
SHA512094fec17be970050ac9962b8fb9f33e8ef6ac4f529b806b686b4204f8dd4508c15a03844355d11326ea847abea50fbdfb22ec357e93bebc1e785b84a0bf88cf4