Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe
Resource
win10v2004-20220901-en
General
-
Target
db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe
-
Size
304KB
-
MD5
6243346379f53a392d5acd5482030fd0
-
SHA1
ed15e44cb7a37eab059cec35e683f84a1e57b148
-
SHA256
db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112
-
SHA512
f991f516c8a5e57e47ccf8f859bff08cd15d88db16021b0446478dcbf06f3da63030d74c1038c7106c0363b31242c95a58570d1e9d735c2f996a30881e8d9657
-
SSDEEP
3072:ZIDNcIFN3tw4QfwmAOMe6UJbVM/vkA9OQzY6eCFs5Juh2v19hlDcfbEdp7uxEo+i:qJigOTJXYOaFs5Juh819hqkuGh2LeyI
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\48982 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msleohaqw.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1940 skypee.exe 1340 skypee.exe 1852 skypee.exe -
resource yara_rule behavioral1/memory/1284-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1284-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1284-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1284-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1284-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1284-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1284-97-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1340-98-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1340-106-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypee = "C:\\Windows\\Skypee\\skypee.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA skypee.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skypee.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skypee.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1720 set thread context of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1940 set thread context of 1340 1940 skypee.exe 32 PID 1940 set thread context of 1852 1940 skypee.exe 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msleohaqw.exe svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Skypee\skypee.exe db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe File opened for modification C:\Windows\Skypee\skypee.exe db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe File opened for modification C:\Windows\Skypee\skypee.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1852 skypee.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1852 skypee.exe 1852 skypee.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe Token: SeDebugPrivilege 1340 skypee.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 1940 skypee.exe 1340 skypee.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1720 wrote to memory of 1284 1720 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 27 PID 1284 wrote to memory of 808 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 28 PID 1284 wrote to memory of 808 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 28 PID 1284 wrote to memory of 808 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 28 PID 1284 wrote to memory of 808 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 28 PID 808 wrote to memory of 1756 808 cmd.exe 30 PID 808 wrote to memory of 1756 808 cmd.exe 30 PID 808 wrote to memory of 1756 808 cmd.exe 30 PID 808 wrote to memory of 1756 808 cmd.exe 30 PID 1284 wrote to memory of 1940 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 31 PID 1284 wrote to memory of 1940 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 31 PID 1284 wrote to memory of 1940 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 31 PID 1284 wrote to memory of 1940 1284 db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe 31 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1340 1940 skypee.exe 32 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1940 wrote to memory of 1852 1940 skypee.exe 33 PID 1852 wrote to memory of 1848 1852 skypee.exe 34 PID 1852 wrote to memory of 1848 1852 skypee.exe 34 PID 1852 wrote to memory of 1848 1852 skypee.exe 34 PID 1852 wrote to memory of 1848 1852 skypee.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe"C:\Users\Admin\AppData\Local\Temp\db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe"C:\Users\Admin\AppData\Local\Temp\db788bb84a5a2093a2d08bb62af87616f41b9074a18e4892b1c6a3208ea42112.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LYKSK.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "skypee" /t REG_SZ /d "C:\Windows\Skypee\skypee.exe" /f4⤵
- Adds Run key to start application
PID:1756
-
-
-
C:\Windows\Skypee\skypee.exe"C:\Windows\Skypee\skypee.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\Skypee\skypee.exe"C:\Windows\Skypee\skypee.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
C:\Windows\Skypee\skypee.exe"C:\Windows\Skypee\skypee.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1848
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD56f03830aff31995957052b694b2211a0
SHA1bc98df25a4accd29643b311c106e1cdcecdec93c
SHA2567ddb76d54b187f9e03639ee200536062c36abea7f2fb073ca9bccfb5acc55934
SHA512f02357a8148e3f0c2e3f8f44c317c94450cbda8acd1890369ad91cd1c140089bfbfd6659702f79761e49b8b665f37667d806ccaed416c6de43e1a99d07a69175
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64
-
Filesize
304KB
MD5cb80478784be8b4ea3cb8049337b7202
SHA10f68f1bb82ac7a0e030be0ac2408b100a539b12a
SHA2561d8eeb59203fa58a6455198391be0c475e7ba2307f9b5f6d810774ad84b69eca
SHA512de34b0d94cf772ffe057ed86aaeb377f203e300df2bdf3bccb8794d9b9b57ebb2d94440bfd8d2accebb326f5183b31fe76bdc75aeb83127a5fcd2bbda4394c64