Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe
Resource
win10v2004-20220812-en
General
-
Target
0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe
-
Size
284KB
-
MD5
bda317186134c0564290f2c3a9040f4d
-
SHA1
88907b0dd91e826359eec729de5cd13dc68fa1f0
-
SHA256
0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f
-
SHA512
cda85f83978c0a7f972ee767405975c29acf8e8c9d8fe66bd3b9560e973c3eaa4fe996d2edfdbd99e6ae375fd27495a6af41ed76d04bfe72ec99913866c68b00
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\19247 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msiiev.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1740 skyrpe.exe 1116 skyrpe.exe 1248 skyrpe.exe -
resource yara_rule behavioral1/memory/1332-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-81-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-101-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1116-106-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1116-109-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1244 set thread context of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1740 set thread context of 1116 1740 skyrpe.exe 32 PID 1740 set thread context of 1248 1740 skyrpe.exe 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msiiev.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1248 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1248 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe Token: SeDebugPrivilege 1116 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 1740 skyrpe.exe 1116 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1244 wrote to memory of 1332 1244 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 27 PID 1332 wrote to memory of 280 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 28 PID 1332 wrote to memory of 280 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 28 PID 1332 wrote to memory of 280 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 28 PID 1332 wrote to memory of 280 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 28 PID 280 wrote to memory of 584 280 cmd.exe 30 PID 280 wrote to memory of 584 280 cmd.exe 30 PID 280 wrote to memory of 584 280 cmd.exe 30 PID 280 wrote to memory of 584 280 cmd.exe 30 PID 1332 wrote to memory of 1740 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 31 PID 1332 wrote to memory of 1740 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 31 PID 1332 wrote to memory of 1740 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 31 PID 1332 wrote to memory of 1740 1332 0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe 31 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1116 1740 skyrpe.exe 32 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1740 wrote to memory of 1248 1740 skyrpe.exe 33 PID 1248 wrote to memory of 1872 1248 skyrpe.exe 34 PID 1248 wrote to memory of 1872 1248 skyrpe.exe 34 PID 1248 wrote to memory of 1872 1248 skyrpe.exe 34 PID 1248 wrote to memory of 1872 1248 skyrpe.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe"C:\Users\Admin\AppData\Local\Temp\0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe"C:\Users\Admin\AppData\Local\Temp\0bc4bc968bb669c68d0626c72a9f37831f8caf7051f3d3aacc5a266a468f989f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KSGQH.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:584
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1872
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7
-
Filesize
284KB
MD56b6a3b03bfd845b444f2f045033bc3ad
SHA15a4845b0d4f588d5722a5149c6799d592f1a9887
SHA2563c151b3a89df5bc25a6d638d8d0813afa4331898a24f55532ea9e6d045744e85
SHA51272b5823976e918f5dd191b2bf981e2c25309b1d283c30692c7bb20d3a4e8b278324e38050f009b93733c8b4b191560bd123465ec9bc1f17f59df1a2bf76c3bd7