Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe
Resource
win10v2004-20220812-en
General
-
Target
88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe
-
Size
284KB
-
MD5
0ead4ea2d44a0207641ed37de4366360
-
SHA1
e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
-
SHA256
88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
-
SHA512
09d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\13930 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msyyxkq.com" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1756 skyrpe.exe 1396 skyrpe.exe 1640 skyrpe.exe -
resource yara_rule behavioral1/memory/1760-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-81-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1760-101-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1396-102-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1396-108-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 960 set thread context of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 1756 set thread context of 1396 1756 skyrpe.exe 32 PID 1756 set thread context of 1640 1756 skyrpe.exe 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msyyxkq.com svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1640 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1640 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe Token: SeDebugPrivilege 1396 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 1756 skyrpe.exe 1396 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 960 wrote to memory of 1760 960 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 27 PID 1760 wrote to memory of 512 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 28 PID 1760 wrote to memory of 512 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 28 PID 1760 wrote to memory of 512 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 28 PID 1760 wrote to memory of 512 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 28 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 1760 wrote to memory of 1756 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 31 PID 1760 wrote to memory of 1756 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 31 PID 1760 wrote to memory of 1756 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 31 PID 1760 wrote to memory of 1756 1760 88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe 31 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1396 1756 skyrpe.exe 32 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1756 wrote to memory of 1640 1756 skyrpe.exe 33 PID 1640 wrote to memory of 1280 1640 skyrpe.exe 34 PID 1640 wrote to memory of 1280 1640 skyrpe.exe 34 PID 1640 wrote to memory of 1280 1640 skyrpe.exe 34 PID 1640 wrote to memory of 1280 1640 skyrpe.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe"C:\Users\Admin\AppData\Local\Temp\88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe"C:\Users\Admin\AppData\Local\Temp\88c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LHGUB.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:1680
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1280
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06
-
Filesize
284KB
MD50ead4ea2d44a0207641ed37de4366360
SHA1e062d6ea408dd3cf504faf896f8d2f0f4fc3c24b
SHA25688c4f2e16d7cc7ba77008b7239e9ec2439d612ca80107674e7563e4c83a20700
SHA51209d12657097ac30a47709c16b2825ad864638c6aa9c7960a3705edd7db17e413523692bd67954ce1407b053358acc831e46db0ffb82bc236a4324bd08d733e06