Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe
Resource
win10v2004-20220812-en
General
-
Target
3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe
-
Size
284KB
-
MD5
0895669f60bb393254c4c64554bb6ff0
-
SHA1
1a8494d9e3cbf040dfbca759158fab6d18962f9a
-
SHA256
3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de
-
SHA512
5c8cbd0cea3105cc559cdd0c5e309075ac945367c5814a789d12d696b61fb4fe3a45ee3b980c02e8e7b472113cdeeebfeddb5677cbbe8040089aa149745bec29
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\45958 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msosnop.bat" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 4316 skyrpe.exe 956 skyrpe.exe 4644 skyrpe.exe -
resource yara_rule behavioral2/memory/1880-135-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1880-137-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1880-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1880-141-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1880-150-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/956-162-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1880-163-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/956-168-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3916 set thread context of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 4316 set thread context of 956 4316 skyrpe.exe 86 PID 4316 set thread context of 4644 4316 skyrpe.exe 87 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msosnop.bat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4644 skyrpe.exe 4644 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4644 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe Token: SeDebugPrivilege 956 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 4316 skyrpe.exe 956 skyrpe.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 3916 wrote to memory of 1880 3916 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 80 PID 1880 wrote to memory of 2324 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 81 PID 1880 wrote to memory of 2324 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 81 PID 1880 wrote to memory of 2324 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 81 PID 2324 wrote to memory of 3568 2324 cmd.exe 84 PID 2324 wrote to memory of 3568 2324 cmd.exe 84 PID 2324 wrote to memory of 3568 2324 cmd.exe 84 PID 1880 wrote to memory of 4316 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 85 PID 1880 wrote to memory of 4316 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 85 PID 1880 wrote to memory of 4316 1880 3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe 85 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 956 4316 skyrpe.exe 86 PID 4316 wrote to memory of 4644 4316 skyrpe.exe 87 PID 4316 wrote to memory of 4644 4316 skyrpe.exe 87 PID 4316 wrote to memory of 4644 4316 skyrpe.exe 87 PID 4316 wrote to memory of 4644 4316 skyrpe.exe 87 PID 4316 wrote to memory of 4644 4316 skyrpe.exe 87 PID 4316 wrote to memory of 4644 4316 skyrpe.exe 87 PID 4644 wrote to memory of 1192 4644 skyrpe.exe 88 PID 4644 wrote to memory of 1192 4644 skyrpe.exe 88 PID 4644 wrote to memory of 1192 4644 skyrpe.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe"C:\Users\Admin\AppData\Local\Temp\3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe"C:\Users\Admin\AppData\Local\Temp\3451b5de53ab5bad7205166dd7d3f0ea8cb0a75b999042b325eab8d5b91525de.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CHVUG.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:3568
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:956
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1192
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD5000ca9d0fb0c4b0022b2b64331c78ff1
SHA16f6366fcc45591fc2fb230d87acd0883849e7de5
SHA256da66fddf14e308a6a4c26faa3dd31c3caab8b7a7b96536bd041c8a7e924807a2
SHA5123b5e86affdf47402ab1858d23f0f17bd68da3afddccb5ab60757131ab58143fcf32c5865f676eb7ad07e5e952721985e934182be0df10e26351b848867d6fc48
-
Filesize
284KB
MD5000ca9d0fb0c4b0022b2b64331c78ff1
SHA16f6366fcc45591fc2fb230d87acd0883849e7de5
SHA256da66fddf14e308a6a4c26faa3dd31c3caab8b7a7b96536bd041c8a7e924807a2
SHA5123b5e86affdf47402ab1858d23f0f17bd68da3afddccb5ab60757131ab58143fcf32c5865f676eb7ad07e5e952721985e934182be0df10e26351b848867d6fc48
-
Filesize
284KB
MD5000ca9d0fb0c4b0022b2b64331c78ff1
SHA16f6366fcc45591fc2fb230d87acd0883849e7de5
SHA256da66fddf14e308a6a4c26faa3dd31c3caab8b7a7b96536bd041c8a7e924807a2
SHA5123b5e86affdf47402ab1858d23f0f17bd68da3afddccb5ab60757131ab58143fcf32c5865f676eb7ad07e5e952721985e934182be0df10e26351b848867d6fc48
-
Filesize
284KB
MD5000ca9d0fb0c4b0022b2b64331c78ff1
SHA16f6366fcc45591fc2fb230d87acd0883849e7de5
SHA256da66fddf14e308a6a4c26faa3dd31c3caab8b7a7b96536bd041c8a7e924807a2
SHA5123b5e86affdf47402ab1858d23f0f17bd68da3afddccb5ab60757131ab58143fcf32c5865f676eb7ad07e5e952721985e934182be0df10e26351b848867d6fc48