Analysis
-
max time kernel
235s -
max time network
280s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:51
Static task
static1
Behavioral task
behavioral1
Sample
57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe
Resource
win10v2004-20220812-en
General
-
Target
57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe
-
Size
284KB
-
MD5
04d173a9e11d4c4116d495df2d9a6660
-
SHA1
2d99f8c5c95a557644c7d6c303510520cb0ff255
-
SHA256
57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5
-
SHA512
d77e16b2003284e22f6683ab529dc84908dd1dc0458b5126c3852bdf90a87308bec5b8b53181cd1aea830489f32fe6c91ba30bebf92412484a338c1a1103c60e
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\12929 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mslxaaqkh.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1336 skyrpe.exe 1460 skyrpe.exe 1848 skyrpe.exe -
resource yara_rule behavioral1/memory/268-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-81-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/268-100-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1460-102-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1460-108-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1168 set thread context of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1336 set thread context of 1460 1336 skyrpe.exe 33 PID 1336 set thread context of 1848 1336 skyrpe.exe 34 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mslxaaqkh.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1848 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1848 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe Token: SeDebugPrivilege 1460 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 1336 skyrpe.exe 1460 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 1168 wrote to memory of 268 1168 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 28 PID 268 wrote to memory of 1120 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 29 PID 268 wrote to memory of 1120 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 29 PID 268 wrote to memory of 1120 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 29 PID 268 wrote to memory of 1120 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 29 PID 1120 wrote to memory of 1892 1120 cmd.exe 31 PID 1120 wrote to memory of 1892 1120 cmd.exe 31 PID 1120 wrote to memory of 1892 1120 cmd.exe 31 PID 1120 wrote to memory of 1892 1120 cmd.exe 31 PID 268 wrote to memory of 1336 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 32 PID 268 wrote to memory of 1336 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 32 PID 268 wrote to memory of 1336 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 32 PID 268 wrote to memory of 1336 268 57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe 32 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1460 1336 skyrpe.exe 33 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1336 wrote to memory of 1848 1336 skyrpe.exe 34 PID 1848 wrote to memory of 1396 1848 skyrpe.exe 35 PID 1848 wrote to memory of 1396 1848 skyrpe.exe 35 PID 1848 wrote to memory of 1396 1848 skyrpe.exe 35 PID 1848 wrote to memory of 1396 1848 skyrpe.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe"C:\Users\Admin\AppData\Local\Temp\57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe"C:\Users\Admin\AppData\Local\Temp\57e1b15cbdcc6fe5308ef05e1686bff246f3460b19d4f521e27a0579bd1738c5.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JXWIQ.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:1892
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1396
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a
-
Filesize
284KB
MD505ee0fc4c0fc91c4cf0dca22a32f9642
SHA140d19e190bf92069ff8d62dfbb730b6d14f26228
SHA256d163c34d2b1a56fbc01eefbfa946e8f22a9a2160a1d2d8b13ad4a3b5e8d444de
SHA512ac854807744e081a0bbfe706f43cd7d51a9f5eb0eb54dcc819e1420754a0ffcf2201edfd7abf081bec47f98d42f764a1cd8a2e8cfff4b082138b224e4e9a2c5a