Analysis

  • max time kernel
    97s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    27-03-2023 05:35

General

  • Target

    SkyFlick2.1_WIN11/SkyFlick2.exe

  • Size

    5.4MB

  • MD5

    86a3d3a67b29fe9dd04f3cc865056245

  • SHA1

    210c988487baacbc41dd8590b77688d8a03b81f1

  • SHA256

    646dc44a15f576f31d4f357f2538bf5aec7bd92ed373b8a217daeee7a22e81c0

  • SHA512

    d33dfb990b61ce9930469260cd643ef643ca79c66bfbb41e4e8b4f4e684f8abfac8936ce84667d6154b0c62de2cbbbc7fc4c4d6058a635d07366939207a131cc

  • SSDEEP

    98304:uMaC/In9pCoFypqViZfw+1AFb8qTgDRr19pF2rKELuSLw3aOTy:naUIn9/Fyy+yoqgjRVELuwwqiy

Malware Config

Signatures

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 6 IoCs
  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: LoadsDriver 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\SkyFlick2.exe
    "C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\SkyFlick2.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic csproduct get UUID 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get UUID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4356
    • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\data\bin.1
      kdu -prv 24 -dse 0
      2⤵
      • Sets service image path in registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:3980
    • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\data\bin.1
      kdu -prv 21 -dse 0
      2⤵
      • Sets service image path in registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:844
    • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\data\bin.1
      kdu -prv 21 -dse 6
      2⤵
      • Sets service image path in registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:4188
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:4800
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic csproduct get UUID 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic csproduct get UUID
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5024
      • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\data\bin.1
        kdu -prv 24 -dse 0
        2⤵
        • Sets service image path in registry
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        PID:5052
      • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\data\bin.1
        kdu -prv 21 -dse 0
        2⤵
        • Sets service image path in registry
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        PID:2024
      • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\data\bin.1
        kdu -prv 21 -dse 6
        2⤵
        • Sets service image path in registry
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        PID:4424
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c pause
        2⤵
          PID:3720

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/316-134-0x00007FF9EA020000-0x00007FF9EA022000-memory.dmp
        Filesize

        8KB

      • memory/316-135-0x00007FF689B60000-0x00007FF68A474000-memory.dmp
        Filesize

        9.1MB

      • memory/316-133-0x00007FF9EA010000-0x00007FF9EA012000-memory.dmp
        Filesize

        8KB

      • memory/844-161-0x00007FF60C4C0000-0x00007FF60CF34000-memory.dmp
        Filesize

        10.5MB

      • memory/2024-204-0x00007FF60C4C0000-0x00007FF60CF34000-memory.dmp
        Filesize

        10.5MB

      • memory/3980-141-0x00007FF9EA020000-0x00007FF9EA022000-memory.dmp
        Filesize

        8KB

      • memory/3980-143-0x00007FF9E8A20000-0x00007FF9E8A22000-memory.dmp
        Filesize

        8KB

      • memory/3980-144-0x00007FF9E7E60000-0x00007FF9E7E62000-memory.dmp
        Filesize

        8KB

      • memory/3980-145-0x00007FF9E7E70000-0x00007FF9E7E72000-memory.dmp
        Filesize

        8KB

      • memory/3980-146-0x00007FF9EA030000-0x00007FF9EA032000-memory.dmp
        Filesize

        8KB

      • memory/3980-147-0x00007FF9EA040000-0x00007FF9EA042000-memory.dmp
        Filesize

        8KB

      • memory/3980-148-0x00007FF60C4C0000-0x00007FF60CF34000-memory.dmp
        Filesize

        10.5MB

      • memory/3980-142-0x00007FF9E8A10000-0x00007FF9E8A12000-memory.dmp
        Filesize

        8KB

      • memory/3980-140-0x00007FF9EA010000-0x00007FF9EA012000-memory.dmp
        Filesize

        8KB

      • memory/4188-174-0x00007FF60C4C0000-0x00007FF60CF34000-memory.dmp
        Filesize

        10.5MB

      • memory/5052-191-0x00007FF60C4C0000-0x00007FF60CF34000-memory.dmp
        Filesize

        10.5MB