Overview
overview
7Static
static
30223d85eaf...e7.exe
windows7-x64
70223d85eaf...e7.exe
windows10-2004-x64
$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1Sky Beta.exe
windows7-x64
1Sky Beta.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
1locales/af.ps1
windows10-2004-x64
1locales/en-GB.ps1
windows7-x64
1locales/en-GB.ps1
windows10-2004-x64
1locales/et.ps1
windows7-x64
1locales/et.ps1
windows10-2004-x64
1locales/pt-BR.ps1
windows7-x64
1locales/pt-BR.ps1
windows10-2004-x64
1locales/sk.ps1
windows7-x64
1locales/sk.ps1
windows10-2004-x64
1locales/uk.ps1
windows7-x64
1locales/uk.ps1
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
0223d85eaf5cd5b188e61e9c99b62a9b5cfba4c5d2ed13576858b40327451ae7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0223d85eaf5cd5b188e61e9c99b62a9b5cfba4c5d2ed13576858b40327451ae7.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Sky Beta.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Sky Beta.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral12
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral13
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
libGLESv2.dll
Resource
win7-20231129-en
Behavioral task
behavioral17
Sample
libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
locales/af.ps1
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
locales/af.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
locales/en-GB.ps1
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
locales/en-GB.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
locales/et.ps1
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
locales/et.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
locales/pt-BR.ps1
Resource
win7-20231129-en
Behavioral task
behavioral25
Sample
locales/pt-BR.ps1
Resource
win10v2004-20231222-en
Behavioral task
behavioral26
Sample
locales/sk.ps1
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
locales/sk.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
locales/uk.ps1
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
locales/uk.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
resources/elevate.exe
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
resources/elevate.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral32
Sample
vk_swiftshader.dll
Resource
win7-20231215-en
General
-
Target
Sky Beta.exe
-
Size
152.7MB
-
MD5
82bba5f337a5441c52486c72dbe1ae91
-
SHA1
8e31ee0ec80cbf883b5ee945fed9b9e330407f5b
-
SHA256
28654e3b799752f56c9699d156c01f21dbbe598058ba52e9b8f876a0e7c8ce09
-
SHA512
16300c7c590145f9da4b8c06b6efe1be77a3ba037234d4de8fae3586c9453698596f6fa2e0600a171d0512a9b9b28dfbe55d27bffafe673e4c8afcbfb12660e7
-
SSDEEP
1572864:qLBZB52nvuZ7wVuMbgR7Sp6kYdEctmhoLsPagBsgkx52HYhwj+vfIBUdoJnP9Dj0:qypCmJctBjj2+Jv
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Updater.exe Sky Beta.exe -
Loads dropped DLL 2 IoCs
pid Process 3244 Sky Beta.exe 3244 Sky Beta.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates processes with tasklist 1 TTPs 10 IoCs
pid Process 3384 tasklist.exe 5052 tasklist.exe 3348 tasklist.exe 3228 tasklist.exe 1988 tasklist.exe 5084 tasklist.exe 1540 tasklist.exe 4816 tasklist.exe 1824 tasklist.exe 4656 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3960 Sky Beta.exe 3960 Sky Beta.exe 1428 Sky Beta.exe 1428 Sky Beta.exe 1428 Sky Beta.exe 1428 Sky Beta.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3348 tasklist.exe Token: SeDebugPrivilege 3228 tasklist.exe Token: SeDebugPrivilege 1988 tasklist.exe Token: SeDebugPrivilege 1540 tasklist.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeDebugPrivilege 4816 tasklist.exe Token: SeDebugPrivilege 5084 tasklist.exe Token: SeDebugPrivilege 3384 tasklist.exe Token: SeDebugPrivilege 5052 tasklist.exe Token: SeDebugPrivilege 1824 tasklist.exe Token: SeDebugPrivilege 4656 tasklist.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe Token: SeShutdownPrivilege 3244 Sky Beta.exe Token: SeCreatePagefilePrivilege 3244 Sky Beta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 4900 3244 Sky Beta.exe 87 PID 3244 wrote to memory of 4900 3244 Sky Beta.exe 87 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 4900 wrote to memory of 3348 4900 cmd.exe 85 PID 4900 wrote to memory of 3348 4900 cmd.exe 85 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 692 3244 Sky Beta.exe 86 PID 3244 wrote to memory of 3960 3244 Sky Beta.exe 89 PID 3244 wrote to memory of 3960 3244 Sky Beta.exe 89 PID 3244 wrote to memory of 208 3244 Sky Beta.exe 90 PID 3244 wrote to memory of 208 3244 Sky Beta.exe 90 PID 208 wrote to memory of 3228 208 cmd.exe 92 PID 208 wrote to memory of 3228 208 cmd.exe 92 PID 3244 wrote to memory of 532 3244 Sky Beta.exe 93 PID 3244 wrote to memory of 532 3244 Sky Beta.exe 93 PID 532 wrote to memory of 1988 532 cmd.exe 95 PID 532 wrote to memory of 1988 532 cmd.exe 95 PID 3244 wrote to memory of 3048 3244 Sky Beta.exe 96 PID 3244 wrote to memory of 3048 3244 Sky Beta.exe 96 PID 3048 wrote to memory of 1540 3048 cmd.exe 98 PID 3048 wrote to memory of 1540 3048 cmd.exe 98 PID 3244 wrote to memory of 2304 3244 Sky Beta.exe 99 PID 3244 wrote to memory of 2304 3244 Sky Beta.exe 99 PID 2304 wrote to memory of 4816 2304 cmd.exe 101 PID 2304 wrote to memory of 4816 2304 cmd.exe 101 PID 3244 wrote to memory of 4392 3244 Sky Beta.exe 102 PID 3244 wrote to memory of 4392 3244 Sky Beta.exe 102 PID 4392 wrote to memory of 5084 4392 cmd.exe 104 PID 4392 wrote to memory of 5084 4392 cmd.exe 104 PID 3244 wrote to memory of 4372 3244 Sky Beta.exe 105 PID 3244 wrote to memory of 4372 3244 Sky Beta.exe 105 PID 4372 wrote to memory of 3384 4372 cmd.exe 107 PID 4372 wrote to memory of 3384 4372 cmd.exe 107 PID 3244 wrote to memory of 440 3244 Sky Beta.exe 109 PID 3244 wrote to memory of 440 3244 Sky Beta.exe 109 PID 440 wrote to memory of 5052 440 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe"C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe"C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\project" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1744,i,15679237672164000475,10484915220717251909,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe"C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\project" --mojo-platform-channel-handle=1960 --field-trial-handle=1744,i,15679237672164000475,10484915220717251909,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:4280
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:912
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe"C:\Users\Admin\AppData\Local\Temp\Sky Beta.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\project" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1744,i,15679237672164000475,10484915220717251909,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\system32\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155KB
MD55e5e518ef0b6fdc731da7c6b92478aa0
SHA1e2cd51e5ee4d2bb317d2eb88f1008c3a4d06616c
SHA256eec714e3ec4aa4f4894541829ebca1cea5bded48a1995ff9534ce57d41ffc3de
SHA5125532288bd119937122af641d580721205bdcbeb05bc8595a68f59879cb1b76cd950d1a2a28f1226c7642d2d423f2bffe6e6c7cf27cc3957d894324dd1d2ee07f
-
Filesize
1.8MB
MD5beb8d911d40e8fe94770d9d341e0de11
SHA1d24d31e5b44a4a80969e2a669fb9b0ed42cfd479
SHA256ec41fc2fee2abcbf0559965501f54aae47cff24a87204fd3a85d86c7d53d53c7
SHA512079c43c2533fa35411247dd091c5caedb4a0dbdeee7b8f9fbbba6f521d760856822d373f1e6682eff10bebc63168cb4a445aee7b23047e4d784ab28891d07bfe