Overview
overview
3Static
static
1Skoice.jar
windows7-x64
1Skoice.jar
windows10-2004-x64
1META-INF/NOTICE
windows7-x64
1META-INF/NOTICE
windows10-2004-x64
1META-INF/s...alizer
windows7-x64
3META-INF/s...alizer
windows10-2004-x64
3META-INF/s...alizer
windows7-x64
3META-INF/s...alizer
windows10-2004-x64
3META-INF/s...actory
windows7-x64
3META-INF/s...actory
windows10-2004-x64
3META-INF/s...tcodec
windows7-x64
3META-INF/s...tcodec
windows10-2004-x64
3config.yml
windows7-x64
3config.yml
windows10-2004-x64
3lang/DA.yml
windows7-x64
3lang/DA.yml
windows10-2004-x64
3lang/DE.yml
windows7-x64
3lang/DE.yml
windows10-2004-x64
3lang/EN.yml
windows7-x64
3lang/EN.yml
windows10-2004-x64
3lang/ES.yml
windows7-x64
3lang/ES.yml
windows10-2004-x64
3lang/FR.yml
windows7-x64
3lang/FR.yml
windows10-2004-x64
3lang/IT.yml
windows7-x64
3lang/IT.yml
windows10-2004-x64
3lang/JA.yml
windows7-x64
3lang/JA.yml
windows10-2004-x64
3lang/NO.yml
windows7-x64
3lang/NO.yml
windows10-2004-x64
3lang/PL.yml
windows7-x64
3lang/PL.yml
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
Skoice.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Skoice.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
META-INF/NOTICE
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
META-INF/NOTICE
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
META-INF/services/jakarta.servlet.servletcontainerinitializer
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
META-INF/services/jakarta.servlet.servletcontainerinitializer
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
META-INF/services/javax.servlet.servletcontainerinitializer
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
META-INF/services/javax.servlet.servletcontainerinitializer
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
META-INF/services/net.clementraynaud.skoice.libraries.com.fasterxml.jackson.core.jsonfactory
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
META-INF/services/net.clementraynaud.skoice.libraries.com.fasterxml.jackson.core.jsonfactory
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
META-INF/services/net.clementraynaud.skoice.libraries.com.fasterxml.jackson.core.objectcodec
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
META-INF/services/net.clementraynaud.skoice.libraries.com.fasterxml.jackson.core.objectcodec
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
config.yml
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
config.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
lang/DA.yml
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
lang/DA.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
lang/DE.yml
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
lang/DE.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
lang/EN.yml
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
lang/EN.yml
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
lang/ES.yml
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
lang/ES.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
lang/FR.yml
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
lang/FR.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
lang/IT.yml
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
lang/IT.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
lang/JA.yml
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
lang/JA.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
lang/NO.yml
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
lang/NO.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
lang/PL.yml
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
lang/PL.yml
Resource
win10v2004-20240226-en
General
-
Target
lang/NO.yml
-
Size
18KB
-
MD5
13cf1456d95e00f4ed2cfbee9f6bf59f
-
SHA1
098b94c53ea078441b65e4bbf19386a43b43e155
-
SHA256
3134e16dfbe52e22129c73369026484d3adce4e7190bfc764e3402ae6700a82d
-
SHA512
c784a193fb042e80773128680ac16a4c17041fecd7aab967f6f21832adbe3f1e9975dcdad39358b0bad4e0de2a614e6e3d17a5a7bafff70d6fe9cdefa896adf2
-
SSDEEP
192:OKZzJmegtW7ZqXnwIAl1/1pxFXS17EhpiBmDriovXTg2Lu0sE/hukD:OKmemW71Ll1DxFC1KpiEiKg+huu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\yml_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\yml_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.yml rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.yml\ = "yml_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\yml_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\yml_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\yml_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\yml_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 AcroRd32.exe 1648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1736 1728 cmd.exe 30 PID 1728 wrote to memory of 1736 1728 cmd.exe 30 PID 1728 wrote to memory of 1736 1728 cmd.exe 30 PID 1736 wrote to memory of 1648 1736 rundll32.exe 31 PID 1736 wrote to memory of 1648 1736 rundll32.exe 31 PID 1736 wrote to memory of 1648 1736 rundll32.exe 31 PID 1736 wrote to memory of 1648 1736 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lang\NO.yml1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lang\NO.yml2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lang\NO.yml"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD528f31e5a175379f6f6f74c31d980d529
SHA1d6b28e79d4537ca7e677776a634e7bfafefe0dab
SHA256447a3c3becc6730ed32373ab68150b6af1291d2bd431ba127c2df13856281eb9
SHA5128e0bd727c3dede2bf31090e4679e09fa536cb83e8be2d0d65f6b0e70bc519c70458a58615359c231c9d01359966ac1d87a9a098429e0766de074139ff6c6e71c