Analysis
-
max time kernel
158s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe
Resource
win10v2004-20240226-en
General
-
Target
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe
-
Size
934KB
-
MD5
7cdb1da63c9ff18665e4a85fec748fcd
-
SHA1
fa49423cb84debb5c378d89c88781c286f4f8e56
-
SHA256
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827
-
SHA512
3ea3fca56456711eb1095f525be927ce4fa3cbdd68fa668078ba543799dc00e0d806d7291986a321303eb395a446c38898574e57d6fc44b18961c08903c68a58
-
SSDEEP
12288:9J5Qyg1q3ZzWW1O5tmOy4nY9LIvpTo+CmqLvRDVlR9VAqF63hvWCndZl6lXDj:PGyuqAEVApTImalR9WFhuCdTy3
Malware Config
Extracted
remcos
RemoteHost
104.250.180.178:7902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Skyreal.exe
-
copy_folder
Skyreal
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Sky-K7LT69
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe -
Executes dropped EXE 3 IoCs
Processes:
Skyreal.exeSkyreal.exeSkyreal.exepid process 1136 Skyreal.exe 4216 Skyreal.exe 1728 Skyreal.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exeSkyreal.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sky-K7LT69 = "\"C:\\ProgramData\\Skyreal\\Skyreal.exe\"" 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Sky-K7LT69 = "\"C:\\ProgramData\\Skyreal\\Skyreal.exe\"" 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sky-K7LT69 = "\"C:\\ProgramData\\Skyreal\\Skyreal.exe\"" Skyreal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Sky-K7LT69 = "\"C:\\ProgramData\\Skyreal\\Skyreal.exe\"" Skyreal.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exeSkyreal.exedescription pid process target process PID 4528 set thread context of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 1136 set thread context of 1728 1136 Skyreal.exe Skyreal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exeSkyreal.exepid process 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 1136 Skyreal.exe 1136 Skyreal.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exeSkyreal.exedescription pid process Token: SeDebugPrivilege 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe Token: SeDebugPrivilege 1136 Skyreal.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exeSkyreal.exedescription pid process target process PID 4528 wrote to memory of 2896 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 2896 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 2896 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 4528 wrote to memory of 1232 4528 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe PID 1232 wrote to memory of 1136 1232 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe Skyreal.exe PID 1232 wrote to memory of 1136 1232 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe Skyreal.exe PID 1232 wrote to memory of 1136 1232 6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe Skyreal.exe PID 1136 wrote to memory of 4216 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 4216 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 4216 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe PID 1136 wrote to memory of 1728 1136 Skyreal.exe Skyreal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe"C:\Users\Admin\AppData\Local\Temp\6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe"C:\Users\Admin\AppData\Local\Temp\6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe"C:\Users\Admin\AppData\Local\Temp\6fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Skyreal\Skyreal.exe"C:\ProgramData\Skyreal\Skyreal.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Skyreal\Skyreal.exe"C:\ProgramData\Skyreal\Skyreal.exe"4⤵
- Executes dropped EXE
-
C:\ProgramData\Skyreal\Skyreal.exe"C:\ProgramData\Skyreal\Skyreal.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Skyreal\Skyreal.exeFilesize
934KB
MD57cdb1da63c9ff18665e4a85fec748fcd
SHA1fa49423cb84debb5c378d89c88781c286f4f8e56
SHA2566fcb2b9e055ed80a6cd600c7c211d8c2d9dcaa959fdf525dd02ac0685a4d6827
SHA5123ea3fca56456711eb1095f525be927ce4fa3cbdd68fa668078ba543799dc00e0d806d7291986a321303eb395a446c38898574e57d6fc44b18961c08903c68a58
-
memory/1136-38-0x0000000073F50000-0x0000000074700000-memory.dmpFilesize
7.7MB
-
memory/1136-31-0x0000000005090000-0x00000000050A0000-memory.dmpFilesize
64KB
-
memory/1136-29-0x0000000073F50000-0x0000000074700000-memory.dmpFilesize
7.7MB
-
memory/1232-12-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1232-13-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1232-30-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1232-17-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1232-15-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1728-40-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1728-39-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1728-37-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1728-35-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4528-16-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB
-
memory/4528-0-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB
-
memory/4528-5-0x00000000059B0000-0x00000000059C0000-memory.dmpFilesize
64KB
-
memory/4528-11-0x00000000090F0000-0x000000000918C000-memory.dmpFilesize
624KB
-
memory/4528-4-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB
-
memory/4528-3-0x00000000059C0000-0x0000000005A52000-memory.dmpFilesize
584KB
-
memory/4528-10-0x0000000006A70000-0x0000000006B28000-memory.dmpFilesize
736KB
-
memory/4528-2-0x0000000005E90000-0x0000000006434000-memory.dmpFilesize
5.6MB
-
memory/4528-9-0x0000000001570000-0x000000000157E000-memory.dmpFilesize
56KB
-
memory/4528-8-0x00000000059B0000-0x00000000059C0000-memory.dmpFilesize
64KB
-
memory/4528-1-0x0000000000F00000-0x0000000000FF0000-memory.dmpFilesize
960KB
-
memory/4528-7-0x0000000005D60000-0x0000000005D7C000-memory.dmpFilesize
112KB
-
memory/4528-6-0x0000000005C00000-0x0000000005C0A000-memory.dmpFilesize
40KB