Overview
overview
6Static
static
3sketchyori...eTswap
ubuntu-18.04-amd64
6sketchyori...eTswap
debian-9-armhf
1sketchyori...eTswap
debian-9-mips
sketchyori...eTswap
debian-9-mipsel
sketchyori...ty.lnk
windows7-x64
3sketchyori...ty.lnk
windows10-2004-x64
3sketchyori...et.lnk
windows7-x64
3sketchyori...et.lnk
windows10-2004-x64
3sketchyori...ll.lnk
windows7-x64
3sketchyori...ll.lnk
windows10-2004-x64
3sketchyori...ls.lnk
windows7-x64
3sketchyori...ls.lnk
windows10-2004-x64
3sketchyori...ip.lnk
windows7-x64
3sketchyori...ip.lnk
windows10-2004-x64
3sketchyori...og.lnk
windows7-x64
3sketchyori...og.lnk
windows10-2004-x64
3sketchyori...11.lnk
windows7-x64
1sketchyori...11.lnk
windows10-2004-x64
1sketchyori...allpkg
ubuntu-18.04-amd64
6sketchyori...allpkg
debian-9-armhf
1sketchyori...allpkg
debian-9-mips
sketchyori...allpkg
debian-9-mipsel
sketchyori...sm.pdf
windows7-x64
1sketchyori...sm.pdf
windows10-2004-x64
1sketchyori...rg.pdf
windows7-x64
1sketchyori...rg.pdf
windows10-2004-x64
1sketchyori...js.pdf
windows7-x64
1sketchyori...js.pdf
windows10-2004-x64
1sketchyori...js.pdf
windows7-x64
1sketchyori...js.pdf
windows10-2004-x64
1sketchyori...js.pdf
windows7-x64
1sketchyori...js.pdf
windows10-2004-x64
1Resubmissions
12/06/2024, 17:05
240612-vmcamasdqh 612/06/2024, 16:56
240612-vft7vsscma 712/06/2024, 16:50
240612-vcjxqasbna 612/06/2024, 16:40
240612-t6wb6swank 6Analysis
-
max time kernel
62s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
sketchyorignorant-main/SeTswap
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sketchyorignorant-main/SeTswap
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sketchyorignorant-main/SeTswap
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
sketchyorignorant-main/SeTswap
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
sketchyorignorant-main/System and Security.lnk
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
sketchyorignorant-main/System and Security.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
sketchyorignorant-main/The Internet.lnk
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
sketchyorignorant-main/The Internet.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
sketchyorignorant-main/Windows Defender Firewall.lnk
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
sketchyorignorant-main/Windows Defender Firewall.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
sketchyorignorant-main/Windows Tools.lnk
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
sketchyorignorant-main/Windows Tools.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
sketchyorignorant-main/clamav-1.2.0.win.x64.zip.lnk
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
sketchyorignorant-main/clamav-1.2.0.win.x64.zip.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
sketchyorignorant-main/error.log.lnk
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
sketchyorignorant-main/error.log.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
sketchyorignorant-main/https--account.microsoft.com-ref=settings&Platform=Windows11.lnk
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
sketchyorignorant-main/https--account.microsoft.com-ref=settings&Platform=Windows11.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
sketchyorignorant-main/installpkg
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral20
Sample
sketchyorignorant-main/installpkg
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral21
Sample
sketchyorignorant-main/installpkg
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral22
Sample
sketchyorignorant-main/installpkg
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral23
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_browser_omni.ja!_chrome_browser_res_activity-stream_lib_ASRoute6r.jsm.pdf
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_browser_omni.ja!_chrome_browser_res_activity-stream_lib_ASRoute6r.jsm.pdf
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targ.pdf
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targ.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targeting_Targe7ting.sys.mjs.pdf
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targeting_Targe7ting.sys.mjs.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targeting_Targeting.sys.5mjs.pdf
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targeting_Targeting.sys.5mjs.pdf
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targeting_Targeting.sys.mjs.pdf
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
sketchyorignorant-main/jar file ___usr_lib_firefox_omni.ja!_chrome_toolkit_res_messaging-system_targeting_Targeting.sys.mjs.pdf
Resource
win10v2004-20240611-en
General
-
Target
sketchyorignorant-main/Windows Tools.lnk
-
Size
146B
-
MD5
aa115a2d7c6124790368f13184d2eed7
-
SHA1
a240d7c55ae5703b003b10ca091e1075fd6e8cb6
-
SHA256
80a75f76109f38b599eb681762bdd936842da8567d8b402ee94fd84927a32e94
-
SHA512
87a645adecc908460f1927a64e38451632c77c82b54dfedde8482b56a95ca59f4bb189f36f18ac82879e762a815b8ea27256ce2d66c7d1acc5eb8ccb1f730180
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 0c0001008421de39050000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 1e00718000000000000000000000e1a40ed25739d211a40b0c50205241530000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f706806ee260aa0d7449371beb064c986830000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 880 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 880 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 880 explorer.exe 880 explorer.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\sketchyorignorant-main\Windows Tools.lnk"1⤵
- Modifies registry class
PID:4820
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:880