Overview
overview
7Static
static
3sketchyori...632898
ubuntu-18.04-amd64
3sketchyori...632898
debian-9-armhf
1sketchyori...632898
debian-9-mips
sketchyori...632898
debian-9-mipsel
sketchyori...175893
ubuntu-24.04-amd64
sketchyori...175897
ubuntu-24.04-amd64
sketchyori...175898
ubuntu-24.04-amd64
sketchyori...175899
ubuntu-18.04-amd64
sketchyori...175902
ubuntu-24.04-amd64
sketchyori...175903
ubuntu-24.04-amd64
sketchyori...175904
ubuntu-20.04-amd64
sketchyori...175908
ubuntu-24.04-amd64
sketchyori...175911
ubuntu-24.04-amd64
sketchyori...175917
ubuntu-24.04-amd64
sketchyori...175955
ubuntu-24.04-amd64
1sketchyori...974.gz
windows7-x64
3sketchyori...974.gz
windows10-2004-x64
3unicode-wi...lib.js
windows7-x64
3unicode-wi...lib.js
windows10-2004-x64
3sketchyori...985.gz
windows7-x64
3sketchyori...985.gz
windows10-2004-x64
7sketchyori...987.gz
windows7-x64
3sketchyori...987.gz
windows10-2004-x64
3sketchyori...ERE.7z
windows7-x64
3sketchyori...ERE.7z
windows10-2004-x64
3sketchyori...~~.cab
windows7-x64
1sketchyori...~~.cab
windows10-2004-x64
1amd64_dual...64.sys
windows10-2004-x64
1sketchyori...ab.lnk
windows7-x64
3sketchyori...ab.lnk
windows10-2004-x64
3sketchyori...~~.cab
windows7-x64
1sketchyori...~~.cab
windows10-2004-x64
1Resubmissions
12-06-2024 17:05
240612-vmcamasdqh 612-06-2024 16:56
240612-vft7vsscma 712-06-2024 16:50
240612-vcjxqasbna 612-06-2024 16:40
240612-t6wb6swank 6Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
sketchyorignorant-main/21632898
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sketchyorignorant-main/21632898
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
sketchyorignorant-main/21632898
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
sketchyorignorant-main/21632898
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
sketchyorignorant-main/67175893
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral6
Sample
sketchyorignorant-main/67175897
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral7
Sample
sketchyorignorant-main/67175898
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral8
Sample
sketchyorignorant-main/67175899
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral9
Sample
sketchyorignorant-main/67175902
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral10
Sample
sketchyorignorant-main/67175903
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral11
Sample
sketchyorignorant-main/67175904
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral12
Sample
sketchyorignorant-main/67175908
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral13
Sample
sketchyorignorant-main/67175911
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral14
Sample
sketchyorignorant-main/67175917
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral15
Sample
sketchyorignorant-main/67175955
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral16
Sample
sketchyorignorant-main/67175974.gz
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
sketchyorignorant-main/67175974.gz
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
unicode-width-0.1.5/src/lib.js
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
unicode-width-0.1.5/src/lib.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
sketchyorignorant-main/67175985.gz
Resource
win7-20231129-en
Behavioral task
behavioral21
Sample
sketchyorignorant-main/67175985.gz
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
sketchyorignorant-main/67175987.gz
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
sketchyorignorant-main/67175987.gz
Resource
win10v2004-20240611-en
Behavioral task
behavioral24
Sample
sketchyorignorant-main/DOOCKEREEERE.7z
Resource
win7-20240508-en
Behavioral task
behavioral25
Sample
sketchyorignorant-main/DOOCKEREEERE.7z
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
sketchyorignorant-main/Microsoft-Windows-Ethernet-Client-Intel-E1i68x64-FOD-Package~31bf3856ad364e35~amd64~~.cab
Resource
win7-20231129-en
Behavioral task
behavioral27
Sample
sketchyorignorant-main/Microsoft-Windows-Ethernet-Client-Intel-E1i68x64-FOD-Package~31bf3856ad364e35~amd64~~.cab
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
amd64_dual_net1ic64.inf_31bf3856ad364e35_10.0.22621.1_none_9c37897afc379c39/e1i68x64.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
sketchyorignorant-main/Microsoft-Windows-Ethernet-Client-Intel-E1i68x64-FOD-Package~31bf3856ad364e35~amd64~~.cab.lnk
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
sketchyorignorant-main/Microsoft-Windows-Ethernet-Client-Intel-E1i68x64-FOD-Package~31bf3856ad364e35~amd64~~.cab.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
sketchyorignorant-main/Microsoft-Windows-Ethernet-Client-Intel-E2f68-FOD-Package~31bf3856ad364e35~amd64~~.cab
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
sketchyorignorant-main/Microsoft-Windows-Ethernet-Client-Intel-E2f68-FOD-Package~31bf3856ad364e35~amd64~~.cab
Resource
win10v2004-20240611-en
General
-
Target
sketchyorignorant-main/67175974.gz
-
Size
15KB
-
MD5
d7c493ca4f84a7d50b53646421a37487
-
SHA1
82af5ff3b480cb5a3870da5e3b4762c3d6b7b888
-
SHA256
882386231c45df4700b275c7ff55b6f3698780a650026380e72dabe76fa46526
-
SHA512
bd5ac5f0433953d79408074239edc7c43ce23d56659d467805d81ab01c576a3cf77ccedb3bba41d48bc4ad46a8905ac8a1927b99312053ef6295fd940a6766d2
-
SSDEEP
384:QkAUnbXYwhNjTJ2O8ZZc/JtwRb6DedKzVYqQo9sCDyTXE:CU/jTJ2lZc/JtY6KgZYH0D2U
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 7b9d822a7ba1da01 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424373469" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2E80B3C6-28DD-11EF-BCA5-FE55E2F65CCF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 4076 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3984 iexplore.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
Processes:
OpenWith.exeiexplore.exeIEXPLORE.EXEpid process 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 4076 OpenWith.exe 3984 iexplore.exe 3984 iexplore.exe 4144 IEXPLORE.EXE 4144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
OpenWith.exeiexplore.exedescription pid process target process PID 4076 wrote to memory of 3984 4076 OpenWith.exe iexplore.exe PID 4076 wrote to memory of 3984 4076 OpenWith.exe iexplore.exe PID 3984 wrote to memory of 4144 3984 iexplore.exe IEXPLORE.EXE PID 3984 wrote to memory of 4144 3984 iexplore.exe IEXPLORE.EXE PID 3984 wrote to memory of 4144 3984 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sketchyorignorant-main\67175974.gz1⤵
- Modifies registry class
PID:652
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sketchyorignorant-main\67175974.gz2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3984 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4144