Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 07:38

General

  • Target

    megre.exe

  • Size

    4.0MB

  • MD5

    268e1c293401120cbf8cd6a84dccf2e9

  • SHA1

    5724512b69c6ce750a56fcb359d7cffd8de822fd

  • SHA256

    b29f7ff6aa3ad15cd643bd3fdd830d5ef9273d276ac122e581d2f9f5767d40d3

  • SHA512

    55c044142152a0930c49a7f216315540c0a31e51db5415916f9ba59480bf18c27318943f5549c20aa192145a64359b7c3d39aad59c33b272a75b34f1abb9ba63

  • SSDEEP

    98304:pIfqfMQC3igGnRrmOgkDV/OFYiT3rPNBWxBe2O:p8qIyvlm4p/OFNbf4eP

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1256150041513562143/LfrA9YKj_eB7YuAhTIl0O-spiEIkK-M3AYcBofAqSotskvUIB1bZRSbod7TXYgA7oLQp

Signatures

  • Skuld stealer

    An info stealer written in Go lang.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\megre.exe
    "C:\Users\Admin\AppData\Local\Temp\megre.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\cracker.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"
          4⤵
          • Executes dropped EXE
          PID:1124
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2448
          • C:\Windows\SysWOW64\cscript.exe
            cscript /nologo /e:jscript "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat"
            5⤵
              PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2444
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/watch?v=fboNTcjJ8bo
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2336
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1508
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2464
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /im cmd.exe /f
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:384
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\XClient.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\XClient.bat"
            4⤵
              PID:2496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        252B

        MD5

        9cf10e0830f7a79d6d4b2c73e2276d49

        SHA1

        0515d76014fe7f0cc61e08d7e7540b3ae9eae07c

        SHA256

        f59b94f5f4d129b8391d14414f02b195735735b2cc5cd676b5d93dbd64cf9102

        SHA512

        a26f716796c7fc4ae84c2201ce2dcd9dac4f744a21fa091cc7c789f224d9ba82d168b06d3221eed4fbfbabd8f410ee534071e01db78d26f34aac3d45ac161da3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        e008cf4e002b81f524bf0aef03c2025e

        SHA1

        e954a8d96d67b06c84ec22ef2c8b341ba525cf58

        SHA256

        668552c8bde015f1cb27e04d3c1a31c1160a939579dc84b91cdc4dfe18644c30

        SHA512

        018cafd4543a479043568b96a8bd0eb92e76591dfd99ec9c29d13cd24ffca1f6333af67e97aa31ee12e2d0415d75c7a5caecc35d7fdb40c8eb9c2c3b276e73b6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bceccbb4db546110170a017d84b3a7b7

        SHA1

        e481de1f3c91d79961118171eda5fe7aa1df9e6d

        SHA256

        d6b44694971e821b757a3b9f631453d45b1a9b8b0f8e30717bdce9bce14214ac

        SHA512

        24c5baac0e5b2c94868423db0fa35aaf0e250ab5af932feed0842c455e901e5db8641dfe63d7efaab67d4ea7232f8d333925dea29bff66166ba2f5610c5f0367

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4317e7b165caa6b34f30bb74b8cadb50

        SHA1

        e82f602246d82b7bd1bce8de40dc50637497d86f

        SHA256

        e9646358e0f8557246c8d99495c670db5069e7ef94e252b28e7dd08dc27a1e59

        SHA512

        0e6bc9ae94f279fd6ee31f78f35d24d0857a1777abccd6ff6947523a54490592050364aec00d7835cf54da6b2761ac4b509b185b1d5d24d24b0b86f3c3273a95

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a47e43e26e582c17be322793d451beb4

        SHA1

        d76b6a62dd01d14ce58480fa8bbddc07c82d23c1

        SHA256

        f678c9fe31289a55acefd20506218e3f4442340bfa4eb32e61be5086b442929c

        SHA512

        87b4db370f7ad1206f18f7a266595b64c801d88f5fdf8ca2fccb36a93899660fb0526955c64301eb114d2541030cc00305df840517e2aac07b48813dc264409d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        273ee0ae51e7a3f3210746c1b915dc9d

        SHA1

        968a539ea82afc54fd5f98639ee5af967d5efe7a

        SHA256

        a83cdd06ecdaf0f01a4d120d0c40e4986b939bc30a1884231ef7b2bb4fa71321

        SHA512

        53108cfc323a06a31e77f0583299d84901988f5525db2d12a50a6c8ee39bb4233dd83628788b16013c2929983485214fd76840d3ed38b3fface305ddf273bdd3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6f5f3fd3ddd316384f18d61b70c0f8c6

        SHA1

        fc898a4e775c7bc7fa37fbb210d3594032b233cc

        SHA256

        38797e7d9b64430c81e5033090936ebf223fe7ffbd98acb793185350d032090a

        SHA512

        57bf888c891337500cf909961c732baa7ca40da72138fe0a25bf676353c0e82252a85c838aa026db24fef73cbece428dc334d9a3fd7ed0426d3045b3fd4f8240

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c9d4f4a6a8abaeaef344b4e419c4bec4

        SHA1

        40edac71582388554eafd92d4d69f653a0f5ce2d

        SHA256

        2f7b1e74acfb43bf067007d137984330ec8a0340e0677b016835d23680345963

        SHA512

        bb899ac11fffd85bcc900fd1d5f75b26e036c8959879eb355d8d97e019c079cd2c8cccb95c3282444786695bed09320bc2b154b54db53ebbf5accbc5ffc04894

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        066a2fdba05e20724aad19a107200002

        SHA1

        0e90d6751184f64911082d5c87de5d77b2320870

        SHA256

        2b3edc866a74377ad2a6fd30b2cb92e36c2ab88423b74143d80b6a2dac48ece2

        SHA512

        9f2a500ff0447fb8181e832abfdb0bb5bbed4c2a906cbfcad0ac38ddf6684af538fa92d3a64a25f93ae9b3c348831f8e0742f0c05db3bb3844dcac908d364d02

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\sxsuh4u\imagestore.dat

        Filesize

        1KB

        MD5

        a66a6b7905330b5935a87b1561995a29

        SHA1

        eeaeaf53f24301e002f2e6e359877d4eb2e7a0ac

        SHA256

        741667078ac79b3879cf610f815f63971acd8064889fb717c377ecab6c9893e1

        SHA512

        9fe76da86d9684a42c815635f64426c946b1ceb81165718cec2df93b74277d139450553a416b79c2c5fed72622ee52aad58412d7d1641968d9407b3ab99ad8da

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\favicon[2].ico

        Filesize

        1KB

        MD5

        f2a495d85735b9a0ac65deb19c129985

        SHA1

        f2e22853e5da3e1017d5e1e319eeefe4f622e8c8

        SHA256

        8bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d

        SHA512

        6ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b

      • C:\Users\Admin\AppData\Local\Temp\Cab53CC.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XClient.bat

        Filesize

        371KB

        MD5

        3d6307a885e46f705605cff9a4aa7dfc

        SHA1

        d39dec491bf22e6821856d523b45237bf2bf84ac

        SHA256

        83cc17a4d11fe7f62858e2ca7cc2c1a4ac12b930ab62812706467a145e9e08b9

        SHA512

        8735b7045e4bed5927f8791b041641288fb1bf02250c6957fe805381fbcb59f93b3f1f5042bc3f923b4faeb112badcc3614c7249b9df74b085b6881da49552f6

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cracker.bat

        Filesize

        516B

        MD5

        aa5e25d98df0583aec226c1a8231543a

        SHA1

        faea3e6eaa1f0ae725574c8c9d9dab662c5ae976

        SHA256

        35948b018277612a9803d0b52831d2412c66274047d24631e9d368b68b458f4f

        SHA512

        82c3bcac5b5d815829e35840fd6b08bf37687212f1d570beb9add77123e8cd5f81779d82e93c42e13f9e58f12697998de291f2741e42a5384005d4e62590abdf

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe

        Filesize

        9.5MB

        MD5

        1be94157b0913505663b33e385fc661a

        SHA1

        7d0166709d002b7669ef738eee92b54d03959835

        SHA256

        1782797f8874cb105549a70054fd5dfe41b9e24c685602782119ff01c583a18c

        SHA512

        0798082cad2988ae649bf57cd58c41db6173b7119c42299bc94d67f8d163bdd0b34463da159dcd6c44bc940199c7a4fb56945559b83dc9b33538bb387287b61e

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat

        Filesize

        54B

        MD5

        18ef03e1045b224a70d9afdf8247a241

        SHA1

        117b3959ded227b5cf0015229db0386f6479df70

        SHA256

        daf87ae302bcd7c7a65f6db2b93216116de0621169f724f564812a6a8614f33d

        SHA512

        2ef552283ed844801dc6b7a2ec143e1e52f77b6f7ee2516bb70b3c8db6592eaef9e435f063bbb94019ac135c2e37ccfcb9db8f926a7358c3590b3fc9c63beafd

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat

        Filesize

        74B

        MD5

        b3be17a14609d812602af67da8b7acc2

        SHA1

        e1fcc3e3989ee6846694eba252622a336ce63795

        SHA256

        f6cb1a4b508b1650cc1eaa607f545e50967157eef4f676de39836f2806d63b81

        SHA512

        780a624a79bb3b293d83017595f709dd9fdc9e645f9c8bc5102aacaaad89a622e6a0dae9ea30fc3679378f6fe4afe34937f4909594c32351ee831917e8b0c1a7

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat

        Filesize

        340B

        MD5

        6943c2eb7e78b8b8cb8171b940de20f2

        SHA1

        e428c6dc0ffc17ab70178765e0bcb23dc0c12b8a

        SHA256

        eb79d4bf846dfbd540085f0972658373f26709f281dfb88ad461f9df03d83095

        SHA512

        1d628f3c5ac6e41ed14cc0069bde0278248e32c77e2e111bc842a71ba62d52913b47fb29402ce79b3d0880b6b5763b0d9906d6fb65bcfdf33103aefa0044552b

      • C:\Users\Admin\AppData\Local\Temp\Tar5777.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\Tar5912.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b