Resubmissions
25-07-2024 08:53
240725-ktbbssscrh 10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
skuld.sfx.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
skuld.sfx.exe
Resource
win10v2004-20240709-en
General
-
Target
skuld.sfx.exe
-
Size
3.7MB
-
MD5
ab89295610a3a53927f7479c8db9a8a9
-
SHA1
6060c650d1edcc005982448912fa9a6e18067696
-
SHA256
c128cf0d1afc230ead203fecf537e8161eb9cc1abd3cfbd7d9cf8def2cb4ae10
-
SHA512
c2da7a1fc89382bc124f84d9d8150c47db370ecd2ba9d57d80dc0a53eaea6d80f527a22cd6ab1be2b85172f18b840116f821684c7644c8e5f15e53b2d732e1ab
-
SSDEEP
98304:tWBHStoOEyvuShmCYhCahxI2vCcPUeybvRA5oFO9whPn:EBHSSOZuBC4Ct2vHcrbv18uhP
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1258409018213269555/uCN0wtYxZNzT5QyuDUtPXUdeYkj3blj_Ed2Glmr-iuRbwAZBTP8DYWusQH-_Wx4qwu1t
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 skuld.exe -
Loads dropped DLL 3 IoCs
pid Process 1700 skuld.sfx.exe 1700 skuld.sfx.exe 1732 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skuld.sfx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2344 1700 skuld.sfx.exe 30 PID 1700 wrote to memory of 2344 1700 skuld.sfx.exe 30 PID 1700 wrote to memory of 2344 1700 skuld.sfx.exe 30 PID 1700 wrote to memory of 2344 1700 skuld.sfx.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\skuld.sfx.exe"C:\Users\Admin\AppData\Local\Temp\skuld.sfx.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"2⤵
- Executes dropped EXE
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD59352bacdf89952efe367da4ca81941d9
SHA10b98c08b9689d7c18155d31a279fce7e9b4926fe
SHA2562f0124b95bb1bd8327039dc453d315719ce8c3f73b520821258ae062aba470ae
SHA512a4984d5ee906467bf3f5108aed217f6c1ba0be7714a50e67b9e4cfecf531b05a45d736c581d0e8010ebeaee69c177c66db704130e1a4989080f91603bc54a1f7