Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
skuld.sfx.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
skuld.sfx.exe
Resource
win10v2004-20240709-en
General
-
Target
skuld.sfx.exe
-
Size
3.7MB
-
MD5
e07476e550f7c3ccb7f5e30f29a88d05
-
SHA1
2a1ad24b3cda146a9de84e41f3df017215fa7a72
-
SHA256
06c02f85d69aa4f5afb0b214f81960fcd30c76766a7d29df79d6637205af7f3c
-
SHA512
741c1ee74ae84b389cc2fb68b138277c8b9b3dd78bc36e3c6f0e0a322136321a7e4968981d2508714efa346b039bc61042176e37a3efab87ad7efc7b09eafb52
-
SSDEEP
98304:txMmfMvWN/2VT3rUUxq0mgc3LjqlQUQHFl2zSwi:0Z+OT7JVE/Vl2k
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1264686401501401089/XAi_UkMq6Piek4Byxf_KJY-VIOIPpUoXKEe5FthGsd-Jo_7aylbLmrAPLf0nBSrgFfAx
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 skuld.exe -
Loads dropped DLL 3 IoCs
pid Process 2384 skuld.sfx.exe 2384 skuld.sfx.exe 2320 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skuld.sfx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2064 2384 skuld.sfx.exe 30 PID 2384 wrote to memory of 2064 2384 skuld.sfx.exe 30 PID 2384 wrote to memory of 2064 2384 skuld.sfx.exe 30 PID 2384 wrote to memory of 2064 2384 skuld.sfx.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\skuld.sfx.exe"C:\Users\Admin\AppData\Local\Temp\skuld.sfx.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"2⤵
- Executes dropped EXE
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD58a5e259fcae4149b4506ef7101433e7e
SHA18967da4ff877c87ccbd545e22631a004bb64f57a
SHA2565af25e4db8592f89856ed609d748d51abee8666c3c545fa3c9aa26198a37fac7
SHA5121f3a9683f4d2b922a96546f8d72d65932ca237364c805a6790376ae18c340e6ff526ed92c8268c7490bc5333723b8100c52cacfbc254395f5f066e8eb62fd8dd