Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
skuld.sfx.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
skuld.sfx.exe
Resource
win10v2004-20240709-en
General
-
Target
skuld.sfx.exe
-
Size
3.7MB
-
MD5
69f045b706e34f7b013a1b3ef972b1f2
-
SHA1
0078959f87e4de4735def1ee9fcd99592757000b
-
SHA256
a2ce7baa72bb51468a0e92846530a8adc036fbf7ecdaaa40d0b68e86bb0d23e0
-
SHA512
294557695432f1c09e464c012ab330ca494fa9055c946e07b38723821e21ca646cf733a335bc29f343ba7b3c2eb18e51760bb7e7553682d9d315d38762eb9acd
-
SSDEEP
49152:t84a+Ka/iNj4WLG1cNLsvhZmKrniMrbokZPVuJqfK8eyl5LVPELrG0GR7Efp:tEXFegvKdYkZPYJoqyl5xPaNfp
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1266323703936057355/RcZ4i7xtRnR9TI9igA9_Cyhc-8yXb2ttFBlD8urPmC8e1TbC6EGbQFWCJpC4NeNhKbL9
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 skuld.exe -
Loads dropped DLL 2 IoCs
pid Process 2612 skuld.sfx.exe 2612 skuld.sfx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skuld.sfx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2780 2612 skuld.sfx.exe 30 PID 2612 wrote to memory of 2780 2612 skuld.sfx.exe 30 PID 2612 wrote to memory of 2780 2612 skuld.sfx.exe 30 PID 2612 wrote to memory of 2780 2612 skuld.sfx.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\skuld.sfx.exe"C:\Users\Admin\AppData\Local\Temp\skuld.sfx.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"2⤵
- Executes dropped EXE
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD53ffb6b537cbb924e0ccfa2431a649ef3
SHA1f813990a27cae2137fc0f7a3ec1e62462cda6f60
SHA2564a1378fc9481b9815a286c7319c1f9d9da43aef1087c4ea5153f7111e50152bb
SHA5126e60fa40b2d9e406b4682b9957823aa090fe52b4521d27305d9e5c953d0fdc9514127b0301e91a21a1a06d3ac991ba97325cc91d8fc2abee6eeb87f0eef9e926