Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 13:17
Behavioral task
behavioral1
Sample
skuller.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
skuller.exe
Resource
win10v2004-20240802-en
General
-
Target
skuller.exe
-
Size
10.1MB
-
MD5
9cf3f1180bd48500b5f6155f9502cd21
-
SHA1
f153178d9da42f7cf117f1201ceaa0775113b452
-
SHA256
9c13b909a8cab5f51b911cd5ec54163cd28a3446b6d752260941dec06fa2bf92
-
SHA512
f5b19539c409a669e1574192ffc86c01a23e17ed843a8ff3f5ef7462b2cc26930fe36a692df73ff3ca7c930c91e25c15918267e7e673b3158ec708ba71ec6f51
-
SSDEEP
196608:cauf2n61W903eV4QRmMToEuGxgh858F0ibfUxgABsJ1SbNk9MtlKFbGT:62nwW+eGQRmMTozGxu8C0ibftlZFbe
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2808 skuller.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2808 2708 skuller.exe 31 PID 2708 wrote to memory of 2808 2708 skuller.exe 31 PID 2708 wrote to memory of 2808 2708 skuller.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce