Analysis
-
max time kernel
1s -
max time network
3s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-09-2024 16:41
Behavioral task
behavioral1
Sample
scrim mod.exe
Resource
win11-20240802-en
General
-
Target
scrim mod.exe
-
Size
3.2MB
-
MD5
8b18c1414d646cd4138db5c1b67c318a
-
SHA1
58642571e177880cd319d2b6777ea4350845a199
-
SHA256
1039ecbae09ab86703af4ddaef7e9cab739b75d1adb0879914389cee7683bd6f
-
SHA512
8f273ecf086f3e21adccb8581ef0e047d1594ae6c7344a004bc1454497edc33a5b51fa7085e31808293ac5a8e210a3a158fa755d930b2057d9dd078bb35ede16
-
SSDEEP
98304:WfzzQtNrIU8czmxnPCObnlItD60EiBmW/avuhF:iQNCxnPpJItD6Zi8uX
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1279918414151811084/vVYCMnXox3dM_lOJkaNDChap2gbQftEjcKl4GdYEPumAxFJEA7KYNeqYd_tgvv_dcIvH
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3532-0-0x00000000008B0000-0x00000000012F8000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe upx behavioral1/memory/3532-5-0x00000000008B0000-0x00000000012F8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
scrim mod.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" scrim mod.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org 1 api.ipify.org 1 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
scrim mod.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum scrim mod.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 scrim mod.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Processes:
scrim mod.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C scrim mod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 scrim mod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 scrim mod.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
scrim mod.exewmic.exewmic.exedescription pid process Token: SeDebugPrivilege 3532 scrim mod.exe Token: SeIncreaseQuotaPrivilege 4724 wmic.exe Token: SeSecurityPrivilege 4724 wmic.exe Token: SeTakeOwnershipPrivilege 4724 wmic.exe Token: SeLoadDriverPrivilege 4724 wmic.exe Token: SeSystemProfilePrivilege 4724 wmic.exe Token: SeSystemtimePrivilege 4724 wmic.exe Token: SeProfSingleProcessPrivilege 4724 wmic.exe Token: SeIncBasePriorityPrivilege 4724 wmic.exe Token: SeCreatePagefilePrivilege 4724 wmic.exe Token: SeBackupPrivilege 4724 wmic.exe Token: SeRestorePrivilege 4724 wmic.exe Token: SeShutdownPrivilege 4724 wmic.exe Token: SeDebugPrivilege 4724 wmic.exe Token: SeSystemEnvironmentPrivilege 4724 wmic.exe Token: SeRemoteShutdownPrivilege 4724 wmic.exe Token: SeUndockPrivilege 4724 wmic.exe Token: SeManageVolumePrivilege 4724 wmic.exe Token: 33 4724 wmic.exe Token: 34 4724 wmic.exe Token: 35 4724 wmic.exe Token: 36 4724 wmic.exe Token: SeIncreaseQuotaPrivilege 4724 wmic.exe Token: SeSecurityPrivilege 4724 wmic.exe Token: SeTakeOwnershipPrivilege 4724 wmic.exe Token: SeLoadDriverPrivilege 4724 wmic.exe Token: SeSystemProfilePrivilege 4724 wmic.exe Token: SeSystemtimePrivilege 4724 wmic.exe Token: SeProfSingleProcessPrivilege 4724 wmic.exe Token: SeIncBasePriorityPrivilege 4724 wmic.exe Token: SeCreatePagefilePrivilege 4724 wmic.exe Token: SeBackupPrivilege 4724 wmic.exe Token: SeRestorePrivilege 4724 wmic.exe Token: SeShutdownPrivilege 4724 wmic.exe Token: SeDebugPrivilege 4724 wmic.exe Token: SeSystemEnvironmentPrivilege 4724 wmic.exe Token: SeRemoteShutdownPrivilege 4724 wmic.exe Token: SeUndockPrivilege 4724 wmic.exe Token: SeManageVolumePrivilege 4724 wmic.exe Token: 33 4724 wmic.exe Token: 34 4724 wmic.exe Token: 35 4724 wmic.exe Token: 36 4724 wmic.exe Token: SeIncreaseQuotaPrivilege 3364 wmic.exe Token: SeSecurityPrivilege 3364 wmic.exe Token: SeTakeOwnershipPrivilege 3364 wmic.exe Token: SeLoadDriverPrivilege 3364 wmic.exe Token: SeSystemProfilePrivilege 3364 wmic.exe Token: SeSystemtimePrivilege 3364 wmic.exe Token: SeProfSingleProcessPrivilege 3364 wmic.exe Token: SeIncBasePriorityPrivilege 3364 wmic.exe Token: SeCreatePagefilePrivilege 3364 wmic.exe Token: SeBackupPrivilege 3364 wmic.exe Token: SeRestorePrivilege 3364 wmic.exe Token: SeShutdownPrivilege 3364 wmic.exe Token: SeDebugPrivilege 3364 wmic.exe Token: SeSystemEnvironmentPrivilege 3364 wmic.exe Token: SeRemoteShutdownPrivilege 3364 wmic.exe Token: SeUndockPrivilege 3364 wmic.exe Token: SeManageVolumePrivilege 3364 wmic.exe Token: 33 3364 wmic.exe Token: 34 3364 wmic.exe Token: 35 3364 wmic.exe Token: 36 3364 wmic.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
scrim mod.exedescription pid process target process PID 3532 wrote to memory of 4272 3532 scrim mod.exe attrib.exe PID 3532 wrote to memory of 4272 3532 scrim mod.exe attrib.exe PID 3532 wrote to memory of 5012 3532 scrim mod.exe attrib.exe PID 3532 wrote to memory of 5012 3532 scrim mod.exe attrib.exe PID 3532 wrote to memory of 4724 3532 scrim mod.exe wmic.exe PID 3532 wrote to memory of 4724 3532 scrim mod.exe wmic.exe PID 3532 wrote to memory of 3364 3532 scrim mod.exe wmic.exe PID 3532 wrote to memory of 3364 3532 scrim mod.exe wmic.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4272 attrib.exe 5012 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\scrim mod.exe"C:\Users\Admin\AppData\Local\Temp\scrim mod.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\scrim mod.exe"2⤵
- Views/modifies file attributes
PID:4272
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Views/modifies file attributes
PID:5012
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD58b18c1414d646cd4138db5c1b67c318a
SHA158642571e177880cd319d2b6777ea4350845a199
SHA2561039ecbae09ab86703af4ddaef7e9cab739b75d1adb0879914389cee7683bd6f
SHA5128f273ecf086f3e21adccb8581ef0e047d1594ae6c7344a004bc1454497edc33a5b51fa7085e31808293ac5a8e210a3a158fa755d930b2057d9dd078bb35ede16