General

  • Target

    Skiioh_x_D1_v2.exe

  • Size

    171KB

  • Sample

    240905-pbtsms1dqf

  • MD5

    9ff1de04e106f0df15712475909ec182

  • SHA1

    54b86e79c27fb0741f9e2fc6382707f2deadac6c

  • SHA256

    bd0ec067966423f5033330248744c63f8ffc43fe1094215293b971cfa723d5c2

  • SHA512

    cb87b62591f257555301cc6587333481fbfbece01a62d6a01d0eb30003eaf3d46dffa1803efc7562b88cb953e2fc7f09569c5fdfb33967ea23eaa08b451519dd

  • SSDEEP

    3072:27DhdC6kzWypvaQ0FxyNTBfprWyzTtP8wrHOsN2Ee4Ew8Urt4+ns8Dh+W:2BlkZvaF4NTBBnTNze9wLuyZNZ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://chocolatey.org/install.ps1

Targets

    • Target

      Skiioh_x_D1_v2.exe

    • Size

      171KB

    • MD5

      9ff1de04e106f0df15712475909ec182

    • SHA1

      54b86e79c27fb0741f9e2fc6382707f2deadac6c

    • SHA256

      bd0ec067966423f5033330248744c63f8ffc43fe1094215293b971cfa723d5c2

    • SHA512

      cb87b62591f257555301cc6587333481fbfbece01a62d6a01d0eb30003eaf3d46dffa1803efc7562b88cb953e2fc7f09569c5fdfb33967ea23eaa08b451519dd

    • SSDEEP

      3072:27DhdC6kzWypvaQ0FxyNTBfprWyzTtP8wrHOsN2Ee4Ew8Urt4+ns8Dh+W:2BlkZvaF4NTBBnTNze9wLuyZNZ

    • Modifies firewall policy service

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

MITRE ATT&CK Enterprise v15

Tasks