General
-
Target
Skiioh_x_D1_v2.exe
-
Size
171KB
-
Sample
240905-pbtsms1dqf
-
MD5
9ff1de04e106f0df15712475909ec182
-
SHA1
54b86e79c27fb0741f9e2fc6382707f2deadac6c
-
SHA256
bd0ec067966423f5033330248744c63f8ffc43fe1094215293b971cfa723d5c2
-
SHA512
cb87b62591f257555301cc6587333481fbfbece01a62d6a01d0eb30003eaf3d46dffa1803efc7562b88cb953e2fc7f09569c5fdfb33967ea23eaa08b451519dd
-
SSDEEP
3072:27DhdC6kzWypvaQ0FxyNTBfprWyzTtP8wrHOsN2Ee4Ew8Urt4+ns8Dh+W:2BlkZvaF4NTBBnTNze9wLuyZNZ
Static task
static1
Behavioral task
behavioral1
Sample
Skiioh_x_D1_v2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://chocolatey.org/install.ps1
Targets
-
-
Target
Skiioh_x_D1_v2.exe
-
Size
171KB
-
MD5
9ff1de04e106f0df15712475909ec182
-
SHA1
54b86e79c27fb0741f9e2fc6382707f2deadac6c
-
SHA256
bd0ec067966423f5033330248744c63f8ffc43fe1094215293b971cfa723d5c2
-
SHA512
cb87b62591f257555301cc6587333481fbfbece01a62d6a01d0eb30003eaf3d46dffa1803efc7562b88cb953e2fc7f09569c5fdfb33967ea23eaa08b451519dd
-
SSDEEP
3072:27DhdC6kzWypvaQ0FxyNTBfprWyzTtP8wrHOsN2Ee4Ew8Urt4+ns8Dh+W:2BlkZvaF4NTBBnTNze9wLuyZNZ
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
3Hidden Files and Directories
2Ignore Process Interrupts
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
8