Analysis

  • max time kernel
    66s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 17:26

General

  • Target

    slinky.rar

  • Size

    26.1MB

  • MD5

    710f5f275317d3936d9dcbcb53a579ee

  • SHA1

    b96c3a924aa3642f3b87b7063f7fa2060a9a10d0

  • SHA256

    4bf1ea8ace7f1c427b54adc6c8d9da2f79f5be1475e3ca4609e997e2b93f5e87

  • SHA512

    5775062891166e163b98de8130665bc9d5d400249ba1142e4cd7e901a3c62097347151e8eb58e297ca7b2fc7a36d680b92d3b6d0399a9b009fd0093380da80c3

  • SSDEEP

    393216:T9cWRf8yrPoqsN8KhgKldFVtHyEPXBSeqQTr9BmcfCDLMnyXmJOU7f1cIDuz7Qq4:TSWmcoqstVIcxwMmtnqROecIQ3s

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1288586956971835474/KOwZpzzvHgBFnLYWk6PiicTPjzY_P0vpTibLIhpjtTMHi8CPkv2cwuhQTfaTc_MnkUX6

Signatures

  • Skuld stealer

    An info stealer written in Go lang.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\slinky.rar
    1⤵
    • Modifies registry class
    PID:4760
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\slinky.rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:624
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1964
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\slinky.rar"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1060
    • C:\Users\Admin\Desktop\slinky\slinky.exe
      "C:\Users\Admin\Desktop\slinky\slinky.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\Desktop\slinky\slinky.exe
        2⤵
        • Views/modifies file attributes
        PID:3976
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
        2⤵
        • Views/modifies file attributes
        PID:1976
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get UUID
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3448
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\slinky.rar"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:5108
    • C:\Users\Admin\Desktop\slinky\slinky.exe
      "C:\Users\Admin\Desktop\slinky\slinky.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\Desktop\slinky\slinky.exe
        2⤵
        • Views/modifies file attributes
        PID:4852
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
        2⤵
        • Views/modifies file attributes
        PID:2960
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get UUID
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\slinky\slinky.exe

      Filesize

      14.2MB

      MD5

      5ef2d4590801769c57ea9b4690dc4a7d

      SHA1

      21a12ed600a2a69cb38091eb75b52c5bfee10c1d

      SHA256

      48e5cc1db19aacc0b68e6f4d8378fcd833f98cc7606e25a0fc185257332cf532

      SHA512

      358d4b1d78a7e6f8eabeb622ae6d8fe9d8dd6d2a0e839600ea637c2df42103639e34ac50bc8a7859f621ce858023f7fa527d2081f9c1dd24d200127a0977b99a

    • memory/624-17-0x00007FF6EBBF0000-0x00007FF6EBCE8000-memory.dmp

      Filesize

      992KB

    • memory/624-18-0x00007FFBDA6B0000-0x00007FFBDA6E4000-memory.dmp

      Filesize

      208KB

    • memory/624-19-0x00007FFBCA690000-0x00007FFBCA946000-memory.dmp

      Filesize

      2.7MB

    • memory/624-20-0x00007FFBC91E0000-0x00007FFBCA290000-memory.dmp

      Filesize

      16.7MB