Analysis

  • max time kernel
    145s
  • max time network
    143s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-10-2024 09:15

General

  • Target

    sigma.exe

  • Size

    23.8MB

  • MD5

    7b3b8c7ad73e483139127a259eedb39b

  • SHA1

    8c8951d762a0cd2cdb6cc7ba3112d069fe95a4ec

  • SHA256

    8f9b5cb5362dcbc71f288d310a67b65957a18e83c660078f6d32056a6077c7ed

  • SHA512

    a4d1f60e6bced99b36f5057748ea1515eeccc7d4b1e64930063748c280c8f392962b079ab321e53cf8a366f1dd48ec79f28149a312e6d577f3cc3119d24c4056

  • SSDEEP

    393216:V52BpDr3fdoc+5my5krGTONk+SBw7MSM5lMVFoga:b2Bp/7+0yBuk/BwJMzmFoga

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1294219914600513648/1hMj8NibsG6kkmCebWQXD2dsOS3COgpf78DC2CqwIi8Ve2EgBTg8fRzgTY1uxq8ArsSQ

Signatures

  • Skuld stealer

    An info stealer written in Go lang.

  • Executes dropped EXE 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sigma.exe
    "C:\Users\Admin\AppData\Local\Temp\sigma.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Users\Admin\AppData\Local\Temp\sigma_d0bc55da-d58e-455b-ac11-95c3c63a102a\sg.exe
      "C:\Users\Admin\AppData\Local\Temp\sigma_d0bc55da-d58e-455b-ac11-95c3c63a102a\sg.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3480
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\AppData\Local\Temp\sigma_d0bc55da-d58e-455b-ac11-95c3c63a102a\sg.exe
        3⤵
        • Views/modifies file attributes
        PID:1344
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\CompletePop.svg
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb74333cb8,0x7ffb74333cc8,0x7ffb74333cd8
      2⤵
        PID:1848
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:2
        2⤵
          PID:3976
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4036
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:8
          2⤵
            PID:4956
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:1
            2⤵
              PID:5092
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
              2⤵
                PID:2368
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4728
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1760
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                2⤵
                  PID:4104
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1940 /prefetch:1
                  2⤵
                    PID:1032
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:1
                    2⤵
                      PID:4680
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                      2⤵
                        PID:1276
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,15909900823604923249,3192347131803373470,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4724 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4040
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1396
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1044

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          1fc959921446fa3ab5813f75ca4d0235

                          SHA1

                          0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                          SHA256

                          1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                          SHA512

                          899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          e9a2c784e6d797d91d4b8612e14d51bd

                          SHA1

                          25e2b07c396ee82e4404af09424f747fc05f04c2

                          SHA256

                          18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                          SHA512

                          fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          59caf9dfa891c989d3ecf6644792bc94

                          SHA1

                          1dd23bccec2f24b9b707107b51ac1a8e3102e3d2

                          SHA256

                          cd865b2cb8bd5f710ef35e648f1c691b9347429975f217057c0110ac0d2ccb5a

                          SHA512

                          273019748ff2406689262af89038a6bb9117eb9795e3461a8ad5f86335fedb968e80f7f4b1567e737f59480054029e8cd44ebad17e178d5776df046abf50a80a

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          5857b4fd8aac6f37e814c9084e8310c7

                          SHA1

                          e4bea3fa5b6b6f1cd25202df7840017d13b1c630

                          SHA256

                          24be4d6e5fa86e3345bb4360f63057a24785aed5ec00d35cc495e76d4bc3a45a

                          SHA512

                          521fd424154e1ab5d2cf47dbecc2bf138bd5ee5ececacc1f37a6c82792202d194033cebfb5d83b9caaf9d9e5f1fe0d11ae7114886958580651297c54382293d3

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          206702161f94c5cd39fadd03f4014d98

                          SHA1

                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                          SHA256

                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                          SHA512

                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          3b690c39ebe228421173303e924bd5e6

                          SHA1

                          08d5316cda35b9b114a810eb6579f18573504e7b

                          SHA256

                          c904673847a1d610c893cfe152f36ee62d0507408578d1531ad14aa4a0cf621b

                          SHA512

                          b6aed0320282d3d82f3ca60e34f6f5d9a4ef61f3950e1dd26fe6db84adc59e4894c9d5f19088832c1d39e63475c1f7d9997d70ff21d4f0af3b0f2cb5e1e98238

                        • C:\Users\Admin\AppData\Local\Temp\sigma_d0bc55da-d58e-455b-ac11-95c3c63a102a\sg.exe

                          Filesize

                          14.8MB

                          MD5

                          2a90ba072e3b471bcde749b7cd016fa3

                          SHA1

                          022469956011ddd8c84ab82f23bb4af9f3c2a5d9

                          SHA256

                          e6e38df3a9b32c592012748cd2a01f29faeb0aee3028571cb2abfa8d4f997102

                          SHA512

                          5886639582079c80871883aac6aa562215cb7b77de4a7dcc64916b83d39b96c03c4d0bee8e56efd87b39106226749561fc03292fd98e3d875eaa5e5b7b248530

                        • \??\pipe\LOCAL\crashpad_4376_ZYWZZUTELJAPTWLM

                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                        • memory/3996-3-0x0000000075010000-0x00000000757C1000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3996-130-0x0000000075010000-0x00000000757C1000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3996-4-0x0000000005FD0000-0x0000000006576000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/3996-0-0x000000007501E000-0x000000007501F000-memory.dmp

                          Filesize

                          4KB

                        • memory/3996-2-0x0000000003010000-0x0000000003034000-memory.dmp

                          Filesize

                          144KB

                        • memory/3996-1-0x0000000000C20000-0x0000000000C6A000-memory.dmp

                          Filesize

                          296KB