Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 06:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0RMQNB2.vmp.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
0RMQNB2.vmp.exe
-
Size
13.6MB
-
MD5
537e63b336d6786b54142a3858d04cfc
-
SHA1
d45e5d30634b91a59bfdc8cf882a910409d52543
-
SHA256
82fcf0065f059a7a65719efbd76369f70043fd68880b96074d3da82c0f8e693d
-
SHA512
59665fdb746fe15dab993b0550af789b1fd5caa6a365d41f20715b0bb9d9ddc19cf14569582e217523c379fcdf07437ee063ea6a47822aea13c33f8b39857295
-
SSDEEP
393216:fgQy/GlBZVPOnr4jdmRwb2c1KVjWAYI9aZ+5B:fgwfA+qwb3sV6AYB
Malware Config
Extracted
Family
skuld
C2
https://discord.com/api/webhooks/1278685696588124283/sHga8EVjouFXXrvPxaHU2YXCRJIVE1RYWbSaVSKowDG7Boj-3cTXc-qc4i12g0-7911uD
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0RMQNB2.vmp.exepid process 1848 0RMQNB2.vmp.exe 1848 0RMQNB2.vmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0RMQNB2.vmp.exedescription pid process Token: SeDebugPrivilege 1848 0RMQNB2.vmp.exe