Analysis
-
max time kernel
315s -
max time network
1609s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-10-2024 18:50
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win10-20240404-en
windows10-1703-x64
3 signatures
1800 seconds
General
-
Target
skuld.exe
-
Size
9.9MB
-
MD5
873e29ff957df42b18e9acd839e57854
-
SHA1
d3db5b14226be6caed8481a606642a9a7c5da7e1
-
SHA256
1c141c7280327dfae2729a768e31076cc23c972ef73e0323d0246e72423ba848
-
SHA512
ff6b103efc45674c12b52b3c74f0d4425a6f240b9a021dea925621cd51a51ee1c5443b206446e90ca0d02aa8fc62e2107d06e6bd9b1ce71708838693809a97d1
-
SSDEEP
98304:B/+UKnYehFlLUBnPZZMz9cXU5fpKePkE5B2v/ZmmzL:J+oehFN+BY9cXU9pKePdSDzL
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
skuld.exedescription pid process Token: SeDebugPrivilege 204 skuld.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
skuld.exedescription pid process target process PID 204 wrote to memory of 3164 204 skuld.exe attrib.exe PID 204 wrote to memory of 3164 204 skuld.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\skuld.exe"C:\Users\Admin\AppData\Local\Temp\skuld.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\skuld.exe2⤵
- Views/modifies file attributes
PID:3164
-