Analysis

  • max time kernel
    315s
  • max time network
    1609s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-10-2024 18:50

General

  • Target

    skuld.exe

  • Size

    9.9MB

  • MD5

    873e29ff957df42b18e9acd839e57854

  • SHA1

    d3db5b14226be6caed8481a606642a9a7c5da7e1

  • SHA256

    1c141c7280327dfae2729a768e31076cc23c972ef73e0323d0246e72423ba848

  • SHA512

    ff6b103efc45674c12b52b3c74f0d4425a6f240b9a021dea925621cd51a51ee1c5443b206446e90ca0d02aa8fc62e2107d06e6bd9b1ce71708838693809a97d1

  • SSDEEP

    98304:B/+UKnYehFlLUBnPZZMz9cXU5fpKePkE5B2v/ZmmzL:J+oehFN+BY9cXU9pKePdSDzL

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\skuld.exe
    "C:\Users\Admin\AppData\Local\Temp\skuld.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:204
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\skuld.exe
      2⤵
      • Views/modifies file attributes
      PID:3164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads