Analysis
-
max time kernel
1371s -
max time network
1431s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-10-2024 22:43
Behavioral task
behavioral1
Sample
StarsHero.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
2 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Hero Installer.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
7 signatures
1800 seconds
General
-
Target
Hero Installer.exe
-
Size
3.2MB
-
MD5
99b4eee043f43b712c55e22627e0657e
-
SHA1
5c52730ce0a5e5662fd4d3b31cc6808284aed4a1
-
SHA256
c7e5ec4788379a9dfe837b77cffccd736a89b075de9f6839b63b9a1e97cbccd2
-
SHA512
481093a306b7098858b3850eb4cb6994c37e2a8204d7eefcccf5bd7e1dde17a6ab9d6852cda6c2102220beb4881508ae63a08c684fae3eecdb5feeea72590976
-
SSDEEP
49152:6UlMxh3KbgsF2ljgJcvTdqrVPLiRfYMNqusjmj3YXYUAgg+b9ub9AC5JJ:dl0hlsERv0J+fYMNOY2Yf+SeC5JJ
Score
10/10
Malware Config
Extracted
Family
skuld
C2
https://discord.com/api/webhooks/1299857810292609034/CmvPrI4O1_Ki2MR6uQa8p7l5tp_6fFkSrqlQl4lee8GPVswb-bDC49xNFwmJAK-hRCrz
Signatures
-
Skuld family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" Hero Installer.exe -
resource yara_rule behavioral2/memory/4324-0-0x0000000000350000-0x0000000000D98000-memory.dmp upx behavioral2/memory/4324-1-0x0000000000350000-0x0000000000D98000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 Hero Installer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3624 4324 Hero Installer.exe 82 PID 4324 wrote to memory of 3624 4324 Hero Installer.exe 82 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3624 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hero Installer.exe"C:\Users\Admin\AppData\Local\Temp\Hero Installer.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\Hero Installer.exe"2⤵
- Views/modifies file attributes
PID:3624
-