Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 19:14
Behavioral task
behavioral1
Sample
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe
Resource
win7-20240903-en
General
-
Target
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe
-
Size
317KB
-
MD5
245a2e25ceee91882dfd792513954996
-
SHA1
64df29a6bee5855e33f548ce2c2a906c7423cec1
-
SHA256
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b
-
SHA512
66f5647c6d11524b380719bc8d272d4ab898ff6b5bb152747f67d2cfeb961ed7ef08ee22bbded64b86055ef8e033a9913e2430f79c5d18ff3a545ef156809797
-
SSDEEP
3072:vSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:vPA6wxmuJspr2lb6
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\51491 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msurhy.exe" svchost.exe -
Executes dropped EXE 3 IoCs
Processes:
skyrpe.exeskyrpe.exeskyrpe.exepid Process 19052 skyrpe.exe 45868 skyrpe.exe 172084 skyrpe.exe -
Loads dropped DLL 5 IoCs
Processes:
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exepid Process 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
skyrpe.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exeskyrpe.exedescription pid Process procid_target PID 2380 set thread context of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 19052 set thread context of 45868 19052 skyrpe.exe 35 PID 19052 set thread context of 172084 19052 skyrpe.exe 36 -
Processes:
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2380-223-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/19268-53488-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/19268-53483-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2380-53493-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/19268-53492-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/19268-53491-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/19268-53485-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x000a000000015cdb-53518.dat upx behavioral1/memory/19268-53520-0x0000000003170000-0x00000000031C2000-memory.dmp upx behavioral1/memory/19268-53687-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/19052-53692-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/45868-106973-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/19052-106979-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/19268-106982-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/45868-106993-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msurhy.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exe033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.execmd.exereg.exeskyrpe.exeskyrpe.exeskyrpe.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
skyrpe.exepid Process 172084 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
skyrpe.exepid Process 172084 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
skyrpe.exedescription pid Process Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe Token: SeDebugPrivilege 45868 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exeskyrpe.exeskyrpe.exepid Process 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 19052 skyrpe.exe 45868 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.execmd.exeskyrpe.exeskyrpe.exedescription pid Process procid_target PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 2380 wrote to memory of 19268 2380 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 30 PID 19268 wrote to memory of 19128 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 31 PID 19268 wrote to memory of 19128 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 31 PID 19268 wrote to memory of 19128 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 31 PID 19268 wrote to memory of 19128 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 31 PID 19128 wrote to memory of 19076 19128 cmd.exe 33 PID 19128 wrote to memory of 19076 19128 cmd.exe 33 PID 19128 wrote to memory of 19076 19128 cmd.exe 33 PID 19128 wrote to memory of 19076 19128 cmd.exe 33 PID 19268 wrote to memory of 19052 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 34 PID 19268 wrote to memory of 19052 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 34 PID 19268 wrote to memory of 19052 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 34 PID 19268 wrote to memory of 19052 19268 033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe 34 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 45868 19052 skyrpe.exe 35 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 19052 wrote to memory of 172084 19052 skyrpe.exe 36 PID 172084 wrote to memory of 172200 172084 skyrpe.exe 37 PID 172084 wrote to memory of 172200 172084 skyrpe.exe 37 PID 172084 wrote to memory of 172200 172084 skyrpe.exe 37 PID 172084 wrote to memory of 172200 172084 skyrpe.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe"C:\Users\Admin\AppData\Local\Temp\033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe"C:\Users\Admin\AppData\Local\Temp\033fffb60051effbc3f76ff0ce33c3ea11c757af83fcaa21f75485aabd912e0b.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:19268 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QDFAA.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:19128 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:19076
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:19052 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:45868
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:172084 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:172200
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
317KB
MD533718981641c5385370e30b22369cb9e
SHA10e912001dcdbeb488ab8d7c67a0414aba0786436
SHA256fbe15d199c7d52201b16d381c53e568d9dc0d6bb8c29509fcdf34da61a6f72f7
SHA5122e08b328effcb7d18f53355c6a1a2ba500065b4459013467cdc23fbec65cd646ec5b00c513f2ad913ab9019bd34ad7321e844371d4735064c34b41b39f4e81fd