Analysis

  • max time kernel
    660s
  • max time network
    439s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2024 00:02

General

  • Target

    skuld.exe

  • Size

    9.9MB

  • MD5

    536de02be9795e36bbdeddb25a41e86f

  • SHA1

    0d90c06a8b7b31162e2699d811b2f7ec79409b06

  • SHA256

    ece32c19a4d7a0dacedc55c7b963bc27f57f1f06698ff872e1f6e0d274a7960f

  • SHA512

    18917280c0ae8ac529389b77efed06c18a4a8584365e03296323d742c5ded537de759a8636d7eba1485fd45f47e1be6d44f50e702eaa969b69fdd9fc10d06999

  • SSDEEP

    98304:Uya1pcHZSedumKV77d/Fu3RoUblZIImEHB2v/ZmlzO:UN1MSedXQk3RoUZZIIDMgzO

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\skuld.exe
    "C:\Users\Admin\AppData\Local\Temp\skuld.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\skuld.exe
      2⤵
      • Views/modifies file attributes
      PID:3892
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4104
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k SDRSVC
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1688
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1092
    • C:\Windows\System32\hnaorh.exe
      "C:\Windows\System32\hnaorh.exe"
      1⤵
        PID:2932
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4556
        • C:\Windows\System32\hnaorh.exe
          hnaorh.exe
          2⤵
            PID:3284

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe

          Filesize

          5.1MB

          MD5

          30deb2bb3ec63e8354eb26b26e43b91e

          SHA1

          ee6298bd344154517600c011f11cd00dc52e4451

          SHA256

          a10644301c033a899009f9a209f6f11b259c2795d5123f1c922711677e5a03db

          SHA512

          d05af86e7de851ed7bec79545c05a439d58ea5318058bf494f00fdee667d890c6757d8fd0d5caeed8efbaeba4de11d3ce7d152a79263b780fcc4e87325b1ff4d

        • memory/4104-11-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-1-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-6-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-10-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-12-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-0-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-9-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-8-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-7-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-2-0x00000236BEFA0000-0x00000236BEFA1000-memory.dmp

          Filesize

          4KB

        • memory/4104-20-0x00000236BDD30000-0x00000236BDD40000-memory.dmp

          Filesize

          64KB

        • memory/4104-14-0x00000236BDCD0000-0x00000236BDCE0000-memory.dmp

          Filesize

          64KB