Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:41
Behavioral task
behavioral1
Sample
cmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cmd.exe
Resource
win10v2004-20241007-en
General
-
Target
cmd.exe
-
Size
9.9MB
-
MD5
9478056827dc985dba17b6c55e3cb928
-
SHA1
3cf6e9b6f1e3f3bf81ea6bcf5d18daa834d953ff
-
SHA256
063e987f285254ba377777908c86776620eb52bd075e3bc9c7c35afb483eadef
-
SHA512
d4f78e67f43533152c9cfb0abb3044a0bd17054a845b8ae5033f0f46c43b4772cc3691373cfd3c346f9fe9169dbb280fd158d6e8b90c176cbe19954c33690754
-
SSDEEP
98304:OzU4brhxBASgf/gEpiji6Ig8TWAiEIICafZm/mbnXg:OxrhxBAGZji6IdThvRTXg
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1302814463975755826/SP0RWz-_aK--OyBDoh10bzitmgFKpMrGQ1jgC-LE5pmYIoTJz0KD2dpOlGc9R_RaAsf2
Signatures
-
Skuld family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cmd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" cmd.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org 4 api.ipify.org 7 ip-api.com -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 -
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 cmd.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
cmd.exewmic.exedescription pid Process Token: SeDebugPrivilege 316 cmd.exe Token: SeIncreaseQuotaPrivilege 4980 wmic.exe Token: SeSecurityPrivilege 4980 wmic.exe Token: SeTakeOwnershipPrivilege 4980 wmic.exe Token: SeLoadDriverPrivilege 4980 wmic.exe Token: SeSystemProfilePrivilege 4980 wmic.exe Token: SeSystemtimePrivilege 4980 wmic.exe Token: SeProfSingleProcessPrivilege 4980 wmic.exe Token: SeIncBasePriorityPrivilege 4980 wmic.exe Token: SeCreatePagefilePrivilege 4980 wmic.exe Token: SeBackupPrivilege 4980 wmic.exe Token: SeRestorePrivilege 4980 wmic.exe Token: SeShutdownPrivilege 4980 wmic.exe Token: SeDebugPrivilege 4980 wmic.exe Token: SeSystemEnvironmentPrivilege 4980 wmic.exe Token: SeRemoteShutdownPrivilege 4980 wmic.exe Token: SeUndockPrivilege 4980 wmic.exe Token: SeManageVolumePrivilege 4980 wmic.exe Token: 33 4980 wmic.exe Token: 34 4980 wmic.exe Token: 35 4980 wmic.exe Token: 36 4980 wmic.exe Token: SeIncreaseQuotaPrivilege 4980 wmic.exe Token: SeSecurityPrivilege 4980 wmic.exe Token: SeTakeOwnershipPrivilege 4980 wmic.exe Token: SeLoadDriverPrivilege 4980 wmic.exe Token: SeSystemProfilePrivilege 4980 wmic.exe Token: SeSystemtimePrivilege 4980 wmic.exe Token: SeProfSingleProcessPrivilege 4980 wmic.exe Token: SeIncBasePriorityPrivilege 4980 wmic.exe Token: SeCreatePagefilePrivilege 4980 wmic.exe Token: SeBackupPrivilege 4980 wmic.exe Token: SeRestorePrivilege 4980 wmic.exe Token: SeShutdownPrivilege 4980 wmic.exe Token: SeDebugPrivilege 4980 wmic.exe Token: SeSystemEnvironmentPrivilege 4980 wmic.exe Token: SeRemoteShutdownPrivilege 4980 wmic.exe Token: SeUndockPrivilege 4980 wmic.exe Token: SeManageVolumePrivilege 4980 wmic.exe Token: 33 4980 wmic.exe Token: 34 4980 wmic.exe Token: 35 4980 wmic.exe Token: 36 4980 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 316 wrote to memory of 4844 316 cmd.exe 85 PID 316 wrote to memory of 4844 316 cmd.exe 85 PID 316 wrote to memory of 516 316 cmd.exe 86 PID 316 wrote to memory of 516 316 cmd.exe 86 PID 316 wrote to memory of 4980 316 cmd.exe 87 PID 316 wrote to memory of 4980 316 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 516 attrib.exe 4844 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\cmd.exe2⤵
- Views/modifies file attributes
PID:4844
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Views/modifies file attributes
PID:516
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD59478056827dc985dba17b6c55e3cb928
SHA13cf6e9b6f1e3f3bf81ea6bcf5d18daa834d953ff
SHA256063e987f285254ba377777908c86776620eb52bd075e3bc9c7c35afb483eadef
SHA512d4f78e67f43533152c9cfb0abb3044a0bd17054a845b8ae5033f0f46c43b4772cc3691373cfd3c346f9fe9169dbb280fd158d6e8b90c176cbe19954c33690754