Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/11/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe
Resource
win7-20240903-en
General
-
Target
ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe
-
Size
284KB
-
MD5
09f995ad2c1bf8aa7934744ff2035594
-
SHA1
4106f6ef3ce2a6f609c5c17cd1d9b2f36d76594b
-
SHA256
ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e
-
SHA512
5653802d21e52221cfccf529ab553f4d6c3ac204856b5f19ee6e7971bb0bc480e21be671f8f95412e351981d23c7871da0a82bd1f1454166d07f7e85dfb463ce
-
SSDEEP
3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\29646 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msktevyb.scr" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 21348 skyrpe.exe 45988 skyrpe.exe 46048 skyrpe.exe -
Loads dropped DLL 5 IoCs
pid Process 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2756 set thread context of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 21348 set thread context of 45988 21348 skyrpe.exe 35 PID 21348 set thread context of 46048 21348 skyrpe.exe 36 -
resource yara_rule behavioral1/memory/6508-53489-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-53488-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-53487-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-53486-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-53483-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-53481-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-53680-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/45988-106962-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/6508-106969-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/45988-106981-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msktevyb.scr svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 46048 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 46048 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe Token: SeDebugPrivilege 45988 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 21348 skyrpe.exe 45988 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 2756 wrote to memory of 6508 2756 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 30 PID 6508 wrote to memory of 21428 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 31 PID 6508 wrote to memory of 21428 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 31 PID 6508 wrote to memory of 21428 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 31 PID 6508 wrote to memory of 21428 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 31 PID 21428 wrote to memory of 21376 21428 cmd.exe 33 PID 21428 wrote to memory of 21376 21428 cmd.exe 33 PID 21428 wrote to memory of 21376 21428 cmd.exe 33 PID 21428 wrote to memory of 21376 21428 cmd.exe 33 PID 6508 wrote to memory of 21348 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 34 PID 6508 wrote to memory of 21348 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 34 PID 6508 wrote to memory of 21348 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 34 PID 6508 wrote to memory of 21348 6508 ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe 34 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 45988 21348 skyrpe.exe 35 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 21348 wrote to memory of 46048 21348 skyrpe.exe 36 PID 46048 wrote to memory of 46128 46048 skyrpe.exe 37 PID 46048 wrote to memory of 46128 46048 skyrpe.exe 37 PID 46048 wrote to memory of 46128 46048 skyrpe.exe 37 PID 46048 wrote to memory of 46128 46048 skyrpe.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe"C:\Users\Admin\AppData\Local\Temp\ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe"C:\Users\Admin\AppData\Local\Temp\ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6508 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JRJSP.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:21428 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:21376
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:21348 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:45988
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:46048 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:46128
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD5d0a6a857beada7105c34724a94615745
SHA1fa4c7bc58f7a6a938d8d0923bc19a2af7f51445b
SHA256de5762de1b7d8e8f6714d49bdc1a071ece922850ab63d6fe68f34b743663667b
SHA512da7b4a0aaf19daa8656d3906752f31f52b3113b8e088dcf953a47a78ec9b63287a30f2a0032edc400ba49ad337a27e953a89bcacb43259ddcf4fb3f225d4adbf