Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe
Resource
win10v2004-20241007-en
General
-
Target
656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe
-
Size
308KB
-
MD5
de6a17d6e89d790f087c75e8c3fd1470
-
SHA1
89e9f07116b2cab77e0881498770d9185b3f4afc
-
SHA256
656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730e
-
SHA512
3bf7b341f7c7f0058b872d5c39f49cfff9d0f4996d80640ef70dee938de939a78f5c41f5b9fb08c0e2accdc98b2a26f033e35c08022b2f5728ab72057a83c9d7
-
SSDEEP
3072:pxfHaRTE5TJf+jwB2ydTL5cFRu81Y2gK7UMCO05n05ghA/0Oz4ZhzSWlrSgswYCf:pZ6ogjnE8HmMCT0wJZhzAwfjRDT
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\23230 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mscrjc.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe -
Executes dropped EXE 3 IoCs
pid Process 2504 skyrpe.exe 2512 skyrpe.exe 1484 skyrpe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3312 set thread context of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 2504 set thread context of 2512 2504 skyrpe.exe 102 PID 2504 set thread context of 1484 2504 skyrpe.exe 103 -
resource yara_rule behavioral2/memory/2484-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2484-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2484-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2484-39-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2484-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2512-66-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mscrjc.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1484 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe Token: SeDebugPrivilege 2512 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 2504 skyrpe.exe 2512 skyrpe.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 3312 wrote to memory of 2484 3312 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 95 PID 2484 wrote to memory of 2680 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 96 PID 2484 wrote to memory of 2680 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 96 PID 2484 wrote to memory of 2680 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 96 PID 2680 wrote to memory of 3976 2680 cmd.exe 99 PID 2680 wrote to memory of 3976 2680 cmd.exe 99 PID 2680 wrote to memory of 3976 2680 cmd.exe 99 PID 2484 wrote to memory of 2504 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 100 PID 2484 wrote to memory of 2504 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 100 PID 2484 wrote to memory of 2504 2484 656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe 100 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 2512 2504 skyrpe.exe 102 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 2504 wrote to memory of 1484 2504 skyrpe.exe 103 PID 1484 wrote to memory of 2012 1484 skyrpe.exe 104 PID 1484 wrote to memory of 2012 1484 skyrpe.exe 104 PID 1484 wrote to memory of 2012 1484 skyrpe.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe"C:\Users\Admin\AppData\Local\Temp\656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe"C:\Users\Admin\AppData\Local\Temp\656983f86603152e5f5706b132f802bd42de5ad68923494c29d8a9e8bd5b730eN.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EQVRF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3976
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
308KB
MD5d13a51dc71d51caaa5390b08a072f099
SHA177a2c7507fa6cdd80ba4cbd025bf243fbe671095
SHA2568522212f401c3916647c4d4825d307f885fb2e22e602d6d313eb63fa9de5cd4b
SHA51265ac0bbd93d3a9f0aa0674b0bf188d3efa844d4d175efd587c69d3e629153d720d13d8fc86b378a56639bd6073c2ce6eb96c47c30dca8d86e612459b881db265