Malware Analysis Report

2025-01-02 14:25

Sample ID 241126-2jmerazlek
Target 591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
SHA256 591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb
Tags
upx discovery persistence andromeda backdoor botnet
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb

Threat Level: Known bad

The file 591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe was found to be: Known bad.

Malicious Activity Summary

upx discovery persistence andromeda backdoor botnet

Andromeda, Gamarue

Detects Andromeda payload.

Andromeda family

Adds policy Run key to start application

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Maps connected drives based on registry

Adds Run key to start application

UPX packed file

Suspicious use of SetThreadContext

Drops file in Program Files directory

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: MapViewOfSection

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-26 22:36

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-26 22:36

Reported

2024-11-26 22:38

Platform

win7-20241010-en

Max time kernel

119s

Max time network

105s

Command Line

"C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\syswow64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\7119 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msbkiaw.bat" C:\Windows\syswow64\svchost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" C:\Windows\SysWOW64\reg.exe N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\LOCALS~1\Temp\msbkiaw.bat C:\Windows\syswow64\svchost.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\syswow64\svchost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2956 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 3236 wrote to memory of 3380 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3236 wrote to memory of 3380 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3236 wrote to memory of 3380 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3236 wrote to memory of 3380 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3380 wrote to memory of 3428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3380 wrote to memory of 3428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3380 wrote to memory of 3428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3380 wrote to memory of 3428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3236 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3236 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3236 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3236 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178812 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 3464 wrote to memory of 178872 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 178872 wrote to memory of 179004 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\syswow64\svchost.exe
PID 178872 wrote to memory of 179004 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\syswow64\svchost.exe
PID 178872 wrote to memory of 179004 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\syswow64\svchost.exe
PID 178872 wrote to memory of 179004 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\syswow64\svchost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe

"C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe"

C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe

"C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\KGEVT.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"

C:\Windows\syswow64\svchost.exe

C:\Windows\syswow64\svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.update.microsoft.com udp
US 20.109.209.108:80 www.update.microsoft.com tcp
US 8.8.4.4:53 sonic4me.com udp
US 184.105.192.2:80 sonic4me.com tcp
US 8.8.4.4:53 imageshells.com udp
US 184.105.192.2:80 imageshells.com tcp

Files

memory/2956-0-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2956-3-0x00000000002B0000-0x00000000002B1000-memory.dmp

memory/2956-59-0x0000000000404000-0x0000000000405000-memory.dmp

memory/2956-223-0x0000000000400000-0x0000000000462000-memory.dmp

memory/3236-53481-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3236-53483-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3236-53487-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/3236-53489-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3236-53485-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2956-53490-0x0000000000400000-0x0000000000462000-memory.dmp

memory/3236-53491-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3236-53492-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\KGEVT.bat

MD5 0654f004b2e314bad7f75867e91da37d
SHA1 4232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256 ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512 dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553

\Users\Admin\AppData\Roaming\skype\skyrpe.exe

MD5 3d4fce8824e6db5a8c910c449b94bc1b
SHA1 da8e84b4d98a48acefce51e863c4dd20a33a2670
SHA256 6b21088170105963f936421197568949e5655e57af0fcd2e96093808a2b4aa32
SHA512 590b373b54a087c901b92a29600aa0a75d023fe5426d9bc90b788794ba306ca6ceca719150b3759a4e1bb942a88ca36720742413a7057c5f3d238aa2a4880bf7

memory/3236-53534-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53533-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53532-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53531-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53687-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3236-53688-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53690-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53691-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3236-53692-0x0000000003260000-0x00000000032C2000-memory.dmp

memory/3464-53693-0x0000000000400000-0x0000000000462000-memory.dmp

memory/178872-106979-0x0000000000400000-0x0000000000405000-memory.dmp

memory/178812-106978-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3464-106982-0x0000000000400000-0x0000000000462000-memory.dmp

memory/3236-106985-0x0000000000400000-0x000000000040B000-memory.dmp

memory/178872-106988-0x0000000000400000-0x0000000000405000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-26 22:36

Reported

2024-11-26 22:38

Platform

win10v2004-20241007-en

Max time kernel

118s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe"

Signatures

Andromeda family

andromeda

Andromeda, Gamarue

botnet backdoor andromeda

Detects Andromeda payload.

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\60321 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msfusafjk.exe" C:\Windows\SysWOW64\svchost.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" C:\Windows\SysWOW64\reg.exe N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\LOCALS~1\Temp\msfusafjk.exe C:\Windows\SysWOW64\svchost.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\svchost.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 4588 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe
PID 2368 wrote to memory of 4820 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 2368 wrote to memory of 4820 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 2368 wrote to memory of 4820 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 4820 wrote to memory of 3768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4820 wrote to memory of 3768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4820 wrote to memory of 3768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2368 wrote to memory of 628 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 2368 wrote to memory of 628 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 2368 wrote to memory of 628 N/A C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 628 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe
PID 2008 wrote to memory of 1824 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\SysWOW64\svchost.exe
PID 2008 wrote to memory of 1824 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\SysWOW64\svchost.exe
PID 2008 wrote to memory of 1824 N/A C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe C:\Windows\SysWOW64\svchost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe

"C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe"

C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe

"C:\Users\Admin\AppData\Local\Temp\591f67eb1ec7f3e4fdd98aa87403e02f2d4c2e3dda8c09d60cae5b187449cbfb.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OACEQ.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\syswow64\svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 106.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 www.update.microsoft.com udp
US 20.109.209.108:80 www.update.microsoft.com tcp
US 8.8.4.4:53 sonic4me.com udp
US 184.105.192.2:80 sonic4me.com tcp
US 8.8.4.4:53 imageshells.com udp
US 184.105.192.2:80 imageshells.com tcp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 108.209.109.20.in-addr.arpa udp
US 8.8.8.8:53 2.192.105.184.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/4588-0-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4588-3-0x0000000002B70000-0x0000000002B71000-memory.dmp

memory/4588-4-0x0000000002B90000-0x0000000002B91000-memory.dmp

memory/4588-5-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4588-6-0x0000000002B70000-0x0000000002B71000-memory.dmp

memory/4588-7-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/4588-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

memory/2368-9-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2368-11-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4588-12-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2368-13-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2368-14-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\OACEQ.txt

MD5 0654f004b2e314bad7f75867e91da37d
SHA1 4232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256 ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512 dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553

C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe

MD5 03cc9305838d89860a9ca32e291dc69e
SHA1 a05c1dd505958c404246d2b34a4cc876d97e7d0a
SHA256 3c43982485a0e93c0d98f8161b18c16152b515325d8c0dae8b0416836aeec434
SHA512 d7ce520883aff5bc7f5fc7e8ef7c9327ee98bcc418c80936b165843d916e2da64cf732e273b92d233259fbde6e11c4ca2b92a3f5018323433b293b5b311af037

memory/628-40-0x0000000000400000-0x0000000000462000-memory.dmp

memory/628-41-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2368-42-0x0000000000400000-0x000000000040B000-memory.dmp

memory/628-46-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2008-52-0x0000000000400000-0x0000000000405000-memory.dmp

memory/2008-55-0x0000000000400000-0x0000000000405000-memory.dmp

memory/628-57-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2368-58-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1824-62-0x0000000000530000-0x0000000000535000-memory.dmp

memory/1824-64-0x00000000005E0000-0x00000000005E5000-memory.dmp

memory/1824-68-0x00000000005E0000-0x00000000005E5000-memory.dmp

memory/3020-70-0x0000000000400000-0x000000000040B000-memory.dmp