Analysis
-
max time kernel
119s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 16:20
Behavioral task
behavioral1
Sample
63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe
Resource
win7-20241010-en
General
-
Target
63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe
-
Size
392KB
-
MD5
ba9e79d18ddebfea12475648bff84c20
-
SHA1
fae10ac47d780556c465b98e979e681e7bfc09d0
-
SHA256
63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4ae
-
SHA512
e728330069f4c997ff7746f1971e136e39336e016dc4b68477ed8a08e983384051abef83127bd91fe640592284f7d006218d8233695cc79ee1dc73e9233a07bc
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\63542 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mszroow.com" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2372 skyrpe.exe 183796 skyrpe.exe 183860 skyrpe.exe -
Loads dropped DLL 5 IoCs
pid Process 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1840 set thread context of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 2372 set thread context of 183796 2372 skyrpe.exe 36 PID 2372 set thread context of 183860 2372 skyrpe.exe 37 -
resource yara_rule behavioral1/memory/1840-0-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/1840-223-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2436-53492-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2436-53490-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1840-53489-0x0000000002620000-0x0000000002682000-memory.dmp upx behavioral1/memory/2436-53485-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2436-53483-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1840-53491-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2436-53493-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x000a000000016ace-53518.dat upx behavioral1/memory/2436-53524-0x0000000002820000-0x0000000002882000-memory.dmp upx behavioral1/memory/2372-53540-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2436-53690-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2372-53696-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2372-106985-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2436-106988-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mszroow.com svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skyrpe.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe 183860 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 183860 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe Token: SeDebugPrivilege 183796 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 2372 skyrpe.exe 183796 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 1840 wrote to memory of 2436 1840 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 31 PID 2436 wrote to memory of 2588 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 32 PID 2436 wrote to memory of 2588 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 32 PID 2436 wrote to memory of 2588 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 32 PID 2436 wrote to memory of 2588 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 32 PID 2588 wrote to memory of 2240 2588 cmd.exe 34 PID 2588 wrote to memory of 2240 2588 cmd.exe 34 PID 2588 wrote to memory of 2240 2588 cmd.exe 34 PID 2588 wrote to memory of 2240 2588 cmd.exe 34 PID 2436 wrote to memory of 2372 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 35 PID 2436 wrote to memory of 2372 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 35 PID 2436 wrote to memory of 2372 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 35 PID 2436 wrote to memory of 2372 2436 63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe 35 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183796 2372 skyrpe.exe 36 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 2372 wrote to memory of 183860 2372 skyrpe.exe 37 PID 183860 wrote to memory of 183952 183860 skyrpe.exe 38 PID 183860 wrote to memory of 183952 183860 skyrpe.exe 38 PID 183860 wrote to memory of 183952 183860 skyrpe.exe 38 PID 183860 wrote to memory of 183952 183860 skyrpe.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe"C:\Users\Admin\AppData\Local\Temp\63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe"C:\Users\Admin\AppData\Local\Temp\63d75c26988f36768facb956a6695ee7e9dcea10751d39528b48f3e8b780c4aeN.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SQUPX.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2240
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:183796
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:183860 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:183952
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
392KB
MD531f110a94de4159195f0d77048162395
SHA1856b3b752d827cd53d93939ec5897203a560f557
SHA25691c6043ec20a46431b97c72e50d86fdba65a393206321c8c7976d7c302ae37df
SHA51252bb2b29e5fd074f993601846167747c4506a6429252e9e89010089a5781052e032f1e411f6b43c6d3ce07689e473a1aa4b830e6b53487701b5bf9e58479367b