Analysis
-
max time kernel
99s -
max time network
152s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-01-2025 14:52
Static task
static1
General
-
Target
SKRIPT-GG-main/SkriptGG.exe
-
Size
686KB
-
MD5
b6ffc5ab3d9c3d132b0cdb490ed800d2
-
SHA1
69f55a57d6353649c3f709163bb7d440a3a7eb7f
-
SHA256
138671f56898c4504a02588c6f9c4de6a3961ce015bb147d579bd54bc454ded1
-
SHA512
4163a1537f80ef49a9ec9dd17b7bfb442be57afb24519d753ee2e2ba99c443e555b69570218aa1ee3a0e7b6419eb2432089d69f8c9f5771ada0115f2965f0f5d
-
SSDEEP
12288:rlGQs6nEzMMU1wYwFozDOVhRGHdhdBBmCU0SmegE0wgoNkTzD5NryZI5L36lo+Qv:MEEIDU+acZBxST0bbzD5Nre
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4748 SkriptGG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4748 set thread context of 1540 4748 SkriptGG.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4780 4748 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SkriptGG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83 PID 4748 wrote to memory of 1540 4748 SkriptGG.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKRIPT-GG-main\SkriptGG.exe"C:\Users\Admin\AppData\Local\Temp\SKRIPT-GG-main\SkriptGG.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 11762⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4748 -ip 47481⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5eadcfd7c84686da06b4fc381bfc96c72
SHA10b7d9f3daf6162d0c710ba51614279b8057b5aa9
SHA256abb95c10ae4b1ff0aa36895d5001d3259f91dfd1bc5c6dfe77f6194be1b41d4b
SHA5122d7aeaf802e451ab5d611db82eb1ba2241be6f7c91ed7b732d1784d27dbd6c1e701dc2d9b3c622ddee1299cea688c2f5a128f4af06281d3c3fbe41f926fa90d0