Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-01-2025 04:07
Behavioral task
behavioral1
Sample
stealer_protect - Copy.exe
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
9 signatures
900 seconds
General
-
Target
stealer_protect - Copy.exe
-
Size
9.1MB
-
MD5
cb86dd3b875f9cbd61325b45e50373a0
-
SHA1
24b293baf601633d98ac46794ce35675011df210
-
SHA256
14e0330250b54a0f15e5db48a53b0bf6517bed4fec8209eb5dc1df49ba9e5b8b
-
SHA512
5019feeb950eb8a8fad4cdb161a43724b2600a5da12b26e1feb1bc4419b6f977b2016b106efcdb99271ff0b0c905a03b5a8c70df7283ec2449186c741b869011
-
SSDEEP
196608:7G0ytxxQdi7nJf77gov4fplpRQSk5ZMGQfPXeLA52ANexrNceFcLQdc6E:7GZCWnN4OSWOvfPFCFF4Q
Score
10/10
Malware Config
Extracted
Family
skuld
C2
https://discord.com/api/webhooks/1327282019205386252/erLY2QwL_rt0jlh9ekxiZDsoz9mmhENv17cYsEaE1ETg-IcHrp5uYIg3T1AvvJtwEpMs
Signatures
-
Skuld family
-
resource yara_rule behavioral1/memory/696-4-0x0000000000030000-0x0000000001737000-memory.dmp vmprotect behavioral1/memory/696-9-0x0000000000030000-0x0000000001737000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3829776853-2076861744-2973657197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" stealer_protect - Copy.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 696 stealer_protect - Copy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 696 stealer_protect - Copy.exe 696 stealer_protect - Copy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 stealer_protect - Copy.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 696 wrote to memory of 1644 696 stealer_protect - Copy.exe 83 PID 696 wrote to memory of 1644 696 stealer_protect - Copy.exe 83 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1644 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\stealer_protect - Copy.exe"C:\Users\Admin\AppData\Local\Temp\stealer_protect - Copy.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\stealer_protect - Copy.exe"2⤵
- Views/modifies file attributes
PID:1644
-