Analysis
-
max time kernel
22s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-01-2025 00:46
Static task
static1
Behavioral task
behavioral1
Sample
Skript.gg
Resource
win11-20241007-en
8 signatures
150 seconds
General
-
Target
Skript.gg
-
Size
226KB
-
MD5
ca7d5d7de11cf29e438bdcb23858e9c1
-
SHA1
648c94253ab48ee91220ff9703c6f609b5a00eac
-
SHA256
bd2759318864a15bb6b3f2fe941acd6042ddb728d8a1f7a7ef2136696dbf37f9
-
SHA512
b3041bfe3f2c708a5f4dba468eadb90a3984cc7cd9d3aa77673c94dbe929f67d8aaa1248f26fca0734b9b1fce24bbe45b3f693a29b31b5d93407ef51413fd3f5
-
SSDEEP
6144:ghN5ipOL/saqkPV9FH2LtcIDSsmwQ9mvZJT3CqbMrhryf65NRPaCieMjAkvCJv1k:cN5ipOL/saqkPV9FH2LtcIDSsmwQ9mvN
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5008 taskmgr.exe Token: SeSystemProfilePrivilege 5008 taskmgr.exe Token: SeCreateGlobalPrivilege 5008 taskmgr.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4816 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Skript.gg1⤵
- Modifies registry class
PID:868
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4816
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5008