General
-
Target
skillprotectV2.exe
-
Size
226KB
-
Sample
250204-3dyq9sxpct
-
MD5
309c2c3c3bf0c657af55e0f26117ab03
-
SHA1
749be0ef8828086b20a292b5e71da4f52e2a9416
-
SHA256
7bc24cf4fdcb184014b58751e2147d9161517808c3db3779fc41915fb493c87e
-
SHA512
e81578aff2cd6ff96f5564d043a20682a6e381a03d71e1326c9ef9c896b886956f9bf984e4e75eb232dc692295a12d942938bfbae06515f1b75fdda4af1c1dc5
-
SSDEEP
3072:UsZpi2QxmGgbGDyyOo9dhtrBTVgwby94wZxJzQyW:Usbi2QxYGDxbL1W91z
Static task
static1
Behavioral task
behavioral1
Sample
skillprotectV2.exe
Resource
win11-20241023-uk
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7944456076:AAGpjhHLrlnhpd2D6D-Z8494fRloZ5j7GY0/sendDocument
Targets
-
-
Target
skillprotectV2.exe
-
Size
226KB
-
MD5
309c2c3c3bf0c657af55e0f26117ab03
-
SHA1
749be0ef8828086b20a292b5e71da4f52e2a9416
-
SHA256
7bc24cf4fdcb184014b58751e2147d9161517808c3db3779fc41915fb493c87e
-
SHA512
e81578aff2cd6ff96f5564d043a20682a6e381a03d71e1326c9ef9c896b886956f9bf984e4e75eb232dc692295a12d942938bfbae06515f1b75fdda4af1c1dc5
-
SSDEEP
3072:UsZpi2QxmGgbGDyyOo9dhtrBTVgwby94wZxJzQyW:Usbi2QxYGDxbL1W91z
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies Windows Defender Real-time Protection settings
-
Phemedrone family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3