Analysis

  • max time kernel
    265s
  • max time network
    303s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250211-en
  • resource tags

    arch:x64arch:x86image:win11-20250211-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-02-2025 17:23

General

  • Target

    skuld.exe

  • Size

    10.3MB

  • MD5

    0413b8b0aa1528459d056f9776e335c8

  • SHA1

    452d23e62183e92bd349b0204468a1e4fb2896c4

  • SHA256

    6704e7013687a9a0c7787b5edffdfc87246eda472cfa885469ee8fc6d0fe19ea

  • SHA512

    c5a36a4a29d616c9af2038b03a15b7f91e058501ea34afb84d1dd04e11a3eb0cf17a09d25d41a37367506bcd0193c8df1cd571fd9985528667cb527fe0770286

  • SSDEEP

    98304:HOBUlG77NlZFwclKKjYJ5Uz5epeFA0rNlhEH7m:HsN5wcu5Uz5epTuiH7

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 36 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\skuld.exe
    "C:\Users\Admin\AppData\Local\Temp\skuld.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\skuld.exe
      2⤵
      • Views/modifies file attributes
      PID:3812
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NUEwMjlGQTQtNzc1MS00Mzg1LUI2NkItRjkyQkZCNTgyNTkwfSIgdXNlcmlkPSJ7Mzc5RTJENTktREE3Ny00NkM0LTg2Q0ItMzZDRTVEOTEzMkRBfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RjAwMzFFRDItNUYwMS00RDU1LTg3OUUtMjdFQjkwN0M4OUIxfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjQiIGluc3RhbGxkYXRldGltZT0iMTczOTI5NDgzNCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNzY2NTUyNTM3MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ4MTcwNzYzOTEiLz48L2FwcD48L3JlcXVlc3Q-
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:3680
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\MicrosoftEdge_X64_133.0.3065.69.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4912
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6449b6a68,0x7ff6449b6a74,0x7ff6449b6a80
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1820
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6449b6a68,0x7ff6449b6a74,0x7ff6449b6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:1844
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6dffb6a68,0x7ff6dffb6a74,0x7ff6dffb6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:3020
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3496
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6dffb6a68,0x7ff6dffb6a74,0x7ff6dffb6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:3124
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6dffb6a68,0x7ff6dffb6a74,0x7ff6dffb6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6D094DF2-5151-43CA-BAB8-10BF478FC925}\EDGEMITMP_1EE4C.tmp\setup.exe

    Filesize

    6.8MB

    MD5

    bdb1aecedc15fc82a63083452dad45c2

    SHA1

    a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb

    SHA256

    4ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f

    SHA512

    50909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

    Filesize

    3.9MB

    MD5

    4aaa893417cccc147989f876c6a7b295

    SHA1

    b1e35c83518bb275924ead0cd6206bf0c982d30f

    SHA256

    2c38e3c3f18e2d3fb7f04336356b9b5186cabe06b3343beec318ef0def1a9eeb

    SHA512

    109e0c88977fae65a4950fc38393ca32a70d68ef41aeb75b28e6566e0fa626e32e31be38308e7ed5b6a8ba1f56fb5f2133a07aa8bb643224c3dbb089ce9cfd0e

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    74KB

    MD5

    c6fc5b4097976d2221ea777219de652f

    SHA1

    c9d2655790743f61f6151604cd0f7b95a52fbd0e

    SHA256

    0df1bab336b97e0d57a60d52cd23e74ad3ce827d8fda06fd694044a53ab1f29e

    SHA512

    b7e8b509142cdf7b5f9146ae167b1659b9554d66ed19a341d572637ae61867c68dcf0871dbdd55e1ef96f068384b3fb6aabfcb1ad46395d7e4517d6db19b0c33

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    104KB

    MD5

    83b5cbfd6970ccaf6310220f7d518f28

    SHA1

    5cc8d75e7198cc81ea5d66f89d3019964f6c274e

    SHA256

    71c9282ace373ab01f4d019433d0cecca21ef97a56084b4b47786a18ea88b428

    SHA512

    a209a8f6b942d9c2f21414e133b5d410c5e5202edf1c40b06a9776962273627fc97b8c165df9483e0aadcb41406bd60c8157581f0681819a065a05265f4d7d62

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    104KB

    MD5

    eceac896bf3a54ea77c250ccefa9b3f0

    SHA1

    a762a485ec2066134c33a167045d5285ede55e9f

    SHA256

    bb5816238eb9045a6b30ecee94200d6517cdcbeaec753d7bc5b2d93ad24e63d5

    SHA512

    15e30c0b4a7810490f800de668a860ec00676d5bb570c6aa5b683b9e1e174d0a545515f49ae2c66cd1b454f2a9bc02f635b1fa6eb0ba92eae7139e7527d3452e

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    107KB

    MD5

    67c06da0364a3111c21a4ebc78050fd6

    SHA1

    97afcefc9995c502d115f8d307e18b8f058eb117

    SHA256

    9bb4c7aaec471245c151746cdc40f5f73d85299a516921e6a374909b849d0805

    SHA512

    36fb99c423416f237eb5d4df8407f8c58203d3b97025ae907ffe23589942430155ac8b9c3d6e863419d17fb8063b39a0d60e75d58f4ac27c57abe2a0fc42935a