Overview
overview
10Static
static
3Skery.exe
windows11-21h2-x64
10$PLUGINSDI...em.dll
windows11-21h2-x64
3Cyberangre...29.bus
windows11-21h2-x64
3Cyberangre...ic.ini
windows11-21h2-x64
3Cyberangre...gon250
windows11-21h2-x64
3Cyberangre...51.jpg
windows11-21h2-x64
Cyberangre...es.txt
windows11-21h2-x64
3Cyberangre...gs.txt
windows11-21h2-x64
3Cyberangre...ry.pad
windows11-21h2-x64
3Cyberangre...rs.txt
windows11-21h2-x64
3Cyberangre...ns.txt
windows11-21h2-x64
3Cyberangre...ne.int
windows11-21h2-x64
3Cyberangre...ca.rei
windows11-21h2-x64
3Analysis
-
max time kernel
219s -
max time network
282s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2025, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
Skery.exe
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win11-20250217-en
Behavioral task
behavioral6
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win11-20250218-en
Behavioral task
behavioral10
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win11-20250217-en
General
-
Target
Cyberangreb/Repetatively/gennemskylnings.txt
-
Size
652B
-
MD5
790ebf2ac0ca4adcdb58e45d0a450dbc
-
SHA1
d18f698c2aa650d78ad5167e3b2b9953f54d3f8a
-
SHA256
c49f3f671b7cbf550040ea2dc10d462a46d87c7d62ca0f85c6cdfe86a42cecd2
-
SHA512
1f3d6ee159d0ee604d22a6565228f41c58fadcf141b8a69a277d70b8d74a3306205b3fc56c1f4d93873056bf29c68053305b55eea3b878a0c967739d224a445b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2250935964-4080446702-2776729278-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 836 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3604 wrote to memory of 836 3604 cmd.exe 78 PID 3604 wrote to memory of 836 3604 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\gennemskylnings.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\gennemskylnings.txt2⤵
- Opens file in notepad (likely ransom note)
PID:836
-