Overview
overview
10Static
static
3Skery.exe
windows11-21h2-x64
10$PLUGINSDI...em.dll
windows11-21h2-x64
3Cyberangre...29.bus
windows11-21h2-x64
3Cyberangre...ic.ini
windows11-21h2-x64
3Cyberangre...gon250
windows11-21h2-x64
3Cyberangre...51.jpg
windows11-21h2-x64
Cyberangre...es.txt
windows11-21h2-x64
3Cyberangre...gs.txt
windows11-21h2-x64
3Cyberangre...ry.pad
windows11-21h2-x64
3Cyberangre...rs.txt
windows11-21h2-x64
3Cyberangre...ns.txt
windows11-21h2-x64
3Cyberangre...ne.int
windows11-21h2-x64
3Cyberangre...ca.rei
windows11-21h2-x64
3Analysis
-
max time kernel
288s -
max time network
292s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2025, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
Skery.exe
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win11-20250217-en
Behavioral task
behavioral6
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win11-20250218-en
Behavioral task
behavioral10
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win11-20250217-en
General
-
Target
Cyberangreb/Repetatively/gerry.pad
-
Size
28KB
-
MD5
766d9ef7530d23758f482b0ab2b54788
-
SHA1
c430e21b1463eceb32d05c6f0909d9821c27a3e7
-
SHA256
7ba4160056fb1b321e5859a9aa1f9c277b9c798b968c34e735f5222710e7ed09
-
SHA512
5bc154b564af204c25d2e7651e3c4c9f9263c3e6a88f149ddbe9892baf0b26079e171aebac4dd334ee8192ec4f2c5d510536a2287ad1eea5bd357aaafabad68f
-
SSDEEP
192:vp3MOAy7WiXB2O1NUcFWb38pStMMI81jeUWBmSF//LzzIxj13gjwKWuQ6SSph7NC:x3vArO7WwNM/JUZe3gjw36z7A
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4600 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\gerry.pad1⤵
- Modifies registry class
PID:3448
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4784,i,16473152266643908808,16926983457419056857,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:141⤵PID:4236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5040,i,16473152266643908808,16926983457419056857,262144 --variations-seed-version --mojo-platform-channel-handle=3876 /prefetch:141⤵PID:396