Analysis
-
max time kernel
103s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 11:58
Behavioral task
behavioral1
Sample
2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
-
Size
10.3MB
-
MD5
e80a935708de68867ead4bb0970a1cb6
-
SHA1
caa4a3e54c849a1c8cb8e095e2f022942a9d5410
-
SHA256
4c62630d86e3a8989ab9167a21822e686b9559e55421a1c779ad05eccfc6c908
-
SHA512
d56f447971d9605491366d3e15fb264ff5a8b722a9fbc3d0e172ce7386b263b6f3a4a654f59e26bcccf0fbdc70a499500cc5e5363218d16e08deb3b7e3a7914b
-
SSDEEP
98304:AkbS4GeZk9WMOfpgu+NsFUqNEXzR/wLA0rn7QEMb:Ad4dZkFu+NsyCEXzR/wcypMb
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1359962319148552262/rZhAvPTXLzaOSKyR1uwxW6MD_NJEUB5gXuznUEFFSSsBRLToarEs-ALUaMaDYY8Kazj0
Signatures
-
Skuld family
-
Executes dropped EXE 1 IoCs
pid Process 3204 SecurityHealthSystray.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 6024 2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe Token: SeDebugPrivilege 3204 SecurityHealthSystray.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 6024 wrote to memory of 3788 6024 2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe 86 PID 6024 wrote to memory of 3788 6024 2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe 86 PID 3436 wrote to memory of 3204 3436 cmd.exe 89 PID 3436 wrote to memory of 3204 3436 cmd.exe 89 PID 3204 wrote to memory of 932 3204 SecurityHealthSystray.exe 91 PID 3204 wrote to memory of 932 3204 SecurityHealthSystray.exe 91 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3788 attrib.exe 932 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe2⤵
- Views/modifies file attributes
PID:3788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe3⤵
- Views/modifies file attributes
PID:932
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5e80a935708de68867ead4bb0970a1cb6
SHA1caa4a3e54c849a1c8cb8e095e2f022942a9d5410
SHA2564c62630d86e3a8989ab9167a21822e686b9559e55421a1c779ad05eccfc6c908
SHA512d56f447971d9605491366d3e15fb264ff5a8b722a9fbc3d0e172ce7386b263b6f3a4a654f59e26bcccf0fbdc70a499500cc5e5363218d16e08deb3b7e3a7914b