Analysis

  • max time kernel
    59s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 10:58

General

  • Target

    SkibidiSploit.exe

  • Size

    18.1MB

  • MD5

    744114a73abcbb53bb9add88d1d8e4bb

  • SHA1

    53771b8bad032d963186ca9c5844f38fce7b6f0a

  • SHA256

    33953161606e811921928cd7825cc7f9e713dde38f4c5f79b6215833337e9bc1

  • SHA512

    050782a852d2b4963df621357a741d5efd66ecf55a8f244685895726453557147fde79d78be60795d9f17ec9e5e1fb7c675e35bc0fae9bea52550a5887f8605f

  • SSDEEP

    393216:KQPnnngDLRsE2+qBvtgaYjfw7SCKH3pLHkIe6gdMM7eQEr:l4hs4+Z3WCMLHktuMu

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkibidiSploit.exe
    "C:\Users\Admin\AppData\Local\Temp\SkibidiSploit.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/440-0-0x00000000753BE000-0x00000000753BF000-memory.dmp

    Filesize

    4KB

  • memory/440-1-0x0000000000590000-0x00000000017A8000-memory.dmp

    Filesize

    18.1MB

  • memory/440-2-0x00000000067A0000-0x0000000006D44000-memory.dmp

    Filesize

    5.6MB

  • memory/440-3-0x00000000061F0000-0x0000000006282000-memory.dmp

    Filesize

    584KB

  • memory/440-4-0x00000000061A0000-0x00000000061AA000-memory.dmp

    Filesize

    40KB

  • memory/440-5-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-6-0x0000000008E00000-0x0000000008E66000-memory.dmp

    Filesize

    408KB

  • memory/440-7-0x0000000009C30000-0x0000000009CCC000-memory.dmp

    Filesize

    624KB

  • memory/440-8-0x00000000753BE000-0x00000000753BF000-memory.dmp

    Filesize

    4KB

  • memory/440-9-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-10-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-11-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-12-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-13-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-14-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-15-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB

  • memory/440-16-0x00000000753B0000-0x0000000075B60000-memory.dmp

    Filesize

    7.7MB