Analysis
-
max time kernel
6s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
Skibidi.lnk
Resource
win7-20240708-en
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Skibidi.lnk
Resource
win10v2004-20240709-en
3 signatures
1800 seconds
General
-
Target
Skibidi.lnk
-
Size
2KB
-
MD5
3eb88f5c98b248f717fb448e27f76ef9
-
SHA1
310305f6481f8c187afab86b66db245e2ac66f75
-
SHA256
33cee469a361852bd439954500849a9e381d102b25edf5423f6b4b61356363ce
-
SHA512
a377afe4eada6d61626fb7f2e8b27194c0c4953bcc3b8e3ef6604db864e767e8777c9a32309f01147e216025a625385845d20bf437c54f6e82ff47e1cd7ea390
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2836 1964 cmd.exe 31 PID 1964 wrote to memory of 2836 1964 cmd.exe 31 PID 1964 wrote to memory of 2836 1964 cmd.exe 31 PID 2836 wrote to memory of 2768 2836 cmd.exe 32 PID 2836 wrote to memory of 2768 2836 cmd.exe 32 PID 2836 wrote to memory of 2768 2836 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Skibidi.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta %CD%\Notepad.lnk2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Notepad.lnk3⤵
- Modifies Internet Explorer settings
PID:2768
-
-