Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
Skibidi.lnk
Resource
win7-20240708-en
windows7-x64
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Skibidi.lnk
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
Skibidi.lnk
-
Size
2KB
-
MD5
3eb88f5c98b248f717fb448e27f76ef9
-
SHA1
310305f6481f8c187afab86b66db245e2ac66f75
-
SHA256
33cee469a361852bd439954500849a9e381d102b25edf5423f6b4b61356363ce
-
SHA512
a377afe4eada6d61626fb7f2e8b27194c0c4953bcc3b8e3ef6604db864e767e8777c9a32309f01147e216025a625385845d20bf437c54f6e82ff47e1cd7ea390
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3816 2748 cmd.exe 86 PID 2748 wrote to memory of 3816 2748 cmd.exe 86 PID 3816 wrote to memory of 4428 3816 cmd.exe 87 PID 3816 wrote to memory of 4428 3816 cmd.exe 87 PID 1416 wrote to memory of 3128 1416 cmd.exe 110 PID 1416 wrote to memory of 3128 1416 cmd.exe 110
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Skibidi.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta %CD%\Notepad.lnk2⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\system32\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Notepad.lnk3⤵PID:4428
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\58a71eaefa4841818122480aa2cb0dae /t 776 /p 44281⤵PID:4408
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4440
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta %CD%\Notepad.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Notepad.lnk2⤵PID:3128
-