Analysis

  • max time kernel
    98s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 17:58

General

  • Target

    Skibidi.lnk

  • Size

    2KB

  • MD5

    3eb88f5c98b248f717fb448e27f76ef9

  • SHA1

    310305f6481f8c187afab86b66db245e2ac66f75

  • SHA256

    33cee469a361852bd439954500849a9e381d102b25edf5423f6b4b61356363ce

  • SHA512

    a377afe4eada6d61626fb7f2e8b27194c0c4953bcc3b8e3ef6604db864e767e8777c9a32309f01147e216025a625385845d20bf437c54f6e82ff47e1cd7ea390

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Skibidi.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mshta %CD%\Notepad.lnk
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Windows\system32\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\Notepad.lnk
        3⤵
          PID:4428
    • C:\Windows\system32\werfault.exe
      werfault.exe /h /shared Global\58a71eaefa4841818122480aa2cb0dae /t 776 /p 4428
      1⤵
        PID:4408
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4440
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c mshta %CD%\Notepad.lnk
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Windows\system32\mshta.exe
            mshta C:\Users\Admin\AppData\Local\Temp\Notepad.lnk
            2⤵
              PID:3128

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads