Analysis
-
max time kernel
893s -
max time network
896s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 02:40
Behavioral task
behavioral1
Sample
skibidi.exe
Resource
win7-20240903-en
General
-
Target
skibidi.exe
-
Size
51KB
-
MD5
22519d6182d8d97ef18b93aac9505c65
-
SHA1
f2e6124e2567866a8fe81bd4e43a4fe401136296
-
SHA256
1b7960f4002e371cf4a12ca7c041162ef3c5203c06b261d90ea58496c5dd60c5
-
SHA512
83a926c66f7900163e8e3d7beef1347785d0c8c3d9d8bc74756621ea39189efe2d7dfc074ce57ae9d025c73ec823a6270628bd499d9c9f80642f918c91ca21cf
-
SSDEEP
768:livdjHrddilbVauou7EoK4qd4zBFEHJdSkGPs2yPo+LGZYebFDa4JJ6RNSgNOZd:GpHmVauoBGBFQnks6CSYebFpmf4r
Malware Config
Extracted
xenorat
notthesigma-50237.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
appdata
-
port
9003
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2372-1-0x0000000001210000-0x0000000001224000-memory.dmp family_xenorat behavioral1/files/0x0008000000016d36-4.dat family_xenorat behavioral1/memory/2668-10-0x0000000000020000-0x0000000000034000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2668 skibidi.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 skibidi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skibidi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skibidi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2668 2372 skibidi.exe 30 PID 2372 wrote to memory of 2668 2372 skibidi.exe 30 PID 2372 wrote to memory of 2668 2372 skibidi.exe 30 PID 2372 wrote to memory of 2668 2372 skibidi.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\skibidi.exe"C:\Users\Admin\AppData\Local\Temp\skibidi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\XenoManager\skibidi.exe"C:\Users\Admin\AppData\Roaming\XenoManager\skibidi.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD522519d6182d8d97ef18b93aac9505c65
SHA1f2e6124e2567866a8fe81bd4e43a4fe401136296
SHA2561b7960f4002e371cf4a12ca7c041162ef3c5203c06b261d90ea58496c5dd60c5
SHA51283a926c66f7900163e8e3d7beef1347785d0c8c3d9d8bc74756621ea39189efe2d7dfc074ce57ae9d025c73ec823a6270628bd499d9c9f80642f918c91ca21cf