Analysis
-
max time kernel
892s -
max time network
896s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 02:40
Behavioral task
behavioral1
Sample
skibidi.exe
Resource
win7-20240903-en
General
-
Target
skibidi.exe
-
Size
51KB
-
MD5
22519d6182d8d97ef18b93aac9505c65
-
SHA1
f2e6124e2567866a8fe81bd4e43a4fe401136296
-
SHA256
1b7960f4002e371cf4a12ca7c041162ef3c5203c06b261d90ea58496c5dd60c5
-
SHA512
83a926c66f7900163e8e3d7beef1347785d0c8c3d9d8bc74756621ea39189efe2d7dfc074ce57ae9d025c73ec823a6270628bd499d9c9f80642f918c91ca21cf
-
SSDEEP
768:livdjHrddilbVauou7EoK4qd4zBFEHJdSkGPs2yPo+LGZYebFDa4JJ6RNSgNOZd:GpHmVauoBGBFQnks6CSYebFpmf4r
Malware Config
Extracted
xenorat
notthesigma-50237.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
appdata
-
port
9003
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/1320-1-0x0000000000620000-0x0000000000634000-memory.dmp family_xenorat behavioral2/files/0x0008000000023cb8-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skibidi.exe -
Executes dropped EXE 1 IoCs
pid Process 4564 skibidi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skibidi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skibidi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4564 1320 skibidi.exe 85 PID 1320 wrote to memory of 4564 1320 skibidi.exe 85 PID 1320 wrote to memory of 4564 1320 skibidi.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\skibidi.exe"C:\Users\Admin\AppData\Local\Temp\skibidi.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Roaming\XenoManager\skibidi.exe"C:\Users\Admin\AppData\Roaming\XenoManager\skibidi.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
51KB
MD522519d6182d8d97ef18b93aac9505c65
SHA1f2e6124e2567866a8fe81bd4e43a4fe401136296
SHA2561b7960f4002e371cf4a12ca7c041162ef3c5203c06b261d90ea58496c5dd60c5
SHA51283a926c66f7900163e8e3d7beef1347785d0c8c3d9d8bc74756621ea39189efe2d7dfc074ce57ae9d025c73ec823a6270628bd499d9c9f80642f918c91ca21cf