Analysis
-
max time kernel
293s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 13:28
Behavioral task
behavioral1
Sample
skibiditoilet.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
skibiditoilet.exe
Resource
win10v2004-20241007-en
General
-
Target
skibiditoilet.exe
-
Size
839KB
-
MD5
b44e34f9dbfc72cc87b0904c94ab4160
-
SHA1
6511a3fbc77523fd489e09ec7dcd51eb421fd1eb
-
SHA256
7013e54e6ea0cc2a6b3d3e4e043761692641e53cc630a907e859b50283350f7e
-
SHA512
7d527fab4549cf4dcd25e301ab97fea66a6e5bc4e135e43d747ecdde7eb915fe7814c56211e49d8966e970fd4838386cbe771a2e89ca1d4acbcb4c65a95d20dd
-
SSDEEP
24576:GFS04YNEMuExDiU6E5R9s8xY/2l/drtnIbt+ry:G34auS+UjfU2TrdIbt+r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skibiditoilet.exe -
Executes dropped EXE 1 IoCs
pid Process 3440 AudioDriver.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini skibiditoilet.exe File opened for modification C:\Windows\assembly\Desktop.ini skibiditoilet.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly skibiditoilet.exe File created C:\Windows\assembly\Desktop.ini skibiditoilet.exe File opened for modification C:\Windows\assembly\Desktop.ini skibiditoilet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skibiditoilet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe 3440 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3440 AudioDriver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3440 AudioDriver.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3440 AudioDriver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3440 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3440 1232 skibiditoilet.exe 83 PID 1232 wrote to memory of 3440 1232 skibiditoilet.exe 83 PID 1232 wrote to memory of 3440 1232 skibiditoilet.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\skibiditoilet.exe"C:\Users\Admin\AppData\Local\Temp\skibiditoilet.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
839KB
MD5b44e34f9dbfc72cc87b0904c94ab4160
SHA16511a3fbc77523fd489e09ec7dcd51eb421fd1eb
SHA2567013e54e6ea0cc2a6b3d3e4e043761692641e53cc630a907e859b50283350f7e
SHA5127d527fab4549cf4dcd25e301ab97fea66a6e5bc4e135e43d747ecdde7eb915fe7814c56211e49d8966e970fd4838386cbe771a2e89ca1d4acbcb4c65a95d20dd