Resubmissions

09/03/2025, 01:58

250309-cdv29swybs 10

08/03/2025, 06:55

250308-hp35xatjt9 10

08/03/2025, 04:53

250308-fh1ebssky5 10

Analysis

  • max time kernel
    67s
  • max time network
    56s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 01:58

Errors

Reason
Machine shutdown

General

  • Target

    My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe

  • Size

    8.6MB

  • MD5

    57c4e3c3fe4cad4179e3d2203aec90b6

  • SHA1

    12c1262f5aadb9cb11d266681841ffdebf85fe17

  • SHA256

    6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2

  • SHA512

    7e9cb1752924945212198100141cab9ed65b702535ebbbf587a1d0decc736a79e50849ba621c2f21505a8a855bb122277093768dab005194b3972b943b557499

  • SSDEEP

    49152:FBtiVC1wE+5WhANOgkImhsSWUlqiFEJ3QqkfqV8+PYfjKp9uMuqtwtpi4gmmZRwx:Fd

Malware Config

Signatures

  • Disables RegEdit via registry modification 4 IoCs
  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Writes to the Master Boot Record (MBR) 1 TTPs 8 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
    "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\Bahhhh.exe
      "C:\Users\Admin\AppData\Local\Temp\Bahhhh.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Users\Admin\AppData\Local\Temp\Berkelium.exe
      "C:\Users\Admin\AppData\Local\Temp\Berkelium.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3860
    • C:\Users\Admin\AppData\Local\Temp\Boron.exe
      "C:\Users\Admin\AppData\Local\Temp\Boron.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im taskmgr.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3812
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG DELETE HKCU /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:6068
        • C:\Windows\SysWOW64\reg.exe
          REG DELETE HKCU /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:464
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2144
        • C:\Windows\SysWOW64\reg.exe
          REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:5172
    • C:\Users\Admin\AppData\Local\Temp\Californium.exe
      "C:\Users\Admin\AppData\Local\Temp\Californium.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3420
    • C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe
      "C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /Create /TN CustomMBR /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe -BypassWarning"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2052
    • C:\Users\Admin\AppData\Local\Temp\Cobalt.exe
      "C:\Users\Admin\AppData\Local\Temp\Cobalt.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3512
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im taskmgr.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2572
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG DELETE HKCU /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4116
        • C:\Windows\SysWOW64\reg.exe
          REG DELETE HKCU /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1924
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:576
        • C:\Windows\SysWOW64\reg.exe
          REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1464
    • C:\Users\Admin\AppData\Local\Temp\Curium.exe
      "C:\Users\Admin\AppData\Local\Temp\Curium.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1920
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eee.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5676
    • C:\Users\Admin\AppData\Local\Temp\Einsteinium.exe
      "C:\Users\Admin\AppData\Local\Temp\Einsteinium.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2936
    • C:\Users\Admin\AppData\Local\Temp\EternalOrange.exe
      "C:\Users\Admin\AppData\Local\Temp\EternalOrange.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2132
    • C:\Users\Admin\AppData\Local\Temp\Fermium.exe
      "C:\Users\Admin\AppData\Local\Temp\Fermium.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
    • C:\Users\Admin\AppData\Local\Temp\Flerovium.exe
      "C:\Users\Admin\AppData\Local\Temp\Flerovium.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5492
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im taskmgr.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG DELETE HKCU /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5972
        • C:\Windows\SysWOW64\reg.exe
          REG DELETE HKCU /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2200
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Windows\SysWOW64\reg.exe
          REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 1832
      2⤵
      • Program crash
      PID:5624
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
    • Network Service Discovery
    PID:3492
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
      PID:2780
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:3924
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3228 -ip 3228
      1⤵
        PID:3864
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x4 /state0:0xa3951855 /state1:0x41c64e6d
        1⤵
          PID:1456
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
          1⤵
          • Checks processor information in registry
          • Modifies registry class
          PID:4932
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x474 0x4a0
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3688
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0 /state0:0xa3917055 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:5304

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Bahhhh.exe

          Filesize

          230KB

          MD5

          27095b6e72d783c7ad7114f91b87e640

          SHA1

          15ef79e042f4befb60783b1d7931bfd916972096

          SHA256

          0738c33d4cbdef4bd1c216248a0a7a20ee7254e63d526fc113e827938aff2520

          SHA512

          9852bc26220c0ca60921425f7a089c4b5356624be41cf1d0e5b04eb36f47b840e2e1235d115927a6d3d69c6f3e60dfef484c67c59ade9edbf4e407b2c02c02ce

        • C:\Users\Admin\AppData\Local\Temp\Berkelium.exe

          Filesize

          74KB

          MD5

          c9f5fcf8b057f6f5b0f562fe1181cb18

          SHA1

          a1a4b505e2fc4d92ebacbdc6c783a29f7553bc41

          SHA256

          ad024d92fa10cba15bc1930f6d6792eba33feead5b4b8c4b4881c34409c31e3d

          SHA512

          a3fbbe86632fccdc74c43bc7c0afcb7c33463540f21473099a2176edff870bd47eac98d2dc64f684939a60888db190a4e091cc7d3068ca436da8e62969b17e58

        • C:\Users\Admin\AppData\Local\Temp\Boron.exe

          Filesize

          207KB

          MD5

          30f2f3ba2f5053f75fd1af6186db6f7f

          SHA1

          ac9f70dcdf0a4caf57ac8b300b2205090f0850d7

          SHA256

          d350d7c68aa5b939d08fba384d1fbe44b757fcdadecb6534b5239d46bfef1f75

          SHA512

          5c39807596324fd7ba12c326af2e9f9b8666e76980ad1189fc49b71736eae779e461e5da71f9a27e014be8a8bd978dac6e7b3b3ceddbadb85f95682cc46cf7d8

        • C:\Users\Admin\AppData\Local\Temp\Californium.exe

          Filesize

          223KB

          MD5

          306a2acc6e08033fad9b193dcbd4de05

          SHA1

          bccff10f633cac6c0bbda5a54061dd05d8f980de

          SHA256

          512a4972b15235864fc896484128b79d48d0dff076d6356559a0b75cb67067d3

          SHA512

          9d5e2abbd480181156624804d0709b403297261062bb3d3b2bd08f3a3905909109dfbd442268f94f2269ee3b8bf7a3a1f4206c65e2bd291602586f44fd084fbc

        • C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe

          Filesize

          683KB

          MD5

          5cdd80274f50bbd149441b4563416341

          SHA1

          0436f39868fde8334f7f8398345fa97263a1f38e

          SHA256

          6d842aa210cfd67b6b217b7d5abb88b513e235d3a763ac9eb80733f8bbfd5814

          SHA512

          b6f1e546de2ac25b7fd48763bf19556d1c83f63e68a0886a3dbb9977886693688d35da6f13ee947c661aef67930af1223f898cdf3bf2fe79d989966568c95331

        • C:\Users\Admin\AppData\Local\Temp\Cobalt.exe

          Filesize

          193KB

          MD5

          62f60979fd6a1b5ac711801d575164bd

          SHA1

          08374033a9219287c568774c90e11e74d6862f43

          SHA256

          a165dade3174a456d5af6835359d090cfbde706b941c46177656e06e869409a0

          SHA512

          f855c40c0649d10ede6857f0fee888c724f480bdcbba24c60b5bbb0a86a3ab9fdd1872813ff574993a4d50cdafd7259b29499b4791ec11c6b635157e2b718e8b

        • C:\Users\Admin\AppData\Local\Temp\Curium.exe

          Filesize

          45KB

          MD5

          09e2aac9365ada595f8421858745bb27

          SHA1

          5a06e5e910c5bff7dcc598207f8c38e998c34a1f

          SHA256

          95497d5ed96e5b3458e1729e6c5015cfab6c5bc44907f2324ac7c6bd014a9ba2

          SHA512

          7294b109b0e0934a1f2f3648b65c55c319027b154f3866e64fbf5480aff352e5424e511d9f68af29bdbccb897ad8e874b55f42be1d745dc56fd5d360c36005e7

        • C:\Users\Admin\AppData\Local\Temp\Einsteinium.exe

          Filesize

          59KB

          MD5

          0b18325551f9d0055a9e3aa7921dfc76

          SHA1

          3b5076541b73bb6f9b1910dcc339709e360a9a92

          SHA256

          350f39bf3a98520e20f6aed34b4786ee2f6518c979613653b08dcf07f3b5e15e

          SHA512

          b45440ca9863bbb1cf2e1434612b32ed2f4f8d54645a02e4c7dc84297fae2222a40cb18e6e29f0eba5e475846ff02fa60ce35107c63a6f0a07830d89647a285b

        • C:\Users\Admin\AppData\Local\Temp\EternalOrange.exe

          Filesize

          272KB

          MD5

          59b1f2c4da85066cc5a73d80cfb9dcd2

          SHA1

          bf005c3de251295d74ec19bf90d03ddcf06b1d88

          SHA256

          9242ae324864a6388d09a076110b3d55cb97056e22b201c4cc8cbcae29f302cf

          SHA512

          951bd4db81e9f0bdbc6a16c9ce3f400f287e9815e097e0a984d407dc8df85fbde150930a18af474f86221a4a8f46413f8c08cf2df0bbd1ad47bb85b0583595fd

        • C:\Users\Admin\AppData\Local\Temp\Fermium.exe

          Filesize

          55KB

          MD5

          21f63fa6e6db4240fde9121fb4847a7f

          SHA1

          a4c4ac1234960c7c3dbe0bd3133ec5c56deb3dec

          SHA256

          4bab7485b91ec5196a586a75ac7ee7d7cb8d7cdac96f59b8d5a53a1abe09910b

          SHA512

          cbba2dd355b6472284d0a50a2887f5de4b7c5c109eb3ff2f1b79fd6709b66c63ae0bd8146e9b1fcd97cf699144b8340b9a0ee4714aa9b15d248e63d1d4e2b9fb

        • C:\Users\Admin\AppData\Local\Temp\Flerovium.exe

          Filesize

          192KB

          MD5

          f728c4f178a7bc544136018d674f89a1

          SHA1

          14d60483112dbff186fe9c8b5f3efd644b7855e5

          SHA256

          bf3b53c82583803c36e00c1658cc7ea5154fa7015cc2cefd7d37bdc05a1824ac

          SHA512

          4544c1aaa98530cd815c76d0d3a25ca6c8e74c7153260b49dd5c0050bd2df7a5bda25219766e2fa8912293758039c54afddf0dfd99f5d8af4e50bf0445a7e8da

        • C:\Users\Admin\AppData\Local\Temp\Gallium.exe

          Filesize

          64KB

          MD5

          e8bf30b1b6173a24fe3c091f5e41e51e

          SHA1

          2bfb376d9931b551ea2aef92e516fa4247e36c2a

          SHA256

          e8f9473c5910d908bbcf8b3100fd1927fa4293a99b4684e29f213f44cc61a58d

          SHA512

          050c3779a393a78a712f66fb23fd3305ad992a81983e2c91c29a6799423520c876344936ed5ab0e027c237ab1921243e67cae4e83c425828807f9fd59289d7d5

        • memory/3228-2-0x0000000074650000-0x0000000074C01000-memory.dmp

          Filesize

          5.7MB

        • memory/3228-1-0x0000000074650000-0x0000000074C01000-memory.dmp

          Filesize

          5.7MB

        • memory/3228-0-0x0000000074652000-0x0000000074653000-memory.dmp

          Filesize

          4KB

        • memory/3228-99-0x0000000074650000-0x0000000074C01000-memory.dmp

          Filesize

          5.7MB