Overview
overview
10Static
static
5My-Skidded...f2.exe
windows10-2004-x64
My-Skidded...Us.vbs
windows10-2004-x64
1My-Skidded...AT.exe
windows10-2004-x64
10My-Skidded...UN.exe
windows10-2004-x64
10My-Skidded...no.exe
windows10-2004-x64
6My-Skidded...MK.exe
windows10-2004-x64
My-Skidded...ck.vbs
windows10-2004-x64
1My-Skidded...it.exe
windows10-2004-x64
7My-Skidded... 2.bat
windows10-2004-x64
7My-Skidded...OR.vbs
windows10-2004-x64
1My-Skidded...ge.exe
windows10-2004-x64
My-Skidded...ck.exe
windows10-2004-x64
10My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...ba.vbs
windows10-2004-x64
1My-Skidded...ad.exe
windows10-2004-x64
My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...AL.exe
windows10-2004-x64
6My-Skidded...en.exe
windows10-2004-x64
6My-Skidded...in.exe
windows10-2004-x64
6My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
10My-Skidded...24.exe
windows10-2004-x64
10My-Skidded....0.bat
windows10-2004-x64
7My-Skidded...as.exe
windows10-2004-x64
My-Skidded...ll.bat
windows10-2004-x64
My-Skidded...ks.exe
windows10-2004-x64
My-Skidded...ua.exe
windows10-2004-x64
My-Skidded...kz.bat
windows10-2004-x64
8My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...UG.exe
windows10-2004-x64
My-Skidded...mi.exe
windows10-2004-x64
6Resubmissions
09/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
7s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 01:58
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
My-Skidded-malwares-main/AmongUs.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
My-Skidded-malwares-main/AnaRAT.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
My-Skidded-malwares-main/CRINGE-DO-NOT-RUN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
My-Skidded-malwares-main/Cirno.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
My-Skidded-malwares-main/DAMK.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
My-Skidded-malwares-main/Dell_Fuck.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
My-Skidded-malwares-main/Discord Expliot Kit.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
My-Skidded-malwares-main/ERROR 2.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
My-Skidded-malwares-main/ERROR.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
My-Skidded-malwares-main/Fello_s_Revenge.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
My-Skidded-malwares-main/Fellos RAT-Pack.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
My-Skidded-malwares-main/KonataMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
My-Skidded-malwares-main/KonoSuba.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
My-Skidded-malwares-main/MarisaFumoDownload.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
My-Skidded-malwares-main/MarisaMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
My-Skidded-malwares-main/Marlon2210FACEREVEAL.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
My-Skidded-malwares-main/Marlon2210KeyGen.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
My-Skidded-malwares-main/Megumin.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
My-Skidded-malwares-main/NazrinMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
My-Skidded-malwares-main/PCCooker2.0_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
My-Skidded-malwares-main/PCCooker_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
My-Skidded-malwares-main/PanKoza2.0 Discord Token Stealer 2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
My-Skidded-malwares-main/Rias.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
My-Skidded-malwares-main/Run All.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
My-Skidded-malwares-main/TouhouHacks.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
My-Skidded-malwares-main/Trojan.Aqua.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral30
Sample
My-Skidded-malwares-main/UtsuhoMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
My-Skidded-malwares-main/VXUG.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral32
Sample
My-Skidded-malwares-main/YuukaKazami.exe
Resource
win10v2004-20250217-en
Errors
General
-
Target
My-Skidded-malwares-main/MarisaFumoDownload.exe
-
Size
825KB
-
MD5
e3558be7928053af8b9ccc60a57a40fc
-
SHA1
253f2b018c5aaa38cd038256af9b72bd397aece1
-
SHA256
125263fbc1a517f7302ee91bfaa548767719243b4f9dcaad33c13974fe9f4591
-
SHA512
3152ef4c7a544f282cf4ac356adf1d4ad753a0eb3ad12bf7af66174acae700e5a8d40302305b7acddc867e834829cf430efefe7a070fd17751e7571e5d5099be
-
SSDEEP
12288:WDbpr2trUqUeBhfUHzXC+cHJ8XeSb++6naTmvtCQomfU37uwzNiVEjZ5HX:WDdsrsG5UHulCXR+PaTmPc3q2I853
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CustomMBR = "C:\\Users\\Admin\\AppData\\Local\\Temp\\My-Skidded-malwares-main\\MarisaFumoDownload.exe -BypassWarning" MarisaFumoDownload.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MarisaFumoDownload.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MarisaFumoDownload.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 MarisaFumoDownload.exe 3300 MarisaFumoDownload.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3300 MarisaFumoDownload.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3300 MarisaFumoDownload.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 5928 3300 MarisaFumoDownload.exe 85 PID 3300 wrote to memory of 5928 3300 MarisaFumoDownload.exe 85 PID 3300 wrote to memory of 5928 3300 MarisaFumoDownload.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\MarisaFumoDownload.exe"C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\MarisaFumoDownload.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN CustomMBR /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\MarisaFumoDownload.exe -BypassWarning"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5928
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1