Overview
overview
10Static
static
5My-Skidded...f2.exe
windows10-2004-x64
My-Skidded...Us.vbs
windows10-2004-x64
1My-Skidded...AT.exe
windows10-2004-x64
10My-Skidded...UN.exe
windows10-2004-x64
10My-Skidded...no.exe
windows10-2004-x64
6My-Skidded...MK.exe
windows10-2004-x64
My-Skidded...ck.vbs
windows10-2004-x64
1My-Skidded...it.exe
windows10-2004-x64
7My-Skidded... 2.bat
windows10-2004-x64
7My-Skidded...OR.vbs
windows10-2004-x64
1My-Skidded...ge.exe
windows10-2004-x64
My-Skidded...ck.exe
windows10-2004-x64
10My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...ba.vbs
windows10-2004-x64
1My-Skidded...ad.exe
windows10-2004-x64
My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...AL.exe
windows10-2004-x64
6My-Skidded...en.exe
windows10-2004-x64
6My-Skidded...in.exe
windows10-2004-x64
6My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
10My-Skidded...24.exe
windows10-2004-x64
10My-Skidded....0.bat
windows10-2004-x64
7My-Skidded...as.exe
windows10-2004-x64
My-Skidded...ll.bat
windows10-2004-x64
My-Skidded...ks.exe
windows10-2004-x64
My-Skidded...ua.exe
windows10-2004-x64
My-Skidded...kz.bat
windows10-2004-x64
8My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...UG.exe
windows10-2004-x64
My-Skidded...mi.exe
windows10-2004-x64
6Resubmissions
09/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
294s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 01:58
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
My-Skidded-malwares-main/AmongUs.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
My-Skidded-malwares-main/AnaRAT.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
My-Skidded-malwares-main/CRINGE-DO-NOT-RUN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
My-Skidded-malwares-main/Cirno.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
My-Skidded-malwares-main/DAMK.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
My-Skidded-malwares-main/Dell_Fuck.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
My-Skidded-malwares-main/Discord Expliot Kit.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
My-Skidded-malwares-main/ERROR 2.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
My-Skidded-malwares-main/ERROR.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
My-Skidded-malwares-main/Fello_s_Revenge.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
My-Skidded-malwares-main/Fellos RAT-Pack.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
My-Skidded-malwares-main/KonataMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
My-Skidded-malwares-main/KonoSuba.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
My-Skidded-malwares-main/MarisaFumoDownload.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
My-Skidded-malwares-main/MarisaMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
My-Skidded-malwares-main/Marlon2210FACEREVEAL.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
My-Skidded-malwares-main/Marlon2210KeyGen.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
My-Skidded-malwares-main/Megumin.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
My-Skidded-malwares-main/NazrinMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
My-Skidded-malwares-main/PCCooker2.0_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
My-Skidded-malwares-main/PCCooker_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
My-Skidded-malwares-main/PanKoza2.0 Discord Token Stealer 2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
My-Skidded-malwares-main/Rias.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
My-Skidded-malwares-main/Run All.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
My-Skidded-malwares-main/TouhouHacks.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
My-Skidded-malwares-main/Trojan.Aqua.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral30
Sample
My-Skidded-malwares-main/UtsuhoMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
My-Skidded-malwares-main/VXUG.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral32
Sample
My-Skidded-malwares-main/YuukaKazami.exe
Resource
win10v2004-20250217-en
General
-
Target
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
-
Size
3KB
-
MD5
ce45f129d128fb1ce6e659451fc8ae48
-
SHA1
44cccb5515797e51e51498a73d02e66f086f0040
-
SHA256
7660ba2fc3dddcdc079e20771f4f0b1fde0c1b508f32edda841993ace2f08c40
-
SHA512
23af808c2a413b7932668ec5d2163611e310e6d837839b0c8f96a1467c4122c702be99dfb45dbae780a026cac9a38b989b95b80f391ee9eb5d8f54044490b886
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops desktop.ini file(s) 11 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Documents\Fax\Drafts\desktop.ini WFS.exe File opened for modification C:\Users\Admin\Documents\Fax\Inbox\desktop.ini WFS.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Documents\Fax\Personal CoverPages\desktop.ini FXSCOVER.exe File opened for modification C:\Users\Admin\Documents\Scanned Documents\desktop.ini WFS.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1464 tasklist.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Logs\SystemRestore\RestoreUI.0.etl rstrui.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log BdeHdCfg.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log BdeHdCfg.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml BdeHdCfg.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml BdeHdCfg.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language printui.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2992 SnippingTool.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2240 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 3916 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000de3056e8859aed459ffffc86a4b5a6f600000000020000000000106600000001000020000000975f552bf81fb7d7ba489aa7b72dc1b3627daa2258f9ddffbd6a6cf1085a2141000000000e8000000002000020000000522223c8e11ee8db065aa538d1c9f111f6b6ae29ecd65392d8b7ee5faf02d79010000000e2955dbc25cc3ac682bb64b33aea6f6b40000000fcea64e55ccaac391c1035bfad040eb305e96b2e9d4d9e415299f7efc86f6d938d68c6e8b474dd48a79b6f3ae31903ca6056eb1aff6277cb2a39ca4b1b7e96d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE11SR" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447647456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2F3B6221-FC8A-11EF-8CD4-FAA7D1B92D9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\KnownProvidersUpgradeTime = ab22c4d68f81db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IE11SS&market={language}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Bing" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURL = "http://www.bing.com/favicon.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IE11SS&market={language}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\shell\open FXSCOVER.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\shell\print\command FXSCOVER.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\shell\print FXSCOVER.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\DefaultIcon FXSCOVER.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings WSReset.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings wab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\ = "Fax Cover Page" FXSCOVER.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\DefaultIcon\ = "C:\\Windows\\system32\\FXSCOVER.exe,1" FXSCOVER.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document FXSCOVER.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\shell\open\command FXSCOVER.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FaxCover.Document\shell FXSCOVER.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d}:$DATA WFS.exe File created C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:3or4kl4x13tuuug3Byamue2s4b:$DATA WFS.exe File opened for modification C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:Updt_3or4kl4x13tuuug3Byamue2s4b:$DATA WFS.exe File created C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:Updt_3or4kl4x13tuuug3Byamue2s4b:$DATA WFS.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5944 mspaint.exe 5944 mspaint.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1060 wbengine.exe Token: SeRestorePrivilege 1060 wbengine.exe Token: SeSecurityPrivilege 1060 wbengine.exe Token: SeBackupPrivilege 1536 vssvc.exe Token: SeRestorePrivilege 1536 vssvc.exe Token: SeAuditPrivilege 1536 vssvc.exe Token: SeDebugPrivilege 1464 tasklist.exe Token: SeShutdownPrivilege 1608 unregmp2.exe Token: SeCreatePagefilePrivilege 1608 unregmp2.exe Token: SeShutdownPrivilege 2240 wmplayer.exe Token: SeCreatePagefilePrivilege 2240 wmplayer.exe Token: SeTcbPrivilege 6036 svchost.exe Token: SeRestorePrivilege 6036 svchost.exe Token: SeTcbPrivilege 6036 svchost.exe Token: SeRestorePrivilege 6036 svchost.exe Token: SeTcbPrivilege 6036 svchost.exe Token: SeRestorePrivilege 6036 svchost.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2860 iexplore.exe 3640 SndVol.exe 2860 iexplore.exe 4368 mip.exe 2240 wmplayer.exe 5276 DevicePairingWizard.exe 4368 mip.exe 4368 mip.exe 4368 mip.exe 4368 mip.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3640 SndVol.exe 3640 SndVol.exe 4368 mip.exe 4368 mip.exe 4368 mip.exe 4368 mip.exe 4368 mip.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 2860 iexplore.exe 2860 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 4940 OpenWith.exe 2992 SnippingTool.exe 4368 mip.exe 2396 verifiergui.exe 2396 verifiergui.exe 4840 WFS.exe 3820 FXSCOVER.exe 4840 WFS.exe 3820 FXSCOVER.exe 5944 mspaint.exe 5944 mspaint.exe 5944 mspaint.exe 5944 mspaint.exe 5276 DevicePairingWizard.exe 5136 wordpad.exe 5136 wordpad.exe 5136 wordpad.exe 5136 wordpad.exe 5136 wordpad.exe 1368 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2860 5100 cmd.exe 86 PID 5100 wrote to memory of 2860 5100 cmd.exe 86 PID 2860 wrote to memory of 988 2860 iexplore.exe 88 PID 2860 wrote to memory of 988 2860 iexplore.exe 88 PID 2860 wrote to memory of 988 2860 iexplore.exe 88 PID 5100 wrote to memory of 1364 5100 cmd.exe 89 PID 5100 wrote to memory of 1364 5100 cmd.exe 89 PID 5100 wrote to memory of 2724 5100 cmd.exe 90 PID 5100 wrote to memory of 2724 5100 cmd.exe 90 PID 5100 wrote to memory of 756 5100 cmd.exe 97 PID 5100 wrote to memory of 756 5100 cmd.exe 97 PID 5100 wrote to memory of 4076 5100 cmd.exe 98 PID 5100 wrote to memory of 4076 5100 cmd.exe 98 PID 5100 wrote to memory of 3640 5100 cmd.exe 99 PID 5100 wrote to memory of 3640 5100 cmd.exe 99 PID 5100 wrote to memory of 4792 5100 cmd.exe 100 PID 5100 wrote to memory of 4792 5100 cmd.exe 100 PID 2860 wrote to memory of 2704 2860 iexplore.exe 101 PID 2860 wrote to memory of 2704 2860 iexplore.exe 101 PID 2860 wrote to memory of 2704 2860 iexplore.exe 101 PID 5100 wrote to memory of 3344 5100 cmd.exe 106 PID 5100 wrote to memory of 3344 5100 cmd.exe 106 PID 5100 wrote to memory of 4560 5100 cmd.exe 107 PID 5100 wrote to memory of 4560 5100 cmd.exe 107 PID 5100 wrote to memory of 1896 5100 cmd.exe 108 PID 5100 wrote to memory of 1896 5100 cmd.exe 108 PID 1896 wrote to memory of 4864 1896 WSCollect.exe 112 PID 1896 wrote to memory of 4864 1896 WSCollect.exe 112 PID 1896 wrote to memory of 4488 1896 WSCollect.exe 113 PID 1896 wrote to memory of 4488 1896 WSCollect.exe 113 PID 5100 wrote to memory of 888 5100 cmd.exe 121 PID 5100 wrote to memory of 888 5100 cmd.exe 121 PID 5100 wrote to memory of 1464 5100 cmd.exe 122 PID 5100 wrote to memory of 1464 5100 cmd.exe 122 PID 5100 wrote to memory of 3208 5100 cmd.exe 123 PID 5100 wrote to memory of 3208 5100 cmd.exe 123 PID 5100 wrote to memory of 4368 5100 cmd.exe 127 PID 5100 wrote to memory of 4368 5100 cmd.exe 127 PID 5100 wrote to memory of 4432 5100 cmd.exe 129 PID 5100 wrote to memory of 4432 5100 cmd.exe 129 PID 5100 wrote to memory of 2992 5100 cmd.exe 130 PID 5100 wrote to memory of 2992 5100 cmd.exe 130 PID 5100 wrote to memory of 1152 5100 cmd.exe 132 PID 5100 wrote to memory of 1152 5100 cmd.exe 132 PID 5100 wrote to memory of 2240 5100 cmd.exe 133 PID 5100 wrote to memory of 2240 5100 cmd.exe 133 PID 5100 wrote to memory of 3916 5100 cmd.exe 134 PID 5100 wrote to memory of 3916 5100 cmd.exe 134 PID 5100 wrote to memory of 1464 5100 cmd.exe 138 PID 5100 wrote to memory of 1464 5100 cmd.exe 138 PID 5100 wrote to memory of 3992 5100 cmd.exe 140 PID 5100 wrote to memory of 3992 5100 cmd.exe 140 PID 5100 wrote to memory of 2724 5100 cmd.exe 141 PID 5100 wrote to memory of 2724 5100 cmd.exe 141 PID 1152 wrote to memory of 2396 1152 verifier.exe 143 PID 1152 wrote to memory of 2396 1152 verifier.exe 143 PID 5100 wrote to memory of 3776 5100 cmd.exe 147 PID 5100 wrote to memory of 3776 5100 cmd.exe 147 PID 5100 wrote to memory of 4776 5100 cmd.exe 148 PID 5100 wrote to memory of 4776 5100 cmd.exe 148 PID 5100 wrote to memory of 4776 5100 cmd.exe 148 PID 5100 wrote to memory of 2724 5100 cmd.exe 149 PID 5100 wrote to memory of 2724 5100 cmd.exe 149 PID 5100 wrote to memory of 2240 5100 cmd.exe 150 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\RaM KilLEr 1.0.bat"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:82950 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:1364
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies registry class
PID:2724
-
-
C:\Windows\system32\iexpress.exeiexpress.exe2⤵PID:756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:4076
-
-
C:\Windows\system32\SndVol.exeSndVol.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3640
-
-
C:\Windows\system32\tcmsetup.exetcmsetup.exe2⤵PID:4792
-
-
C:\Windows\system32\rstrui.exerstrui.exe2⤵
- Drops file in Windows directory
PID:3344
-
-
C:\Windows\system32\WSReset.exeWSReset.exe2⤵
- Modifies registry class
PID:4560
-
-
C:\Windows\system32\WSCollect.exeWSCollect.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SIH" "C:\Users\Admin\AppData\Local\Temp\registry_SIH.txt" /y3⤵PID:4864
-
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe export "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters\DnsPolicyConfig" "C:\Users\Admin\AppData\Local\Temp\registry_DNSPolicy.txt" /y3⤵PID:4488
-
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:888
-
-
C:\Program Files\Windows Mail\wab.exe"C:\Program Files\Windows Mail\wab.exe"2⤵
- Modifies registry class
PID:1464
-
-
C:\Program Files\Windows Mail\wabmig.exe"C:\Program Files\Windows Mail\wabmig.exe"2⤵PID:3208
-
-
C:\Program Files\Common Files\microsoft shared\ink\mip.exe"C:\Program Files\Common Files\microsoft shared\ink\mip.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4368
-
-
C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe"C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe"2⤵PID:4432
-
-
C:\Windows\system32\SnippingTool.exeSnippingTool.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
C:\Windows\system32\verifier.exeverifier.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\verifiergui.exe"C:\Windows\system32\verifiergui.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
-
C:\Windows\system32\systeminfo.exesysteminfo.exe2⤵
- Gathers system information
PID:2240
-
-
C:\Windows\system32\taskkill.exetaskkill.exe2⤵
- Kills process with taskkill
PID:3916
-
-
C:\Windows\system32\tasklist.exetasklist.exe2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\system32\wscript.exewscript.exe2⤵PID:3992
-
-
C:\Windows\system32\BdeHdCfg.exeBdeHdCfg.exe2⤵
- Drops file in Windows directory
PID:2724
-
-
C:\Windows\System32\msra.exeC:\Windows\System32\msra.exe2⤵PID:3776
-
-
C:\Windows\SysWOW64\printui.exeC:\Windows\SysWOW64\printui.exe2⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\System32\PrintBrmUi.exeC:\Windows\System32\PrintBrmUi.exe2⤵PID:2724
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2240 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon3⤵
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT4⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
-
-
C:\Windows\system32\WFS.exeWFS.exe2⤵
- Drops desktop.ini file(s)
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:4840
-
-
C:\Windows\system32\FXSCOVER.exeFXSCOVER.exe2⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3820
-
-
C:\Windows\system32\mspaint.exemspaint.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5944
-
-
C:\Windows\system32\cttune.execttune.exe2⤵PID:5272
-
-
C:\Windows\system32\DevicePairingWizard.exeDevicePairingWizard.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5276
-
-
C:\Windows\system32\DpiScaling.exeDpiScaling.exe2⤵PID:5292
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" ms-settings:display3⤵PID:2120
-
-
-
C:\Windows\system32\Netplwiz.exeNetplwiz.exe2⤵PID:1940
-
-
C:\Windows\system32\winver.exewinver.exe2⤵PID:5352
-
-
C:\Windows\system32\calc.execalc.exe2⤵
- Modifies registry class
PID:5320
-
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5136
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3044
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5084
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:5260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6036 -
C:\Windows\system32\dashost.exedashost.exe {09fe7ea8-a4c9-4a58-8bc1a1ce1ee2f3b0}2⤵PID:5448
-
-
C:\Windows\system32\dashost.exedashost.exe {0027f645-b91e-49ef-8282d1a028316418}2⤵PID:4836
-
-
C:\Windows\system32\dashost.exedashost.exe {0fd3da7d-2953-4001-b93bd917d62cff29}2⤵PID:4400
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5428
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5063793e4ba784832026ec8bc3528f7f1
SHA1687d03823d7ab8954826f753a645426cff3c5db4
SHA256cb153cb703aea1ba1afe2614cffb086fa781646a285c5ac37354ee933a29cedd
SHA512225910c24052dfdf7fca574b12ecef4eb68e990167010f80d7136f03ac6e7faa33233685cbf37b38ee626bb22ff3afeee39e597080e429be3ec241fb30af40c6
-
Filesize
1024KB
MD5e098044b128b255f5c3b345996390840
SHA185023495766df16f47672a65cc1341958cf558f6
SHA256465c201addb46aeef1c972ee11ef2570708e04996a0c797472875c33367864bf
SHA512de4de4eefb5b31a704942df3587ad2ce16079987564bd7801c5b1e8224dd3b78706236a9c12f7da3e576a3026161dd8a3ecefcd422304045e544270b79f5d72b
-
Filesize
68KB
MD54b82dc1f5c7afcab8e7fa857c2e28e2e
SHA1d8918cb93555d82fd0b8b91e42eefa45086a007e
SHA25600efea56f6a19a0813828d1a36289b641436ec06ebe3fb7be6cec9eef4f2817b
SHA51207dfd9b1064939fea73be325e153e3fa80807af1e2aedf3ad32dcdbfab303d686131dceb48620afb56981009d25ff40877fde2387c49245219fb21139ab24ae9
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5be8c55b6da69b8698228b44af35c7e18
SHA1e26861d74daf73c08f02a8d364a32f3b3805522c
SHA2562450e005e01a98e0a79e0d692da78fbeb191b9e4bef5c0d1f2d913f42ce78983
SHA512227139d8444cadc673cef0ad75e23e29bbe38c185a5e07f9e38353f3265a7d99021c78cc92772f3a49852115897cfc2e8735eb75ed71fc2ce21547499372cd2a
-
Filesize
270B
MD5edcaaed49057b04d804ef38622dcfeca
SHA1200458ae3a380983860136acca9b18d62c5bac76
SHA256b9532ca922a984f207d3a82499308fa038e1d78169b534b8d7fc116aefe5a05e
SHA512052065767b3bf96cf1314dd8c42940ace0d256eb7f536de0b642f5816dc0b5e6db3ce9a10450e9564b7c932e9261a9d78ca7929a4537646cbf7d5ee8c363b5fb
-
Filesize
1KB
MD552fa6f2287fb230d4965ee47ed114fdc
SHA1d876f246f9479ce61d031d112d5efb9153d4a1bf
SHA2564435d1f54ffbb08f4615bce745681f09eec3aa30c276211678aab9c53f147330
SHA512b6ac0fe46dc33600a378db08f74701d8614efef5b37db6e3ef61458c617e5a75c734543a399dfbd782bd0c9967f6928d944e7b5e337b1749772e8041c356a216
-
Filesize
83B
MD5598e1a868a65c0b66b59c088f52360ba
SHA154418059a2190ee09d84dd1dfb80ce44f1fc661e
SHA256c183370acb893e1c862bb094ffa9abc34af886933ef45a572d4bcf52f845bbb2
SHA512dce894ce4ffd8c2cc14a83d1416c0a2ea2d4abe02eda88cee571ecdba094c2d458b4f6644969cf0e96baf3367c286bfa01099400ae5d0cbe0b3ed97f8e803edd
-
Filesize
504KB
MD573d4281e46a68222934403627e5b4e19
SHA10f1c29cea7ea24ebb75c95114e0b0d26438e1d39
SHA256aac4ac970ec47cd95dc7c65d7d38d29c1f948be24d5dad1d5aa21053125367c7
SHA512bb7aad10e5accd3f5c0f6b2968973034a2f7c2523401eb234b2de0cdad2dc13f4fd58d08ece94ec06420a52b3d371ba832f8fb4741f48799703bdf32a4daf555