Resubmissions
12/03/2025, 21:28
250312-1bn3yatwgv 1012/03/2025, 21:24
250312-z9fzjsvpx2 1012/03/2025, 21:22
250312-z8by7stvf1 612/03/2025, 21:20
250312-z63n5stvb1 711/03/2025, 00:00
250311-aaawtasr13 510/03/2025, 21:57
250310-1t6eyazlx6 1009/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
32s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/03/2025, 21:22
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main.zip
Resource
win11-20250217-en
General
-
Target
My-Skidded-malwares-main.zip
-
Size
106.4MB
-
MD5
d01f58a973cfceca5abbb124f8e580ff
-
SHA1
b60fd4d18c92322819300af17bc44e798d0ddef4
-
SHA256
d5395f121277d2b38f4173c7df0a20a3de99edfcfe2aa697080cc81170eb76ab
-
SHA512
81d6c94f56d53cd7fa29f5c1d9f8077a176b07b9a2c859b8525f6451660fb906dd960b71358ff870019990f541e816489c131a96b1fb2b7c66178a04ed35904d
-
SSDEEP
3145728:Sg2PlA+mrMHCwbc/bAjXC0P5JCe94RWQRVBCXD7:SJlmxTAj7PtGR9RVBE3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\CustomMBR = "C:\\Users\\Admin\\Desktop\\My-Skidded-malwares-main\\My-Skidded-malwares-main\\llrainbowalexll.exe -BypassWarning" llrainbowalexll.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 llrainbowalexll.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chat_im_cooked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cirno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrainbowalexll.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1992 schtasks.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1268 chat_im_cooked.exe 1332 Cirno.exe 3300 llrainbowalexll.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1992 3300 llrainbowalexll.exe 93 PID 3300 wrote to memory of 1992 3300 llrainbowalexll.exe 93 PID 3300 wrote to memory of 1992 3300 llrainbowalexll.exe 93
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main.zip1⤵PID:2796
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3076
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\chat_im_cooked.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\chat_im_cooked.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1268
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\Cirno.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\Cirno.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1332
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\llrainbowalexll.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\llrainbowalexll.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN CustomMBR /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\Desktop\My-Skidded-malwares-main\My-Skidded-malwares-main\llrainbowalexll.exe -BypassWarning"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1