add info about sst_c dropper:
after manipulation with file path,file name he (step by step):
-dropp from resources in temp directory dll sclient.dll(32-bit image),and sqmapi.dll(32-bit or 64-bit image)
-create cmd.exe process(32-bit image) with parametrs like that:
"C:\Windows\System32\cmd.exe" "C:\Users\%USERNAME%\AppData\Local\Temp\sqmapi.dll" "C:\Windows\ehome""C:\Windows\ehome\Mcx2Prov.exe""C:\Users\%USERNAME%\AppData\Local\Temp\outlkupd.exe" (null)
-inject sclient dll into created cmd process(by CreateRemoteThread)
-In injected dll,he parse commandline and checked directory of windows media center [systemroot/ehome] (here using com CoGetObject[Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b8>5bdb8e09}],CoCreateInstance)
-if this directory exist he droped on her dll sqmapi.dll
-launching mcx2prov.exe (that pe file importing api from sqlmapi)
Dll hijacking detect :lol: .That dll simple launched process outlkupd.exe with command line "(null)" and terminated mcx2prov.exe process.
So the fastest way bypass this madness launch outlkupd.exe in temp directory with command line "(null)"...
but next he get another check... :? :? :?
:lol:
Ok he used wmi method to grab data about os and detect virtual environment :)
http://msdn.microsoft.com/en-us/library ... 85%29.aspx
request:
SELECT *FROM Win32_Processor WHERE Name LIKE "%QEMU%" (
http://msdn.microsoft.com/en-us/library ... 85%29.aspx)
SELECT *FROM Win32_BIOS WHERE Manufacturer LIKE"%QEMU%" (
http://msdn.microsoft.com/en-us/library ... 85%29.aspx)
SELECT *FROM Win32_DiskDrive WHERE Model LIKE "%QEMU% (
http://msdn.microsoft.com/en-us/library ... 85%29.aspx)
SELECT *FROM Win32_SCSIController WHERE Manufacturer LIKE "%Xen%" (
http://msdn.microsoft.com/en-us/library ... 85%29.aspx)
SELECT *FROM Win32_ComputerSystem WHERE Manufacturer LIKE "%Parallels% (
http://msdn.microsoft.com/en-us/library ... 85%29.aspx)
list_checks:
- QEMU
Bochs
Red Hat
Xen
Citrix
Parallels
Virtual HDD
INTLs
VmWare
Microsoft
Virtual HD
innotek
VBOX
In next step he compare with black list user accounts (also hashes) by wmi class Win32_UserAccount(
http://msdn.microsoft.com/en-us/library ... 85%29.aspx)
Next challenge :evil:
- -Enumerating all process(createtoolhelp32snapshot),calculate process name hash
-Enumerating all process(ZwQuerySystemInformation[SystemProcessInformation])calculate process name hash
-Enumerating all process by wmi class Win32_Process (http://msdn.microsoft.com/en-us/library ... 85%29.aspx)calculate process name hash
-Try to open in cycle process (OpenProcess) with start hardcode pid 0x40,if success called GetProcessImageFileNameW,getting file name,calc hash
Cycle continue to 0x10000 limit pid.
After all compare getting hashes from all stages with black list
Ok and last:
-enumerating driver name by Win32_SystemDriver wmi class(
http://msdn.microsoft.com/en-us/library ... 85%29.aspx) calc hash and compare with black list
-EnumProcessModules current process,GetModuleBaseNameW - > calc module name hashes ,compare with black list
-NtQuerySystemInformation with class SystemDebuggerInformation (detect KD)
i hate this :lol:
And also i am infect my Windows 7 x64 :)