APT29 - Fileless PowerShell Execution Via WMI

Discussion in 'malware problems & news' started by itman, May 29, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Came across this puppy that used Powershell via WMI to install a backdoor and subsequently use that backdoor for further malicious activities:
    https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html
     
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Yeah, I found it "illuminating" that FireEye that has it own heavy duty commercial security solutions was stating in effect that the only way you can be sure you having been nailed by remote PowerShell malware is examine your Powershell logs.

    There have been numerous recent Windows remote execution vulnerabilities exposed that show that all that is needed to exploit these is for the attacker to gain admin privileges on local machine. Unfortunately, that is far to easy to accomplish on current Win OS versions.
     
  4. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I enabled logging right after following your link on that and happened on to it too.

    At least now and for the time being for better or worse all PS commands are resting comfortably in the system drive folder now.

    Very useful feature. Available notice should be shared and come to light more often instead of having to stumble on these things after some major event.
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Last edited: Jun 4, 2017
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Here's another WMI malware incident in which I give the developer an A+ for creativity:
    https://www.secureworks.com/blog/wmi-persistence
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.