Análisis realizado por : Raymart Christian Yambot   

 Alias

PowerShell/RiskWare.PowerSploit.BU application (NOD32)

 Plataforma:

Windows

 Riesgo general:
 Potencial de destrucción:
 Potencial de distribución:
 Infección divulgada:
 Revelación de la información:
Bajo
Medio
High
Crítico

  • Tipo de malware
    Hacking Tool

  • Destructivo?
    No

  • Cifrado
     

  • In the Wild:

  Resumen y descripción

Canal de infección Descargado de Internet, Eliminado por otro tipo de malware

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  Detalles técnicos

Tamaño del archivo 472,400 bytes
Tipo de archivo PS1
Residente en memoria No
Fecha de recepción de las muestras iniciales 19 Apr 2024

Detalles de entrada

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Otros detalles

Hace lo siguiente:

  • It accepts the following commands and actions:
    • Export-PowerViewCSV → thread-safe CSV append
    • Resolve-IPAddress → resolves a hostname to an IP
    • ConvertTo-SID → converts a given user/group name to a security identifier (SID)
    • Convert-ADName → converts object names between a variety of formats
    • ConvertFrom-UACValue → converts a UAC int value to human readable form
    • Add-RemoteConnection → pseudo "mounts" a connection to a remote path using the specified credential object
    • Remove-RemoteConnection → destroys a connection created by New-RemoteConnection
    • Invoke-UserImpersonation → creates a new "runas /netonly" type logon and impersonates the token
    • Invoke-RevertToSelf → reverts any token impersonation
    • Get-DomainSPNTicket → request the kerberos ticket for a specified service principal name (SPN)
    • Invoke-Kerberoast → requests service tickets for kerberoast-able accounts and returns extracted ticket hashes
    • Get-PathAcl → get the ACLs for a local/remote file path with optional group recursion
    • Get-DomainDNSZone → enumerates the Active Directory DNS zones for a given domain
    • Get-DomainDNSRecord → enumerates the Active Directory DNS records for a given zone
    • Get-Domain → returns the domain object for the current (or specified) domain
    • Get-DomainController → return the domain controllers for the current (or specified) domain
    • Get-Forest → returns the forest object for the current (or specified) forest
    • Get-ForestDomain → return all domains for the current (or specified) forest
    • Get-ForestGlobalCatalog → return all global catalogs for the current (or specified) forest
    • Find-DomainObjectPropertyOutlier → inds user/group/computer objects in AD that have 'outlier' properties set
    • Get-DomainUser → return all users or specific user objects in AD
    • New-DomainUser → creates a new domain user (assuming appropriate permissions) and returns the user object
    • Set-DomainUserPassword → sets the password for a given user identity and returns the user object
    • Get-DomainUserEvent → enumerates account logon events (ID 4624) and Logon with explicit credential events
    • Get-DomainComputer → returns all computers or specific computer objects in AD
    • Get-DomainObject → returns all (or specified) domain objects in AD
    • Set-DomainObject → modifies a gven property for a specified active directory object
    • Get-DomainObjectAcl → returns the ACLs associated with a specific active directory object
    • Add-DomainObjectAcl → adds an ACL for a specific active directory object
    • Find-InterestingDomainAcl → finds object ACLs in the current (or specified) domain with modification rights set to non-built in objects
    • Get-DomainOU → search for all organization units (OUs) or specific OU objects in AD
    • Get-DomainSite → search for all sites or specific site objects in AD
    • Get-DomainSubnet → search for all subnets or specific subnets objects in AD
    • Get-DomainSID → returns the SID for the current domain or the specified domain
    • Get-DomainGroup → return all groups or specific group objects in AD
    • New-DomainGroup → creates a new domain group (assuming appropriate permissions) and returns the group object
    • Get-DomainManagedSecurityGroup → returns all security groups in the current (or target) domain that have a manager set
    • Get-DomainGroupMember → return the members of a specific domain group
    • Add-DomainGroupMember → adds a domain user (or group) to an existing domain group, assuming appropriate permissions to do so
    • Get-DomainFileServer → returns a list of servers likely functioning as file servers
    • Get-DomainDFSShare → returns a list of all fault-tolerant distributed file systems for the current (or specified) domain
    • Get-NetLocalGroup → enumerates the local groups on the local (or remote) machine
    • Get-NetLocalGroupMember → enumerates members of a specific local group on the local (or remote) machine
    • Get-NetShare → returns open shares on the local (or a remote) machine
    • Get-NetLoggedon → returns users logged on the local (or a remote) machine
    • Get-NetSession → returns session information for the local (or a remote) machine
    • Get-RegLoggedOn → returns who is logged onto the local (or a remote) machine through enumeration of remote registry keys
    • Get-NetRDPSession → returns remote desktop/session information for the local (or a remote) machine
    • Test-AdminAccess → rests if the current user has administrative access to the local (or a remote) machine
    • Get-NetComputerSiteName → returns the AD site where the local (or a remote) machine resides
    • Get-WMIRegProxy → enumerates the proxy server and WPAD conents for the current user
    • Get-WMIRegLastLoggedOn → returns the last user who logged onto the local (or a remote) machine
    • Get-WMIRegCachedRDPConnection → returns information about RDP connections outgoing from the local (or remote) machine
    • Get-WMIRegMountedDrive → returns information about saved network mounted drives for the local (or remote) machine
    • Get-WMIProcess → returns a list of processes and their owners on the local or remote machine
    • Find-InterestingFile → searches for files on the given path that match a series of specified criteria
    • Find-DomainUserLocation → finds domain machines where specific users are logged into
    • Find-DomainProcess → finds domain machines where specific processes are currently running
    • Find-DomainUserEvent → finds logon events on the current (or remote domain) for the specified users
    • Find-DomainShare → finds reachable shares on domain machines
    • Find-InterestingDomainShareFile → searches for files matching specific criteria on readable shares in the domain
    • Find-LocalAdminAccess → finds machines on the local domain where the current user has local administrator access
    • Find-DomainLocalGroupMember → enumerates the members of specified local group on machines in the domain
    • Get-DomainTrust → returns all domain trusts for the current domain or a specified domain
    • Get-ForestTrust → returns all forest trusts for the current forest or a specified forest
    • Get-DomainForeignUser → enumerates users who are in groups outside of the user's domain
    • Get-DomainForeignGroupMember → enumerates groups with users outside of the group's domain and returns each foreign member
    • Get-DomainTrustMapping → this function enumerates all trusts for the current domain and then enumerates all trusts for each domain it finds

  Soluciones

Motor de exploración mínimo 9.800
Archivo de patrones de SSAPI: 2.722.00
Fecha de publicación del patrón SSAPI 25 de abril de 2024

Step 1

Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploración, deben comprobar que tienen desactivada la opción Restaurar sistema para permitir la exploración completa del equipo.

Step 2

Explorar el equipo con su producto de Trend Micro para eliminar los archivos detectados como HackTool.PS1.PowerView.D En caso de que el producto de Trend Micro ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta página de Base de conocimientos para obtener más información.


Rellene nuestra encuesta!