Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suspicious behavior #287

Closed
3 of 4 tasks
Serpher1 opened this issue Oct 29, 2021 · 4 comments
Closed
3 of 4 tasks

Suspicious behavior #287

Serpher1 opened this issue Oct 29, 2021 · 4 comments

Comments

@Serpher1
Copy link

Serpher1 commented Oct 29, 2021

Prerequisites

Steps to reproduce

So, care to explain why your script tries to embed Rozena_GenA malware tool while running? I'm talking about weird dll's generating in temp folder.

Screenshot

@farag2
Copy link
Owner

farag2 commented Oct 29, 2021

Why suspicious? :D
Please provide the whole folder from which you ran the script.

Now if serious...

Rozena_GenA malware tool while running

Why Rozena_GenA?

As you may see

	$Signature = @{
		Namespace        = "WinAPI"
		Name             = "GetStr"
		Language         = "CSharp"
		MemberDefinition = @"
[DllImport("kernel32.dll", CharSet = CharSet.Auto)]
public static extern IntPtr GetModuleHandle(string lpModuleName);
[DllImport("user32.dll", CharSet = CharSet.Auto)]
internal static extern int LoadString(IntPtr hInstance, uint uID, StringBuilder lpBuffer, int nBufferMax);
public static string GetString(uint strId)
{
	IntPtr intPtr = GetModuleHandle("shell32.dll");
	StringBuilder sb = new StringBuilder(255);
	LoadString(intPtr, strId, sb, sb.Capacity);
	return sb.ToString();
}
"@
}
if (-not ("WinAPI.GetStr" -as [type]))
{
    Add-Type @Signature -Using System.Text
}

PowerShell tried to complied this code using .cs files in the temp folder (yes, literally. It can do it), but failed. I don't know why your OS "have access to this path" (I translated it). The code is very simple, and has been using for about 3 years. Do you have an admin access to this folder (%TEMP%)?

@farag2
Copy link
Owner

farag2 commented Oct 30, 2021

So?..

@farag2 farag2 closed this as completed Oct 30, 2021
@Serpher1
Copy link
Author

It is on admin account and run with admin privileges but ESET classified this as rozena trojan.

@farag2
Copy link
Owner

farag2 commented Oct 30, 2021

This is very funny. Report ESET that's a false positive. I can't fix it. The error is very simple: you have no access to this folder...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants