Concrete signature match: Exploit - Takes advantage of software vulnerabilities for 64-bit Windows platform, family Sandsquarev
Exploit:Win64/Sandsquarev!rfn is a critical threat that gains execution on a system, likely through a browser exploit. It uses multiple native Windows tools ('Living off the Land' binaries like mshta, rundll32, and schtasks) to establish persistence, evade detection, and download additional malicious payloads.
Relevant strings associated with this threat:
- {0afaced1-e828-11d1-9187-b532f1e9575d}\ (PEHSTR_EXT)
- \target.lnk (PEHSTR_EXT)
- <html><body><script> (PEHSTR_EXT)
- </script></body></html> (PEHSTR_EXT)
- \Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe (PEHSTR_EXT)
- _neutral__8wekyb3d8bbwe\ (PEHSTR_EXT)
- :\windows\win.ini (PEHSTR_EXT)
- \settings\settings.dat (PEHSTR_EXT)
- schtasks /change /TN " (PEHSTR_EXT)
- " /RU (PEHSTR_EXT)
- /RP (PEHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)95e4f2e823be17ac9131c2375cc70fde0ef0c7ea5acbee34e359d5094408284f1. Isolate the affected machine from the network immediately to prevent lateral movement. 2. Ensure antivirus signatures are updated and perform a full system scan to remove all detected components. 3. Manually inspect and remove malicious Scheduled Tasks. 4. Due to the nature of the exploit, a full system re-image from a known-good backup is the most reliable method of remediation.