Concrete signature match: PUA for 32-bit Windows platform, family Packunwan
PUA:Win32/Packunwan is a sophisticated Potentially Unwanted Application (PUA) detected with concrete signatures. It exhibits extensive capabilities for system compromise, including process hooking, leveraging legitimate Windows utilities for execution and persistence (e.g., mshta, regsvr32, rundll32, PowerShell, scheduled tasks), and functionalities for remote file operations, data encoding, and file deletion. This PUA poses a significant risk due to its deep system manipulation and evasion techniques.
Relevant strings associated with this threat: - *=s\< (SNID) - dDH\"i (SNID) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
2e6346ce1adf15bffca31a0c96274f615e3e0bbf53235e4b4c85555bc012b9d93d06251735184814c5eb1f1b3825ee005073e1e53cbbd4ec01d2a44c2e603315Immediately isolate the affected system from the network. Perform a full system scan with updated antivirus/anti-malware software, remove all detected components, and review system logs for any signs of further compromise or persistence mechanisms (e.g., scheduled tasks, registry modifications). Consider a system re-image if deep infection is suspected.