Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Msposer
This is a concrete detection of Trojan:Win32/Msposer!rfn, a sophisticated Trojan designed to compromise systems. It leverages Windows utilities like mshta, regsvr32, rundll32, PowerShell, and BITSJobs for execution, persistence, process hooking, and establishes communication with remote domains such as cnzz.com and huifeidezhu.com for command and control or data exfiltration.
Relevant strings associated with this threat:
- \Temporary Projects\Chrome\obj\x86\Debug\Chrome.pdb (PEHSTR_EXT)
- //s14.cnzz.com/stat.php?id=4730427&web_id=4730427 (PEHSTR_EXT)
- /stat/game.php?type= (PEHSTR_EXT)
- www.huifeidezhu.com (PEHSTR_EXT)
- \ext\settings\{11f09afe-75ad-4e52-ab43-e09e9351ce17} (PEHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)cb96e017cf51e48f24af1b8883ebb84b5c5a7619fcde9ac2bcc2e3f31b0afa5f52f792fed8702ecd94a43f792804fada6e5ce328e5feef859a98a71ef1e592860f47be922777d7d7fb8e6ce5076deb4a4ca03f28b9f80e74adc6f50d4e23e1d7f5c091430ce76194de873767293b519c5635842b9f93d02d51038ce43787d8db613c7fe0d1c5cd63ef216aa976b95c0f682e3244e14d048666e3b6e106816890Immediately isolate the affected system, perform a full antivirus scan to remove the Trojan and all associated components. Investigate for persistence mechanisms (e.g., scheduled tasks, modified registry entries) and potential data exfiltration. Reset all user and administrative credentials on the compromised system.