Concrete signature match: Virus Tool - Tool used to create or modify malware for .NET (Microsoft Intermediate Language) platform, family Aikaantivm
VirTool:MSIL/Aikaantivm!rfn is a sophisticated tool, likely written in MSIL, designed for evasion, persistence, and complex execution on Windows systems. It utilizes multiple techniques including modifying autorun keys, creating scheduled tasks and BITS jobs, executing code via MSHTA, Regsvr32, Rundll32, and PowerShell, and employs API hooking for further stealth and control. The threat also shows capabilities for system information gathering, data encoding, and remote file operations, indicating a significant risk for system compromise.
Relevant strings associated with this threat: - Software\Microsoft\Windows\CurrentVersion\Run (PEHSTR_EXT) - Select * from Win32_ComputerSystem (PEHSTR_EXT) - SbieDll.dll (PEHSTR_EXT) - cmdvrt32.dll (PEHSTR_EXT) - SxIn.dll (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Immediately isolate the affected system from the network. Perform a full, deep scan using updated antivirus/antimalware software. Investigate and remove all identified persistence mechanisms (Run keys, Scheduled Tasks, BITS jobs). Review system logs for unusual process executions (mshta, powershell, rundll32, regsvr32) and network connections. Apply all pending security updates and patches to the operating system and applications.