217. Detecting PXA Stealer's Behavior Markers

Hello everyone!

Let's talk about stealers again. This time about PXA stealer. It's a Python-based stealer emerged in in late 2024.

Let's look at a few behavior markers covered in a joint report by SentinelOne and Beazley Security.

The first one - misusing certutil.exe to to decode a masquaraded file into a new encrypted archive:

certutil -decode Document.pdf Invoice.pdf

It's not common for this utility to decode PDF files, so we can use it to build our logic:

event_type: "processcreatewin"

AND

proc_file_path: "certutil.exe"

AND

cmdline: ("decode" AND *pdf)

The next behavior - abusing renamed WinRAR executable to unpack the archive:

images.png x -ibck -y -poX3ff7b6Bfi76keXy3xmSWnX0uqsFYur Invoice.pdf C:\\Users\\Public

Of course, here we can hunt for renamed executables:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "WinRAR.exe"

AND NOT

proc_file_path: *winrar*

Make sure to check the report - you can find more interesting behaviors!

See you tomorrow!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

163. A Curious Case of Iediagcmd.exe Abuse