222. That's How Adversaries Abuse PowerShell to Take Screenshots Quietly

Hello everyone!

We haven't talked about abusing PowerShell for some time. But let's do it again today as I spotted an interesting example. And we'll look at the following technique - Screen Capture (T1113).

Let's look at Efimer Trojan described in this report. The malware uses the following PowerShell command to capture screenshots:

powershell.exe -NoProfile -WindowStyle Hidden -Command "$scale = 1.25; Add-Type -AssemblyName System.Drawing; Add-Type -AssemblyName System.Windows.Forms; $sw = [System.Windows.Forms.SystemInformation]::VirtualScreen.Width; $sh = [System.Windows.Forms.SystemInformation]::VirtualScreen.Height; $w = [int]($sw * $scale); $h = [int]($sh * $scale); $bmp = New-Object Drawing.Bitmap $w, $h; $g = [Drawing.Graphics]::FromImage($bmp); $g.ScaleTransform($scale, $scale); $g.CopyFromScreen(0, 0, 0, 0, $bmp.Size); $bmp.Save(\'' + path.replace(/\\/g, '\\\\') + '\', [Drawing.Imaging.ImageFormat]::Png); ' + '$g.Dispose(); $bmp.Dispose();"

For example, we can use CopyFromScreen method to build our hunting query:

event_type: "processcreatewin"

AND

proc_file_path: "powershell.exe"

AND

cmdline: "CopyFromScreen"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge