HackTool.PS1.PowerView.SM

 Analysis by: Raymart Christian Yambot

 ALIASES:

PowerShell/RiskWare.PowerSploit.BU application (NOD32)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Hacking Tool

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Downloaded from the Internet, Dropped by other malware

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

472,470 bytes

Memory Resident:

No

Initial Samples Received Date:

19 Apr 2024

Arrival Details

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Other Details

This Hacking Tool does the following:

  • It accepts the following commands and actions:
    • Export-PowerViewCSV → thread-safe CSV append
    • Resolve-IPAddress → resolves a hostname to an IP
    • ConvertTo-SID → converts a given user/group name to a security identifier (SID)
    • Convert-ADName → converts object names between a variety of formats
    • ConvertFrom-UACValue → converts a UAC int value to human readable form
    • Add-RemoteConnection → pseudo "mounts" a connection to a remote path using the specified credential object
    • Remove-RemoteConnection → destroys a connection created by New-RemoteConnection
    • Invoke-UserImpersonation → creates a new "runas /netonly" type logon and impersonates the token
    • Invoke-RevertToSelf → reverts any token impersonation
    • Get-DomainSPNTicket → request the kerberos ticket for a specified service principal name (SPN)
    • Invoke-Kerberoast → requests service tickets for kerberoast-able accounts and returns extracted ticket hashes
    • Get-PathAcl → get the ACLs for a local/remote file path with optional group recursion
    • Get-DomainDNSZone → enumerates the Active Directory DNS zones for a given domain
    • Get-DomainDNSRecord → enumerates the Active Directory DNS records for a given zone
    • Get-Domain → returns the domain object for the current (or specified) domain
    • Get-DomainController → return the domain controllers for the current (or specified) domain
    • Get-Forest → returns the forest object for the current (or specified) forest
    • Get-ForestDomain → return all domains for the current (or specified) forest
    • Get-ForestGlobalCatalog → return all global catalogs for the current (or specified) forest
    • Find-DomainObjectPropertyOutlier → inds user/group/computer objects in AD that have 'outlier' properties set
    • Get-DomainUser → return all users or specific user objects in AD
    • New-DomainUser → creates a new domain user (assuming appropriate permissions) and returns the user object
    • Set-DomainUserPassword → sets the password for a given user identity and returns the user object
    • Get-DomainUserEvent → enumerates account logon events (ID 4624) and Logon with explicit credential events
    • Get-DomainComputer → returns all computers or specific computer objects in AD
    • Get-DomainObject → returns all (or specified) domain objects in AD
    • Set-DomainObject → modifies a gven property for a specified active directory object
    • Get-DomainObjectAcl → returns the ACLs associated with a specific active directory object
    • Add-DomainObjectAcl → adds an ACL for a specific active directory object
    • Find-InterestingDomainAcl → finds object ACLs in the current (or specified) domain with modification rights set to non-built in objects
    • Get-DomainOU → search for all organization units (OUs) or specific OU objects in AD
    • Get-DomainSite → search for all sites or specific site objects in AD
    • Get-DomainSubnet → search for all subnets or specific subnets objects in AD
    • Get-DomainSID → returns the SID for the current domain or the specified domain
    • Get-DomainGroup → return all groups or specific group objects in AD
    • New-DomainGroup → creates a new domain group (assuming appropriate permissions) and returns the group object
    • Get-DomainManagedSecurityGroup → returns all security groups in the current (or target) domain that have a manager set
    • Get-DomainGroupMember → return the members of a specific domain group
    • Add-DomainGroupMember → adds a domain user (or group) to an existing domain group, assuming appropriate permissions to do so
    • Get-DomainFileServer → returns a list of servers likely functioning as file servers
    • Get-DomainDFSShare → returns a list of all fault-tolerant distributed file systems for the current (or specified) domain
    • Get-NetLocalGroup → enumerates the local groups on the local (or remote) machine
    • Get-NetLocalGroupMember → enumerates members of a specific local group on the local (or remote) machine
    • Get-NetShare → returns open shares on the local (or a remote) machine
    • Get-NetLoggedon → returns users logged on the local (or a remote) machine
    • Get-NetSession → returns session information for the local (or a remote) machine
    • Get-RegLoggedOn → returns who is logged onto the local (or a remote) machine through enumeration of remote registry keys
    • Get-NetRDPSession → returns remote desktop/session information for the local (or a remote) machine
    • Test-AdminAccess → rests if the current user has administrative access to the local (or a remote) machine
    • Get-NetComputerSiteName → returns the AD site where the local (or a remote) machine resides
    • Get-WMIRegProxy → enumerates the proxy server and WPAD conents for the current user
    • Get-WMIRegLastLoggedOn → returns the last user who logged onto the local (or a remote) machine
    • Get-WMIRegCachedRDPConnection → returns information about RDP connections outgoing from the local (or remote) machine
    • Get-WMIRegMountedDrive → returns information about saved network mounted drives for the local (or remote) machine
    • Get-WMIProcess → returns a list of processes and their owners on the local or remote machine
    • Find-InterestingFile → searches for files on the given path that match a series of specified criteria
    • Find-DomainUserLocation → finds domain machines where specific users are logged into
    • Find-DomainProcess → finds domain machines where specific processes are currently running
    • Find-DomainUserEvent → finds logon events on the current (or remote domain) for the specified users
    • Find-DomainShare → finds reachable shares on domain machines
    • Find-InterestingDomainShareFile → searches for files matching specific criteria on readable shares in the domain
    • Find-LocalAdminAccess → finds machines on the local domain where the current user has local administrator access
    • Find-DomainLocalGroupMember → enumerates the members of specified local group on machines in the domain
    • Get-DomainTrust → returns all domain trusts for the current domain or a specified domain
    • Get-ForestTrust → returns all forest trusts for the current forest or a specified forest
    • Get-DomainForeignUser → enumerates users who are in groups outside of the user's domain
    • Get-DomainForeignGroupMember → enumerates groups with users outside of the group's domain and returns each foreign member
    • Get-DomainTrustMapping → this function enumerates all trusts for the current domain and then enumerates all trusts for each domain it finds

  SOLUTION

Minimum Scan Engine:

9.800

SSAPI PATTERN File:

2.723.00

SSAPI PATTERN Date:

02 May 2024

Step 1

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 2

Scan your computer with your Trend Micro product to delete files detected as HackTool.PS1.PowerView.SM. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.