Date: 2025-10-03

Threat Classification: Backdoor / Remote Access Trojan (RAT)


1. Executive Summary

This report details the analysis of a sophisticated backdoor discovered on a Windows system. The malware, identified by its scheduled task name \\\\Microsoft\\\\Windows\\\\Device Information\\\\DeviceIvl, utilizes advanced techniques for persistence, command-and-control (C2) communication, and self-protection. The malware's primary function is to provide a remote attacker with arbitrary command execution capabilities on the infected system.

Due to the malware's advanced self-protection mechanisms, which involve modifying system permissions, removal from a live system was not possible. This report provides detailed instructions for manual removal in a recovery environment.

2. Technical Analysis

2.1. Persistence

The malware achieves persistence through two primary mechanisms:

2.2. Execution

The scheduled task executes the following PowerShell command:

$ExecutionContext.InvokeCommand.InvokeScript($env:934ff675)

This command retrieves the content of the environment variable 934ff675 and executes it as a PowerShell script. The environment variable is loaded from the registry key HKEY_LOCAL_MACHINE\\\\SYSTEM\\\\CurrentControlSet\\\\Control\\\\Session Manager\\\\Environment\\\\934ff675.

2.3. Decryption

The content of the environment variable is a PowerShell command that decrypts and executes the payload stored in HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\CommsAPHost\\\\934ff675. The decryption is performed using the AES algorithm with a hardcoded key and initialization vector (IV).

2.4. Decrypted Payload Analysis