CyberThreatIntel/Israel/APT/Unknown/26-08-19/Malware analysis 26-08-19.md
2019-09-04 02:55:56 +02:00

5.8 KiB

Malware analysis about unknown Israel APT campaign

Table of Contents

Malware analysis

Initial vector

The initial vector use an SFX executable, who drop a lnk file for the persistence, a vbs file and the docx file for decoys the victim.

alt text

We can also note the multiples possiblities for push the persisitence and options.

alt text

This execute the vbs file for push the persistence in the startup menu, hide it in changing these atributes and launch the persistence (lnk file)

alt text

This download the VB script and execute it by mshta call.

alt text

On the VB code, we can observed that use BITS fonctionality for download by a job the JS script to execute on the victim. Secondly, this check the architecture of the system and execute the correct path of wscript and push the windows out the screen.

Loader

We can see that use function for decode the commands with a array of bytes.

alt text

For decode the string , we use the next function used by the backdoor for decode the commands.

alt text

You can now change the encoded commands.

alt text

Once the encoded strings removed, we have the following code :

alt text As anti-forensic method, a method which can know if determiner if a debugger is present. alt text

Finally, we can observe a Wscript execution with a function splter which split for get a array of byte, convert to ASCII and after execute the script with execute call.

JS Backdoor

By the following PowerShell script, we can get the second layer that is the JS Backdoor.

alt text

Firstly,

C4BA3647<|>USER-PC<|>admin<|>Microsoft Windows 7 Professional <|>plus<|>nan-av<|> (Here from the Anyrun sandbox)

We can note that the USB spread option isn't used on this sample.The structure of the reply to the C2 is the next :

[volumeserialnumber]<|>[computername]<|>[username]<|>plus<|>[AV product (yes -> name or no ->nan-av)]<|>[usbspreading option (= "")]<|>

We can resume the list of commands of the backdoor :
Command Description
execute execute a command DOS/Powershell
send Download a file to execute
site-send Function don't exist but have the same arg that send command, seems be edited function of site-send and not deleted ?
recv Read a file, put in a buffer and send to the C2
enum-driver Send the list of drives to the C2
enum-faf Get list of the folders, files and attributes and send it to the C2
enum-process Get list of the process (name, id, path of the executable) and send it on the C2
delete Function don't exist but by the params seems give to the attacker to delete folders or files
exit-process Kill the backdoor process but can't remove the persistence, an "execute" command must be performed before for delete it in the registry

Cyber kill chain

The process graph resume the cyber kill chain used by the attacker.

alt text

Cyber Threat Intel

References MITRE ATT&CK Matrix

List of all the references with MITRE ATT&CK Matrix
Enterprise tactics Technics used Ref URL

Indicators Of Compromise (IOC)

List of all the Indicators Of Compromise (IOC)
Indicator Description
Domain requested
IP requested
HTTP/HTTPS requests
IP C2
Domain C2
Original tweet: https://twitter.com/Timele9527/status/1166188375109296128
Documents: