CyberThreatIntel/Russia/APT/Gamaredon/06-08-19/Malware analysis 06-08-19.md
2019-08-24 03:06:45 +02:00

8.0 KiB

Malware analysis on Gamaredon APT campaign (06-08-19)

Table of Contents

Malware-analysis

Initial vector

The SFX archive executes for get system informations and the architecture in using the function GetNativeSystemInfo and Getsysteminfo who are using for know the good parameters for the SFX installer.

alt text alt text

Once this done, this show a fake window of Word in using riche020.dll method. Define the language of thread in Russian.The execution of the code is do in another thread who run the malicious parts in the background.

alt text

We can observe a trace of a capacity to extract a lnk file which are used in a similar sample.

alt text

This drops the cmd file and PE file as txt file in the temp folder with a random name.

alt text

Finally, this execute by call shell and runas the cmd file.

alt text

VBS and Powershell script

Its create the vbs and ps1 file by redirection of the console output. By the DOS commands, this create a schedule task as persistence, modify the proxy settings, execute the files, launch the fake document and delete all the files as anti-forensic method.

alt text

The vbs file check the version of Word and disable some security features.

alt text

The powershell script collect the system informations and edit the proxy seetings and the url send to the C2 with the GUID of the computer.

alt text

We can see on the obfuscated strings, that some patterns have been generated and randomized by a DOS obfuscate tool.

alt text

Like observed with muddywater group, this repeats until the group edit a URL with the next payload if the target is interesting.

Final PE

We can see that the file have the capacity to parse a FTP share and perform the current action (upload/download)

alt text

We can observe too that the payload can receive a proxy configuration and parse it too.

alt text

A progress bar can be observe wh o indicate that the PE can show the status of the operations

alt text

This PE file uses the OpenSSL, SMTP, FTP and various algorithms libraries in C, this a compiled version of Wget.

alt text

We can parse and see all the algoritms available for Wget

alt text

This check the connectivity to internet by requesting the DNS of Google and use the shellscript.exe for try to download by the edited URL. This version of Wget is used on many campaigns of this group since 2017.

Cyber kill chain

The process graph resume the cyber kill chain used by the attacker.

alt text

Cyber Threat Intel

The C2 is host by a provider in Russia.This seems be a sample of the campaign of Gamaredon group in June 2018 by the very similar TTPs.

alt text

References MITRE ATT&CK Matrix

List of all the references with MITRE ATT&CK Matrix
Enterprise tactics Technics used Ref URL
Execution T1059 - Starts CMD.EXE for commands execution
T1106 - Execution through API
T1053 - Scheduled Task
T1064 - Scripting
https://attack.mitre.org/techniques/T1059
https://attack.mitre.org/techniques/T1106
https://attack.mitre.org/techniques/T1053
https://attack.mitre.org/techniques/T1064
Persistence T1053 - Scheduled Task https://attack.mitre.org/techniques/T1053
Privilege Escalation T1053 - Scheduled Task https://attack.mitre.org/techniques/T1053
Defense Evasion T1112 - Modify Registry
T1064 - Scripting
https://attack.mitre.org/techniques/T1112
https://attack.mitre.org/techniques/T1064
Discovery T1012 - Query Registry https://attack.mitre.org/techniques/T1012

Indicators Of Compromise (IOC)

List of all the Indicators Of Compromise (IOC)
Indicator Description
02013f0c6767eb7f0538510ba6ede0103e797fa7b9bc2733d00e3710702fdf1c.scr 02013f0c6767eb7f0538510ba6ede0103e797fa7b9bc2733d00e3710702fdf1c
FDGSKGN.vbs 630c0c86faf828bc4645526ca58b855d1a2db57cca0e406c1d5b7e2de88a1322
PowerShellCertificates_C4BA3647.ps1 8f33ce796ee08525d32f5794ebd355914140e43e4b63e09b384dabda93a8b22c
9856.txt a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599
176.57.215.22 IP C2
http[:]//shell-create.ddns.net/ URL request
shell-create.ddns.net Domain C2
This can be exported as JSON format Export in JSON