Windows CryptoAPI Spoofing Vulnerability CVE-2020-0601

NSA has discovered a critical vulnerability affecting Microsoft Windows cryptographic functionality. A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. The vulnerability affects Windows 10 and Windows Server 2016/2019 as well as applications that rely on Windows for trust functionality.

Microsoft released a patch today for Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601) and urges that everyone update their systems as quickly as possible.

A successful exploit could allow the attacker to
(1) Sign a malicious executable, making it appear the file was from a trusted, legitimate source; the user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider.
Or
(2) Conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.

SonicWall Capture Labs Threat Research team provides protection against this vulnerability with the following signatures:
IPS 14728:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 1
IPS 14729:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 2
IPS 14730:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 3
IPS 14731:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 4

Microsoft Security Bulletin Coverage for Jan 2020

SonicWall Capture Labs Threat Research Team has analyzed and addressed Microsoft’s security advisories for the month of January 2020. A list of issues reported, along with SonicWall coverage information are as follows:

CVE-2020-0601 Windows CryptoAPI Spoofing Vulnerability
IPS 14728:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 1
IPS 14729:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 2
IPS 14730:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 3
IPS 14731:Windows CryptoAPI Spoofing Vulnerability (JAN 20) 4

CVE-2020-0602 ASP.NET Core Denial of Service Vulnerability
There are no known exploits in the wild.
CVE-2020-0603 ASP.NET Core Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0605 .NET Framework Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0606 .NET Framework Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0607 Microsoft Graphics Components Information Disclosure Vulnerability
There are no known exploits in the wild.
CVE-2020-0608 Win32k Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2020-0609 Windows RDP Gateway Server Remote Code Execution Vulnerability
IPS 14723:Windows RDP Gateway Server Remote Code Execution Vulnerability (JAN 20) 1

CVE-2020-0610 Windows RDP Gateway Server Remote Code Execution Vulnerability
IPS 14724:Windows RDP Gateway Server Remote Code Execution Vulnerability (JAN 20) 2

CVE-2020-0611 Remote Desktop Client Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0612 Windows Remote Desktop Protocol (RDP) Gateway Server Denial of Service Vulnerability
There are no known exploits in the wild.
CVE-2020-0613 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0614 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0615 Windows Common Log File System Driver Information Disclosure Vulnerability
There are no known exploits in the wild.
CVE-2020-0616 Microsoft Windows Denial of Service Vulnerability
There are no known exploits in the wild.
CVE-2020-0617 Hyper-V Denial of Service Vulnerability
There are no known exploits in the wild.
CVE-2020-0620 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0621 Windows Security Feature Bypass Vulnerability
There are no known exploits in the wild.
CVE-2020-0622 Microsoft Graphics Component Information Disclosure Vulnerability
There are no known exploits in the wild.
CVE-2020-0623 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0624 Win32k Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0625 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0626 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0627 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0628 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0629 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0630 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0631 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0632 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0633 Windows Search Indexer Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2020-0634 Windows Common Log File System Driver Elevation of Privilege Vulnerability
ASPY 5871:Malformed-File exe.MP.116

CVE-2020-0635 Windows Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0636 Windows Subsystem for Linux Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0637 Remote Desktop Web Access Information Disclosure Vulnerability
There are no known exploits in the wild.
CVE-2020-0638 Update Notification Manager Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0639 Windows Common Log File System Driver Information Disclosure Vulnerability
There are no known exploits in the wild.
CVE-2020-0640 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild.
CVE-2020-0641 Microsoft Windows Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0642 Win32k Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0643 Windows GDI+ Information Disclosure Vulnerability
There are no known exploits in the wild.
CVE-2020-0644 Windows Elevation of Privilege Vulnerability
There are no known exploits in the wild.
CVE-2020-0646 .NET Framework Remote Code Execution Injection Vulnerability
There are no known exploits in the wild.
CVE-2020-0647 Microsoft Office Online Spoofing Vulnerability
There are no known exploits in the wild.
CVE-2020-0650 Microsoft Excel Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0651 Microsoft Excel Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0652 Microsoft Office Memory Corruption Vulnerability
There are no known exploits in the wild.
CVE-2020-0653 Microsoft Excel Remote Code Execution Vulnerability
There are no known exploits in the wild.
CVE-2020-0654 Microsoft OneDrive for Android Security Feature Bypass Vulnerability
There are no known exploits in the wild.
CVE-2020-0656 Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability
There are no known exploits in the wild.

Bett 2020: SonicWall Showcases Cybersecurity Solutions for Educational Institutions

On Jan. 22-25, Bett 2020, the first education technology industry show of the year, will bring together people from more than 146 countries in the global education community under one roof at the ExCeL London. With 800 leading companies, 103 exciting new EdTech startups and over 34,000 attendees, Bett 2020 is a must-attend show in the event calendar for the global EdTech market.

SonicWall will be at the event, showcasing our cybersecurity solutions for educational institutions. The internet is now a central part of student’s learning experience, with students and faculty members at all levels relying on internet access and learning delivery through phones, tablets and laptops. Due to the highly sensitive nature of the data in their systems, education IT infrastructure is a prime target for cybercriminals.

SonicWall at Bett 2020

Stand NM57
Jan. 22-25, 2020 | ExCeL London

Educators are under attack

The last 12 months saw a deluge of ransomware attacks that have taken down schools across the globe. In 2019, the National Cyber Security Centre completed an audit of 432 schools in the UK and found the following.

  • 97% of the surveyed schools said that losing access to network-connected information technology services would cause considerable disruption
  • 83% of the schools had experienced at least one type of cybersecurity incident in the last year
  • Less than half the schools (49%) were confident that they are adequately prepared in the event of a cyberattack

In 99% of the cases where these cybersecurity incidents and concerns were reported, the schools involved had anti-virus and firewall protections in place.

It seems that cybercriminals are not even deterred by a University’s cybersecurity credentials as was seen in the brazen attack on Lancaster University, which offers a GCHQ-accredited degree in security. In July, a malicious phishing attack and subsequent data breach at the University resulted in the leak of over 12,000 prospective student’s personal data. Hackers are increasingly creating sophisticated fake websites for the Universities they target, with Warwick University suffering a similar attack.

It’s not just higher education institutions that are under attack in the UK. In October 2019, a Wakefield secondary school suffered a ransomware attack which forced the schools temporary closure while staff attempted to restore their registering, monitoring and safeguarding systems.

SonicWall: a security leader in the education sector

SonicWall provides cost-effective campus-wide cybersecurity without compromising performance. With SonicWall, IT professionals in the education sector can:

Meet SonicWall at Bett 2020

Take the opportunity at Bett to talk to a SonicWall expert about your cybersecurity needs. Register now for a one to one meeting with the SonicWall education team.

About Bett 2020

This three-day event brings together representatives from over 146 countries, including 800 EdTech leaders, 150 content sessions, and exclusive networking opportunities and business meetings. This show has an international audience, with summit events held in the Middle East, Asia and Latin America. To learn more about BETT 2020, or to register for the event, visit https://www.bettshow.com/about-bett.

APT 33, 34, 35, 39, Destructive ZeroClear

Overview:

SonicWall Capture Labs Threat Research Team has been actively monitoring APT33, APT34, APT35, APT39, and tracking destructive malware in the Middle East and has found ZeroClear along with other destructive malware this week. The groups above are primarily focused on financial, energy, telecom, and SCADA/ICS computer systems. Most recently, APT33, Iran’s most potent cyber-criminal group, was found probing physical control systems used in electric utilities, manufacturing, and oil refineries using password-spraying attacks.

APT 33 is associated with Elfin, APT33 is a suspected Iranian threat group that has carried out operations since 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors.

The ZeroClear trojan is a disk-wiping virus. When executed, it will try to overwrite the Master Boot Record (MBR) and disk partitions on Microsoft Windows based systems. It can execute on x86 or x64 computer systems, today we will focus on the x86 version as most industrial controllers are still running older operating systems. ZeroClear goes by two names on the world wide web. One is called ZeroClear and the other is called ZeroCleare with an e. We will be using the .pdb name below with no e added to the end.

Other related samples to ZeroClear are Dustman, and Shamoon.

Sample Static Information:

As we look through the PE File format in your favorite tool. We are searching for data that is corrupted. This will be highlighted in red in CFF Explorer. Within the GIF below we see no red. This tells us we have a complete sample that has no corruption from a memory dump. This makes analysis easier. As we don’t have to rebuild a memory dump.

PDB Information:

The solution is named: ZeroCeare32 and the project is named zeroclear as stated below:

If we translate the solution name we get:

Some comedy is in order: “What’s the matter did you loose all your files?”

Starting Routine:

As we open the sample in Ida Pro we are confronted with one call and one jump. This code is obfuscated so we just have to manually step through it.

After manually stepping the file you will start to see the malware unpack itself and reach human readable code:

Driver Component:

The elrawdsk.sys driver is a software component of EldoS RawDisk by EldoS. The EldoS RawDisk is a tool that allows applications direct access to hard-drive and flash-disk partitions. EldoS RawDisk enables user-mode application processes to bypass security restrictions laid down by Microsoft and access raw disk data sector by sector, access files and folders with restricted security settings. The application was designed to assist the development of forensic, and data recovery software.

ElRawDsk stands for EldoS RawDisk Driver

Starting Soy Disk Service:

The application name parameter of CreateProcess is built as follows:

The command that will be built for application cmd is as follows:

We can see the completed CreateProcess call and its parameters in IDA Pro:

At last we start the service:

Next, it will activate the disk management device driver by opening a file handle via a unique filename using the logical drive name. The file names format requested by the API CreateFileW must start with a # character followed by the license key issued to the developer by EldoS. The format will look like:
\\?\ElRawDisk\??\(physical drive):#[EldoS License Below].

Logical Drives:

Gathering the currently available disk drives such as Drive A, and Drive C:

EldoS RawDisk Driver License Key:

Driver Control Codes

One of the secrets to knowing what’s inside the buffers when the user-mode application speaks with a kernel driver is the associated I/O control code (also known as an IOCTL Code).

Control codes used in this malware:

  • 0x70000 – IOCTL_DISK_GET_DRIVE_GEOMETRY – Retrieves information about the physical disk’s geometry: type, number of cylinders, tracks per cylinder, sectors per track, and bytes per sector.
  • 0x700A0 – IOCTL_DISK_GET_DRIVE_GEOMETRY_EX – Retrieves extended information about the physical disk’s geometry: type, number of cylinders, tracks per cylinder, sectors per track, and bytes per sector.
  • 0x7405C – IOCTL_DISK_GET_LENGTH_INFO – Retrieves the length of the specified disk, volume, or partition.
  • 0x560000 – IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS – Retrieves the attributes for a volume.
  • 0x227F80 – UNKNOWN – ???

We can decode the values further by looking into what the driver communication method and access will be:

0x70000

0x700A0

0x7405C

0x560000

0x227F80

What does this mean, well this gives us the format of the associated buffer in user-mode and kernel-mode.

METHOD_BUFFER: (Input vs Output)
Input Buffer = Irp->AssociatedIrp.SystemBuffer
Output Buffer = Irp->AssociatedIrp.SystemBuffer

Input Size = Parameters.DeviceIOControl.InputBufferLength
Output Size = Parameters.DeviceIOControl.OutputBufferLength

Summary:

The samples wiping behavior functioned by creating a buffer of random bytes and used the API DeviceIoControl to send the buffer to the RawDisk driver to write data what would wipe the victim’s logical drives. Other functionality included overwriting the MBR, partitions, and files on the system with random junk data.

SonicWall, (GAV) Gateway Anti-Virus, provides protection against this threat:

  • GAV: Zeroclear.PB.

Appendix:

Sample Hash: 2fc39463b6db44873c9c07724ac28b63cdd72f5863a4a7064883e3afdd141f8d

Dustman malware overwrites logical drives data with "************** Down With Saudi Kingdom, Down With Bin Salman **************"

SonicWall Capture Labs Threats Research team has analyzed Dustman malware whose code has similarity with “ZeroCleare” malware and it is suspected to be developed by Iranian hackers. The malware is a 64-bit console executable which contains three encrypted binary files in resource:

 

On execution, the malware creates a mutex “Down With Bin Salman” and if the mutex is already exist or Operating System (OS) Major Version is less than 6, then the malware skips service creation code and jumps directly to the code which gets the valid drives strings in the system:

 

The malware checks, if VirtualBox installed by checking the presence of registry entry “Software\Oracle\VirtualBox” which does not affect the malware execution. The malware now read resource data for resource id “103” in “RCDATA”. The malware decrypts the resource content by performing xor operation with “7070707070707070h” and writes decypted content into “Current Working Directory (CWD)\elrawdsk.sys”:

 

The malware checks for device “VBoxDrv”, if already present the malware then sends service stop request for services “VBoxUSBMon”, “VBoxNetAdp” and “VBoxNetLwf”:

 

The malware uses modified GitHub available “Turla Driver Loader” for bypassing Windows x64 driver signature enforcement to load malicious unsigned driver. The malware reads resource data for resource id “1” in “RCDATA” and decrypts the resource data to get the modified “Turla Driver Loader” using previously mentioned decryption logic and copy it, to “CWD\assistant.sys”: The malware register “CWD\assistant.sys” as “VBoxDrv” service and starts the service. This modified “Turla Driver Loader” is responsible for loading malicious unsigned driver “CWD\elrawdsk.sys”.

 

The malware now reads resource data for resource id “106” in “RCDATA” and decrypts the resource data using previously mentioned decryption logic and writes the decrypted data to “CWD\agent.exe”:

 

The malware gets the valid logical drives strings in the system and if drive types is either “DRIVE_REMOVABLE” or “DRIVE_FIXED” then the malware executes “CWD\agent.exe” passing each drive string as argument which is responsible for overwriting the drives data:

 

The “agent.exe” sends the buffer which contains message “************** Down With Saudi Kingdom, Down With Bin Salman **************” to its component driver (CWD\elrawdsk.sys) which overwrites logical drive data with the buffer data:

 

SonicWall Capture Labs provides protection against these threats with the following signatures:

  • Dustman.A
  • Dustman.A_2
  • Dustman.SYS
  • Dustman.SYS_2

Spear-Phishing Attacks Targeting Office 365 Users, SaaS Applications

Over the course of the last 15 years, cyber threats have gone from urban myths and corporate ghost stories to as mainstream as carjackings and burglaries. There isn’t a business owner of a small restaurant chain or a CEO of a Fortune 500 company who doesn’t think about the fallout of being breached.

I’m not here to tell you how the threats are getting more sophisticated, or how state-sponsored hacker groups are getting more and more funding; you already know that. But what I do want to share with you is something that I’m seeing daily. Targeted threats that you may have already witnessed and, unfortunately, been personally a victim of or know someone who has: Spear-phishing.

Are you an Office 365 user? Do you have customers who are Office 365 users? Are you a managed security service provider (MSSP) that administrators Office 365 for your clients? You probably need a solution that applies effective Office 365 security capabilities and controls.

With close to 200 million global users, Office 365 is a target — a big target. And spear-phishing attempts are good. Really good. Recently, Forbes ran a summary of the threat. Alarmingly, today’s most advanced spear-phishing attempts look like they come from your CFO, boss or trusted vendor. They provide credibility to the target and, many times, users take the bait. Money gets wired. Access to accounts are provided. Confidential information is exposed.

Traditional email security isn’t enough protection. Out-of-the-box, cloud-native security services aren’t enough protection. A lean, effective and modern Office 365 security or SaaS security solution is required.

How to stop spear-phishing attacks, advanced cyber threats

SonicWall Cloud App Security (CAS) combines advanced security for Office 365, G Suite and other top SaaS applications to protect users and data within cloud applications, including email, messaging, file sharing and file storage. This approach delivers advanced threat protection against targeted email threats like phishing attacks, business email compromise, zero-day threats, data loss and account takeovers.

CAS also seamlessly integrates with sanctioned SaaS applications using native APIs. This helps organizations deploy email security and CASB functionalities that are critical to protecting the SaaS landscape and ensure consistent policies across cloud applications being used.

Explore the five key reasons CAS may be able to protect your organization from spear-phishing and other advanced attacks.

  • CAS delivers next-gen security for Office 365, protecting email, data and user credentials from advanced threats (including advanced phishing) while ensuring compliance in the cloud
  • Monitor SaaS accounts for IOCs, such data leakage, account takeover, business email compromise (BEC) and fraud attempts
  • Block malware propagation in malicious email attachments and files, whether they are at-rest or traversing a SaaS environment, internally or cloud-to-cloud
  • Prevent data breaches using machine learning and/or AI-based user profiling and behavior analytics for incident detections and automated responses
  • Leverage Shadow IT to monitor cloud usage in real time, and set policies to block unsanctioned applications

In my over 10 years of observing various attacks and sitting in rooms with customers (not mine, fortunately) who have been breached, I can tell you that you don’t want it ever to be you or your customers. This threat is having more success than any I’ve seen — and they are very recent.

For more information, contact a SonicWall cybersecurity expert or explore the CAS solution in detail.

ServHelper 2.0: Enriched with bot capabilities and allow remote desktop access

SonicWall RTDMI ™ engine has recently detected a Nullsoft Scriptable Install System (NSIS) compiled executable file which executes new variant of ServHelper malware as a final payload. The NSIS binary contains a PowerShell script, which on execution brings another PowerShell script. The second level PowerShell script is responsible for checking and setting execution environment for ServHelper 2.0 malware.

PE Static Information:

 

First Level PowerShell Script:

This PowerShell script perform Base64 decoding, followed by the decryption using Triple Data Encryption Standard (TripleDES) algorithm to get second level PowerShell script. The second level PowerShell script is executed after removing null bytes from the end:

 

Second Level PowerShell Script:

The PowerShell script checks the Read Only Memory (ROM) size, by accessing “SMBiosData” property in System Management BIOS (SMBIOS). If ROM size if less than or equal to 2048 KiloBytes, the malware calls function “clearupper” which removes the temporary files and terminates the execution. The 9th byte is “SMBiosData” represents “[ROM size(in KiloBytes)/64 – 1]”. Checking ROM size can be a used to determining virtual environment or the malware author does not want to execute ServHelper, if victim’s machine does not meet the expected ROM size. If the malware is executed with “Administrators” account then “install” function is executed which is responsible for further ServHelper execution, else “gsdingeku” is executed which is responsible for executing the PowerShell script with escalated privilege:

 

The malware now checks for “TermService” (Remote Desktop Service), if not already present, the malware creates the service setting “ServiceDll” path as “%SystemRoot%\System32\termsrv.dll” and then terminates “TermService” if already running. The malware contains strings variable, which are Base64 decoded, followed by gzip decompression to get the component files(32-bit ServHelper binary, modified 64-bit RDP Wrapper Library, 64-bit ServHelper binary, RDP Wrapper Library configuration, 64-bit RDP Clipboard Monitor executable and 64-bit Microsoft RemoteFX VM Transport library):

 

32-bit ServHelper binary is packed with PECompact (Powerful executable compression for software developers and vendors), 64-bit ServHelper binary and modified 64-bit RDP Wrapper Library are packed with UPX (Ultimate Packer for eXecutables). The malware checks “[System.IntPtr]::Size” to determine Operating System architecture and copies component files to below file locations:

  • Modified RDP Wrapper Library – Copies to $env:programfiles\windows mail\appcache.xml
  • ServHelper binary – Copies to $env:programfiles\windows mail\default_list.xml
  • RDP Wrapper Library configuration – Copies to $env:programfiles\windows mail\cleanuptask.cfg
  • RDP Clipboard Monitor executable – If not present already, copies to env:systemroot\system32\rdpclip.exe
  • Microsoft RemoteFX VM Transport library – If not present already, copies to $env:systemroot\system32\rfxvmt.dll

The malware changes Remote Desktop Protocol (RDP) port to “7201” and ServiceDLL to “$env:programfiles\windows mail\appcache.xml” for “Remote Desktop Service”. The malware then starts “rdpdr” and “TermService” services. ServiceDLL for “TermService” which is now “Modified RDP Wrapper Library” executes the ServHelper binary.

 

ServHelper 2.0:

The malware decrypts encrypted string “d:\xbl_QpfneNpYlu_.qye” to “c:\aaa_TouchMeNot_.txt” using below decryption logic and uses same decryption logic for decrypting other encrypted strings:

 

The malware now checks the presence of “c:\aaa_TouchMeNot_.txt” (Windows Defender’s goat file), if found then malware terminates the execution:

 

The malware modified user accounts using below batch commands to allow remote desktop access:

  • net user wgautilacc Ghar4f5 /del
  • net user wgautilacc yysJG0Or /add
  • net LOCALGROUP “Remote Desktop Users” wgautilacc /ADD
  • net LOCALGROUP “Remote Desktop Users” Deepak /ADD
  • net LOCALGROUP “Administrators” wgautilacc /ADD
  • net user wgautilacc yysJG0Or

The malware modifies below registry entries:

  • HKLM\System\CurrentControlSet\Control\Terminal Server\fDenyTSConnections -> 0
  • HKLM\System\CurrentControlSet\Control\Terminal Server\FSingleSessionPerUser -> 1
  • HKLM\System\CurrentControlSet\Control\Lsa\LimitBlankPasswordUse -> 0
  • HKLM\System\CurrentControlSet\Control\Terminal Server\Licensing Core\EnableConcurrentSessions -> 1
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions -> 1
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\wgautilacc -> 0
  • HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\fAllowToGetHelp -> 1

The malware writes victim’s machine information into “%TEMP%\LYNPCDXX”:

 

Network Communication:

The malware sends the information to its Command and Control (C&C) server. Before sending information to the C&C server, malware performs xor operation followed by Base64 encoding:

 

Commands Supported:

  • bk
  • info
  • fixrdp
  • reboot
  • updateuser
  • deployns
  • keylogadd
  • keylogdel
  • keyloglist
  • keylogreset
  • keylogstart
  • sshurl
  • getkeylog
  • getchromepasswords
  • getmozillacookies
  • getchromecookies
  • search
  • bkport
  • hijack
  • persist
  • stophijack
  • sethijack
  • setcopyurl
  • forcekill
  • nop
  • tun
  • slp
  • killtun
  • shell
  • update
  • load
  • sockt

 

Unavailability of Portable Executable (PE) in any of the popular threat intelligence sharing portals like the VirusTotal and the ReversingLabs at the time of writing this blog indicates its uniqueness and limited distribution:

 

Evidence of the detection by RTDMI(tm) engine can be seen below in the Capture ATP report for this file:

PDF Phishing campaign uses Google Docs to steal victim's Email credentials

SonicWall Capture Labs Threats Research team has discovered an ongoing phishing campaign which abuses genuine web-based software office suite platform like google docs. Upon opening the PDF file, a blurred image with instructions on how to view the document is displayed to the user:

 

If the instructions as mentioned in the PDF file are followed, an HTML file is downloaded without user intervention from Google Docs URL as shown below:

 

When the downloaded HTML file is opened, the user is shown a genuine looking webpage with options to select email providers like Yahoo, Google, Outlook, Office etc to view the document:

 

Depending upon the email provider chosen by the user, one of the following form would be displayed:

 

Upon entering the user credentials and clicking the sign-in button the user is displayed a clean PDF file downloaded from remote server to appear legitimate:

 

However in the background the malware author steals user credentials when the sign-in button is clicked and sends them to remote web server “hxxps://webpersonaltrainer[.]top” as shown below:

 

These PDF files are not detected by any vendor when checked on top threat intelligence sharing portals like virus total:

 

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: Downloader.FR (Trojan)
  • GAV: Downloader.PD_18 (Trojan)

 

MZP Ransomware actively spreading in the wild

The SonicWall Capture Labs Threat Research Team observed reports of a new variant family of MZP ransomware [MZP.RSM] actively spreading in the wild.

The MZP ransomware encrypts the victim’s files with a strong encryption algorithm until the victim pays a fee to get them back.

Infection Cycle:

The ransomware adds the following files to the system:

  • Malware.exe
    • % App.path%\ HOW TO RESTORE ENCRYPTED FILES.TXT
      • Instruction for recovery
    • %App.path%\ [Name]. <Random>

Once the computer is compromised, the ransomware runs the following commands:

The ransomware encrypts all the files and appends the [<Random>]  extension onto each encrypted file’s filename.

After encrypting all personal documents, the ransomware shows the following text file containing a message reporting that the computer has been encrypted and to contact its developer for unlock instructions.

 

We have been monitoring varying hits over the past few days for the signature that blocks this threat:

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: MZP.RSM (Trojan)

This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions.

Large scan activity observed for Digital Video Recorder NVMS-9000

SonicWall Capture Labs Threat Research Team observed large unusual scan activity looking for DVR NVMS-9000-series no-name type network-attached devices.

                     Fig: Hits for the IPS signature 14610 in the last 30 days

 

The traffic with the shellcode is given below. It uses the hardcoded username\ password to authenticate and attempts to fork a reverse shell to redirect the traffic to a remote listener on port TCP 31337.

Fix:

The vendor advisory is posted here where they recommend updating the firmware.

If you have NVMS-9000 DVR exposed to the web, check for any unusual activity and block all inbound access from the web.

SonicWALL Capture Labs Threat Research team provides protection against this threat with the following signature:

IPS: 14610 NVMS-9000 Digital Video Recorder Remote Code Execution