Posts

PlugX Trojan was seen making the rounds (July 30, 2015)

The Dell SonicWALL Threat Research team has received reports of a Trojan called PlugX or Korplug which has recently been seen compromising various U.S. Government entities and other industries such as aerospace, media, healthcare and telecommunication networks. This Trojan has been reported to be in existence since 2008 and over the few years, PlugX has seen continuous development and use in targeted attacks resulting to theft of sensitive information.

Infection Cycle:

PlugX has previously been seen bundled with online game installations but more recently seen delivered via email spear phishing. These emails would contain a malicious rich text document which utilizes vulnerabilities in Microsoft Word which could allow remote code execution. Several variants have leveraged exploits for CVE-2012-0158 and CVE-2014-1761; both of which have been resolved by Microsoft.

Once dropped on the victim machine, the main installer of this Trojan comes as a self-extracting RAR file and may use the following icons:

More recent variant of this Trojan creates these files in the following directories:

  • %Userprofile%SxSNvSmart.exe – a benign file with a valid digital signature from a well-known vendor (e.g. Symantec, Microsoft, McAfee, Samsung and in this case, Nvidia)
  • %Userprofile%SxSNvSmartMax.dll – malicious dll [Detected as GAV: PlugX.DLL (Trojan) ]
  • %Userprofile%SxSxxx.xxx – a configuration file

NvSmart.exe imports functions from NvSmartMax.dll. In a typical installation, it would load the legitimate Nvidia library but since a malicious DLL with the same name is present in the same directory, that malicious library will be used instead.

Upon execution, this Trojan spawns and injects its code into svchost.exe, possibly to evade detection.

During our analysis, we have seen this Trojan take desktop screenshots every 10 seconds and saved them in a directory.

It also logged all active windows in a text file.

Apart from what was observed, this Trojan has been reported to have the following capabilities:

  • Communicate to several C&C servers
  • Collect history information of visited URLs from different browsers
  • Remote access/Backdoor functionalities: download, execute, create, delete and enumerate processes; administrative control over a target system
  • Log keystrokes

Dell SonicWALL Gateway AntiVirus provides protection against this threat with the following signatures:

  • GAV: PlugX.BK (Trojan)
  • GAV: PlugX.BK_2 (Trojan)
  • GAV: PlugX.DLL (Trojan)
  • GAV: PlugX.KOR (Trojan)

Microsoft Security Bulletin Coverage (Apr 8, 2014)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of April, 2014. A list of issues reported, along with Dell SonicWALL coverage information are as follows:

MS14-017 Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (2949660)

  • CVE-2014-1757 Microsoft Office File Format Converter Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1758 Microsoft Word Stack Overflow Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1761 Word RTF Memory Corruption Vulnerability
    GAV: 20922 “CVE-2014-1761”

MS14-018 Cumulative Security Update for Internet Explorer (2950467)

  • CVE-2014-1755 Internet Explorer Memory Corruption Vulnerability
    IPS: 3611 “Windows IE Memory Corruption Vulnerability (MS14-018) 4”

    CVE-2014-1753 Internet Explorer Memory Corruption Vulnerability
    IPS: 3610 “Windows IE Memory Corruption Vulnerability (MS14-018) 3”

    CVE-2014-1752 Internet Explorer Memory Corruption Vulnerability
    IPS: 3609 “Windows IE Memory Corruption Vulnerability (MS14-018) 2”

    CVE-2014-1751 Internet Explorer Memory Corruption Vulnerability
    IPS: 3571 “Windows IE Memory Corruption Vulnerability (MS14-018) 1”

    CVE-2014-0235 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.

    CVE-2014-1760 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.

MS14-019 Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)

  • CVE-2014-0315 Windows Insecure Binary Loading Vulnerability
    There are no known exploits in the wild.

MS14-020 Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)

  • CVE-2014-1759 Arbitrary Pointer Dereference Vulnerability
    There are no known exploits in the wild.

Microsoft Word Zero Day(CVE-2014-1761) Exploit Analysis (Apr 4, 2014)

Dell Sonicwall Threat research team has spotted Microsoft Word Zero Day attacks in the wild.
Last week, Microsoft released a Security Advisory that addresses this vulnerability.

Following is the Technical Analysis of this attack.

The attack comes down as a malicious RTF file.

Minimum crash file showed following crash

We can see how ROP chain is constructed using MSCOMCTL.

VirtualAlloc is used to create an executable page

Now it returns back to ROP Chain.

More ROP Gadgets, navigate control to Shellcode

Shellcode takes control from here on.

On successful execution, we can see how svchost is spawned by word.

Following is our Detection Coverage.

  • GAV: CVE-2014-1761 (Exploit)

Microsoft Security Advisory Coverage (March 24, 2014)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisory released on March 24th, 2014. A list of issues reported, along with Dell SonicWALL coverage information follows:

Microsoft Security Advisory (2953095) Vulnerability in Microsoft Word Could Allow Remote Code Execution

  • CVE-2014-1761 Word RTF Memory Corruption Vulnerability
    SPY: 3376 Malformed-File rtf.MP.4