Posts

Fake Desktop Utilities (Dec 23, 2010)

SonicWALL UTM Research team has been monitoring fake desktop utilities since mid October. While we continue to see new variants of Fake Antivirus every day, this is a new approach adapted by Fake AV authors to target unwitting users. These fake utilities may arrive by spammed e-mails or via drive-by downloads from compromised sites similar to Fake AV.

We have received multiple variants of fake desktop utilities till now that includes – Disk Doctor, Windows Defrag, Disk Scanner, Control Panel, Utility Manager etc. The agenda is pretty much similar to the Fake AV – infect the computer, scare the user with fake errors, and make them purchase a product to fix the errors.

screenshot

As you can see above they use fake icon and file information to masquerade as legitimate utilities. Below are some screenshots showing the fake desktop utilities in action:

screenshot

screenshot

screenshot

In addition to the above activity, some of the newer variants were randomly generating “hard drive problem” alerts whenever user attempts to open any application post infection.

screenshot

If the user falls for the trap and attempts to buy the software, it loads a fake address bar image containing SSL certificate information and the secure lock image in the same product window further assuring user of a safe legitimate transaction. In the background it attempts to connect to the landing site which has been taken off at the time of writing this alert.

screenshot

SonicWALL Gateway AntiVirus provided protection against these fake utilities via following signatures:

GAV: Suspicious#fakeav_17 (Trojan) [ ~900,000 hits ]
GAV: Suspicious#fakeav_16 (Trojan) [ ~5,000 hits ]

MS IE CSS Parsing Memory Corruption (Dec 21, 2010)

Microsoft Internet Explorer is one of the most popular web browsers on the Internet. Internet Explorer is capable of rendering both static and dynamic web contents. It can also be used to download files, play multi-media contents and open different file formats using various plug-ins.

A use-after-free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles the creation and deletion of CSS (Cascading Style Sheets) objects. Remote attackers may exploit this vulnerability by enticing the target user to view a malicious HTML document, which allows injection and execution of arbitrary code.

SonicWALL has released several IPS signatures to detect and block known exploits targeting this vulnerability. The following signatures were released to address this issue:

  • 6094 – MS IE CSS Import Use-After-Free Code Execution 1
  • 6095 – MS IE CSS Import Use-After-Free Code Execution 2
  • 6096 – MS IE CSS Import Use-After-Free Code Execution 3

In addition to handling this specific threat, SonicWALL currently deploys a number of generic signatures which detect known shellcode patterns and evasion techniques that would likely be used during exploitation attempts of a vulnerability such as this one.

For more information about this vulnerability, please read SecurityFocus advisory Microsoft Internet Explorer CSS Parsing Remote Memory Corruption Vulnerability.

Wikileaks Black Hat Campaigns (Dec 16, 2010)

SonicWALL UTM Research team discovered instances of polluted results appearing in search engine results for Wikileaks related search terms. Malware authors often use SEO poisoning campaigns to lure unsuspecting users in to clicking on malicious links strategically placed in search engine results. This technique has been traditionally used by Malware authors in Black Hat SEO campaigns around all major events. However this is the first time we have observed Wikileaks related terms being used in Black Hat SEO campaigns. The search term “Julian Assange Wikileaks” leads users to the polluted search result shown below:

screenshot

If the user clicks on the malicious link in the search results then it performs the following on the victim’s machine:

  • The initial link redirects users to a FakeAV landing page.

    screenshot

  • If the user downloads and runs the FakeAV executable then it performs the following on the victim’s machine:
    • Drops the following files:
      • %temp%/systempack8_195.exe (Copy of Itself) [Detected as GAV: Kryptik.IXE (Trojan)]
      • %USERPROFILE%/Application Data/7b4dd2/IA7b4_195.exe [Detected as GAV: Suspicious#fakeav_2 (Trojan)]

    • Creates the following registry entry to ensure that the dropped malware runs on every system reboot:
      • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce: “%temp%/systempack8_195.exe”

Cyber criminals may be using the popularity garnered by wikileaks to their advantage as also observed from the mirror listing site “wikileaks.info” which is hosted in an address space known to be under the control of cyber criminals. Although the hosted site has not been found serving any malicious content so far we advise users to exercise caution visiting this domain.

SonicWALL Gateway AntiVirus provided protection against this threat via following signatures:

GAV: Kryptik.IXE (Trojan)
GAV: GAV: Suspicious#fakeav_2 (Trojan)

screenshot

Microsoft Security Bulletins Coverage (Dec 15, 2010)

SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of December, 2010. A list of issues reported, along with SonicWALL coverage information follows:

MS10-090 Cumulative Security Update for Internet Explorer (2416400)

  • CVE-2010-3340 – HTML Object Memory Corruption Vulnerability
    IPS 6090 MS IE HTML Object Memory Corruption 1 (MS10-090)
  • CVE-2010-3342 – Cross-Domain Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3343 – HTML Object Memory Corruption Vulnerability
    IPS 6091 MS IE HTML Object Memory Corruption 2 (MS10-090)
  • CVE-2010-3345 – HTML Element Memory Corruption Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.
  • CVE-2010-3346 – HTML Element Memory Corruption Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.
  • CVE-2010-3348 – Cross-Domain Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3962 – Uninitialized Memory Corruption Vulnerability
    IPS 5908 Malicious HTML Style Tag 1
    IPS 5943 MS IE Invalid Flag Reference Memory Corruption 1

MS10-091 Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199)

  • CVE-2010-3956 – OpenType Font Index Vulnerability
    IPS 6087 Malicious Font File 7b
  • CVE-2010-3957 – OpenType Font Double Free Vulnerability
    IPS 6088 Malicious Font File 8b
  • CVE-2010-3959 – OpenType CMAP Table Vulnerability
    IPS 6089 Malicious Font File 9b

MS10-092 Vulnerability in Task Scheduler Could Allow Elevation of Privilege (2305420)

  • CVE-2010-3338 – Task Scheduler Vulnerability
    Note: Local elevation of privilege.

MS10-093 Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (2424434)

  • CVE-2010-3967 – Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-094 Vulnerability in Windows Media Encoder Could Allow Remote Code Execution (2447961)

  • CVE-2010-3965 – Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-095 Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2385678)

  • CVE-2010-3966 – BranchCache Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-096 Vulnerability in Windows Address Book Could Allow Remote Code Execution (2423089)

  • CVE-2010-3147 – Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-097 Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution (2443105)

  • CVE-2010-3144 – Internet Connection Signup Wizard Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-098 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2436673)

  • CVE-2010-3939 – Win32k Buffer Overflow Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3940 – Win32k PFE Pointer Double Free Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3941 – Win32k Double Free Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3942 – Win32k WriteAV Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3943 – Win32k Cursor Linking Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3944 – Win32k Memory Corruption Vulnerability
    Note: Local elevation of privilege.

MS10-099 Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591)

  • CVE-2010-3963 – Kernel NDProxy Buffer Overflow Vulnerability
    Note: Local elevation of privilege.

MS10-100 Vulnerability in Consent User Interface Could Allow Elevation of Privilege
(2442962)

  • CVE-2010-3961 – Consent UI Impersonation Vulnerability
    Note: Local elevation of privilege.

MS10-101 Vulnerability in Windows Netlogon Service Could Allow Denial of Service (2207559)

  • CVE-2010-2742 – Netlogon RPC Null dereference DOS Vulnerability
    IPS 6086 MS Windows Netlogon Service DoS

MS10-102 Vulnerability in Hyper-V Could Allow Denial of Service (2345316)

  • CVE-2010-3960 – Hyper-V VMBus Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-103 Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2292970)

  • CVE-2010-2569 – Size Value Heap Corruption in pubconv.dll Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-2570 – Heap Overrun in pubconv.dll Vulnerability
    IPS 6084 Malicious Publisher Document 1b
  • CVE-2010-2571 – Memory Corruption Due To Invalid Index Into Array in Pubconv.dll Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3954 – Microsoft Publisher Memory Corruption Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3955 – Array Indexing Memory Corruption Vulnerability
    IPS 6085 Malicious Publisher Document 2b

MS10-104 Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution (2455005)

  • CVE-2010-3964 – Malformed Request Code Execution Vulnerability
    IPS 6083 MS SharePoint Malformed Request 1b

MS10-105 Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095)

  • CVE-2010-3945 – CGM Image Converter Buffer Overrun Vulnerability
    IPS 6077 Malicious Image File 1b
  • CVE-2010-3946 – PICT Image Converter Integer Overflow Vulnerability
    IPS 6078 Malicious Image File 2b
  • CVE-2010-3947 – TIFF Image Converter Heap Overflow Vulnerability
    IPS 6079 Malicious Image File 3b
  • CVE-2010-3949 – TIFF Image Converter Buffer Overflow Vulnerability
    IPS 6080 Malicious Image File 4b
  • CVE-2010-3950 – TIFF Image Converter Memory Corruption Vulnerability
    IPS 6080 Malicious Image File 4b
  • CVE-2010-3951 – FlashPix Image Converter Buffer Overflow Vulnerability
    IPS 6081 Malicious Image File 5b
  • CVE-2010-3952 – FlashPix Image Converter Heap Corruption Vulnerability
    IPS 6082 Malicious Image File 6b

MS10-106 Vulnerability in Microsoft Exchange Server Could Allow Denial of Service (2407132)

  • CVE-2010-3937 – Exchange Server Infinite Loop Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

HP OpenView MMD Service Stack BO (Dec 10, 2010)

HP OpenView Storage Data Protector is a backup solution for enterprise and distributed environments. It consists of a Cell Manager, backup agents, and backup device servers. The Cell Manager is the central point from which backup agents and device servers are administered, and backup and restore operations are controlled.

The Media Management Daemon service runs on the Cell Manager and controls media management and device operations. It provides features such as protection against accidental overwrites, capability of transferring all media-related catalog from one Cell Manager to another, tracking of all media including the status of each medium, etc. The server listens for incoming connections on a dynamically assigned TCP port. The protocol utilized for communication between Media Management Daemon service and clients is proprietary and not documented.

A request sent to the Media Management Daemon service has the following format:

 Offset             Size      Field     -----------------  --------- ------------------------------ 0x0000             4         Command Length 0x0004             2         Unknown  0x0006             N1        Command code unicode string 0x0006+N1          2         0x2000 0x0008+N1          N2        Unicode string 0x0008+N1+N2       2         0x2000 0x000A+N1+N2       N3        Unicode string 0x000A+N1+N2+N3    2         0x2000 0x000E+N1+N2+N3    N4        Unicode string 0x0010+N1+N2+N3+.. 

Command Length is a 4 byte value in big endian byte order. It specifies the number of bytes inside the packet, excluding the length field itself. The arguments are in the form of wide char strings terminated with double Null bytes, and separated by one Unicode space character. The backup agent executes different programs based on the received Command code.

A code execution vulnerability exists in HP Data Protector Manager Server. The flaw is due to a stack buffer overflow during parsing of malformed requests. If a request with a certain command code is sent, the vulnerable code allocates a fixed-size buffer of 624 bytes. The 7th user-supplied argument is then copied into the destination buffer without any verification of its length. By supplying an overly long string in a crafted request, the destination stack buffer can be overflowed. The overflow could result in the overwriting of critical stack data such as stored function return addresses and SEH pointers, allowing for code injection and execution.

A remote unauthenticated attacker can exploit this vulnerability by sending a malicious request to a target server. Successful exploitation could result in execution of arbitrary code within the security context of the service, which is configured during the software installation (usually Administrator).

SonicWALL has in place numerous generic IPS signatures that detect and block shell code transferred in exploitation attempts of vulnerabilities of this type. A known exploit targeting this vulnerability is currently being proactively caught by the following IPS signature:

  • 5512 – Generic Server Application Shellcode Exploit 28

Gbot Trojan (Dec 09, 2010)

SonicWALL UTM Research team received reports of a new Trojan that can be used to relay sensitive information to remote hosts and accept remote commands from an attacker. The Trojan will make periodic GET and POST requests to remote servers for pages and files that do not exist. Some parts of the requests contain system information or is encrypted.

The Trojan performs the following activities upon execution:

  • Drops the following three files on the compromised machine:
    • C:Documents and SettingsUserApplication Datadwm.exe [ Detected as GAV: Cycbot.AA_6 (Trojan) ]
    • C:Documents and SettingsUserApplication DataMicrosoftconhost.exe [ Detected as GAV: Cycbot.AA_6 (Trojan) ]
    • C:Documents and SettingsUserApplication DataE6AE.A4A
  • Creates the following registry entries to ensure regular startup:
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon Shell “explorer.exe,C:Documents and SettingsUserApplication Datadwm.exe”
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun svchost “C:Documents and SettingsUserApplication DataMicrosoftconhost.exe”

  • Additional registry keys created:
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings ProxyServer “http=127.0.0.1:61333”

  • Samples of periodic web requests made by the Trojan:

    screenshot
    GET request to: freeonline{removed}.net
    /images/dating1.jpg?tq=gP4aKydUJoD%2BbLSpPM48HXAm%2BIp7RbMA%2Fj%2FBt%2F4rtL2W%2FTcjYNfHjHjmGehkmxM4tV0CLKqe6ul5HxkjOJVmFn2W7p6qiRuKM2cpy5wV
    67ZN5NyS3oiAzfBfnR82Oj6fiu%2Fhq0R50Za6gQOYeTN%2F3XLpS%2FuvwQ3f6llQ8jWyxwwpBg%2FcIwgI

    GET request to: 136{removed}.com
    /LB5000/CGI-BIN/s.cgi?tq=gHZutDyMv5rJej%2Fia9nrmsl6giWz%2BJZbVyA%3D

    GET request to: zon{removed}.com
    /images/im133.jpg?tq=gKZEtzyMv5rJqxG1J42pzMffBvAp1ujbwvgS917W65rJqlLfgPiWW1cg

    GET request to: pcdoc{removed}.com
    /images/logo-1.jpg?tq=gP4aKydMI5oGWaj6So61fGRfYz7KV8jMqwqKxVRWKZa7fLqVtLymA%2FOn9Itcm1zra2bubThHUef0bm2jztvHVcirw2XGuLsR5u3V%2BorIwuAZQROKs16%2BmEVT3jBx0lWjP%2
    FEmg95AmzFTI18yhLbz8fvGc5zFAt5MlTLKL4RY8T1KL7GEaXaQeV4tnf0paKcyB

    POST request to: xibu{removed}.cn
    /pics/23.jpg?type=g_v53&system={IE Browser Ver}|{OS Ver}|{Language}&id=B0CA268F7F02CA4AE6AE&status=err088_2_0&n=0&extra=0

SonicWALL Gateway AntiVirus provides protection against this threat via following signature:

GAV: Cycbot.AA_6 (Trojan)

MS IE CStyleSheetRule Array Memory Corruption (Dec 3, 2010)

Microsoft Internet Explorer (IE) is one of the most popular web browsers on the Internet. Internet Explorer is capable of rendering both static and dynamic web contents, such as DHTML. It can also be used to download files, play multi-media contents and open different file formats using various plug-ins.

IE supports the Document Object Model (DOM); a cross-platform and language-independent convention for representing and interacting with objects in HTML, XHTML and XML documents. The rules for programming and interacting with DOM are specified by the DOM Application Programming Interface (API). JScript and JavaScript can both be used by IE to access and modify a web page’s underlying DOM.

A separate mechanism, Cascading Style Sheets (CSS), exists to allow web page authors to control the style of a page. The CSS defines the look, and to some extent, the behavior, of HTML elements. The CSS language is human readable, and expresses styles in common desktop publishing terminology. Styles are generally stored within external Style Sheets so as to facilitate their easy reuse and modification. Styles can be stored in-line as well. The following example shows the use of styles: