text
stringlengths 4
429
|
---|
When decrypted with the same XOR key that was used by Agent.BTZ, these files expose the following contents: |
mtmon.sdb - C&C communication log that looks as the logs shown above. |
mtmon_.sdb - installation log, that shows infected processes (Internet Explorer), the random name of the dropped DLL |
(e.g. kbdfaori.dll), log directory, and the registry entry ShellCore that stores other configuration details: |
03:52:02 TVer=1.2 |
03:52:02 Parent:C:\Program Files\Internet Explorer\IEXPLORE.EXE |
03:52:02 ver 3.2.0.0a inj dll K:0 PID:712, |
C:\WINDOWS\system32\kbdfaori.dll, |
hostID:ea5cfa5ea1681bd6(16887647987074341846) |
03:52:02 C:\WINDOWS\$NtUninstallQ812589$, |
Temp:C:\WINDOWS\$NtUninstallQ812589$\SPUNINST\Temp |
03:52:02 REG:Software\Microsoft\Windows\CurrentVersion\ShellCore |
03:52:02 ModuleStart: 03:51:42 |
scmp.bin - pipe server log that shows its assigned name (COMPUTERNAME is the name of the test system) and |
what processes it operates from: |
02:04:24 TVer=1.6 |
02:04:24 SPCOMPUTERNAME: Pipe server thread start |
02:04:24 Inj[1620]:explorer.exe |
03:51:42 Inj[712]:iexplore.exe |
ucmp.bin - another pipe server log: |
02:04:44 TVer=1.6 |
02:04:44 UPCOMPUTERNAME: Pipe server thread start |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 11 |
INTER-PROCESS COMMUNICATIONS |
Analysis of the sample reveals that it supports 3 modes of fetching C&C commands. |
In the first mode, it relies on Windows Internet (WinINet) APIs, such as HttpOpenRequest(), HttpSendRequest(), |
InternetReadFile(), etc. |
In the second mode, it uses Windows Sockets 2 (Winsock) APIs, such as WSAStartup(), socket(), connect(), |
send(), etc. |
In the third mode, it works in the |
pipe server |
mode, when it passes the web requests it is interested in (as a client) to the |
pipe server that runs within Windows Explorer (explorer.exe) and/or Internet Explorer (iexplore.exe) processes. |
Memory pipes is a common mechanism for Inter-Process Communications (IPC). When the pipe server reads such requests from the |
pipes, it performs the web request on behalf of a client by using WinINet APIs, so it effectively serves as a proxy. |
The diagram below demonstrates the last, |
pipe server |
mode of Snake operation: |
Injected Snake DLL System Process |
(e.g. services.exe) |
Snake DLL Internet |
3 in |
pipe server |
mode |
4 |
3 |
Legitimate Process |
Injected Snake DLL |
(e.g. a browser) |
User Mode |
2 |
1 |
Kernel Mode |
Legitimate Process |
(e.g. a browser) |
2 |
Embedded |
Snake |
s Kernel Mode DLL Module |
Driver, with the DLL |
module embedded in it |
The diagram illustrates the operation steps 1-4: |
1 First, the malicious driver with the embedded DLL module injects that DLL into a system process, |
such as services.exe; once loaded, the DLL will function in the |
pipe server |
mode. |
As soon as the driver detects a usermode process that goes online (e.g. a browser), it will inject malicious DLL module |
2 into it; depending on the operational mode, the DLL may start communicating with C&C directly. |
In the |
pipe mode |
of operation, the injected DLL will start communicating with the pipe server by sending messages into |
3 the established inter-process communication pipes. |
Once the task of communication with C&C is delegated to the pipe server, it will start communicating with the C&C, |
4 |
bypassing the host-based firewalls that keep an infected system process in a white-list. |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 12 |
The reason behind the pipes usage is to |
legitimise |
the outbound web requests, forcing them to originate from the host firewall- |
friendly system services. |
Pipe server is a special mode of the injected DLL. In order to switch into that mode, a dedicated thread is spawned to listen for IPC |
messages received through the pipes. The memory pipes used by Snake are named as: |
\\.\Pipe\SP[COMPUTERNAME] |
\\.\Pipe\UP[COMPUTERNAME] |
where [COMPUTERNAME] is the name of the host computer. |
Apart from GET/POST requests, the pipe clients (infected usermode processes) may also ask the pipe server to perform other |
operations on their behalf, such as saving data into a temporary file, copy/delete files, save configuration data into the registry |
under the aforementioned ShellCore value. |
This delegation of tasks is designed to keep infected processes under the radar of the behavioural analysis tools for as long as |
possible. Another reason is to overcome account restrictions imposed on a browser process in order to be able to write into files/ |
registry. |
To delegate different types of tasks, the clients send messages to the pipe server using the following task identification headers: |
DATA |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.