text
stringlengths 4
429
|
---|
files are specific to the sample we analyzed at HBGary, Inc.
|
The attackers must use a second stage download mechanism
|
to achieve full system access due to memory constraints. It
|
is unlikely that the final payload could be delivered through
|
the original exploit given these conditions. The dropper
|
is XOR encrypted with a 0x95 key. The shellcode copies
|
this encrypted binary to the user
|
s AppData directory as
|
a.exe
|
. The shellcode then decrypts
|
a.exe
|
and moves it
|
b.exe
|
in the same directory. Then
|
b.exe
|
is executed.
|
The following actionable intelligence can be used to identify
|
exploit remnants in the heap space of Internet Explorer post
|
exploitation attempt. These patterns can be searched for
|
when doing memory analysis
|
of a victim system.
|
SHELLCODE ARTIFACTS
|
PATTERN
|
Self-decrypting code using
|
a constant XOR value.
|
80 34 0B D8 80 34 0B D8
|
Kernel32.dll
|
searching code.
|
64 A1 30 00 00 00 8B 40 0C 8B 70 1C
|
Push Urlmon string to stack
|
using two push statements.
|
68 6F 6E 00 00 68 75 72 6C 6D
|
The following SNORT rules have been released by the Emerging
|
Threats project to detected the final payload command and
|
control communications.
|
Network Detection Signatures
|
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:
|
ET TROJAN
|
Aurora Backdoor (C&C) client connection to CnC
|
; flow:established,to_
|
server; content:
|
|ff ff ff ff ff ff 00 00 fe ff ff ff ff ff ff ff ff ff 88 ff|
|
depth:20; flowbits:set,ET.aurora.init; classtype:trojan-activity;
|
reference:url,www.trustedsource.org/blog/373/An-Insight-into-theAurora-Communication-Protocol; reference:url,doc.emergingthreats.
|
net/2010695; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.
|
cgi/sigs/VIRUS/TROJAN_Aurora; sid:2010695; rev:2;)
|
alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:
|
ET TROJAN
|
Aurora Backdoor (C&C) connection CnC response
|
; fl owbits:isset,ET.
|
aurora.init; flow:established,from_server; content:
|
|cc cc cc cc cd
|
cc cc cc cd cc cc cc cc cc cc cc|
|
; depth:16; classtype:trojan-activity;
|
reference:url,www.trustedsource.org/blog/373/An-Insight-into-theAurora-Communication-Protocol; reference:url,doc.emergingthreats.
|
net/2010696; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.
|
cgi/sigs/VIRUS/TROJAN_Aurora; sid:2010696; rev:2;)
|
DROPPER
|
The initial dropper is merely a detonation package that
|
decompresses an embedded DLL into the Windows system32
|
directory and loads it as a service. The initial dropper is likely
|
to be packed (UPX, etc). The dropper has an embedded DLL
|
that is decompressed to the windows system32 directory. This
|
DLL will be named to resemble existing services (rasmon.
|
dll, etc). In order to evade forensics, the file-time of the
|
dropped DLL will be modified to match that of an existing
|
system DLL (user32.dll, etc). The dropped DLL is loaded into
|
its own svchost.exe process. Several registry keys are created
|
and then deleted as part of this process. Finally, the dropper
|
deletes itself from the system by using a dissolving batch file
|
(DFS.BAT, etc).
|
ACTIONABLE INTELLIGENCE
|
PATTERN
|
Service Key & Value
|
Note: deleted after drop
|
SOFTWARE\Microsoft\Windows NT\
|
CurrentVersion\SvcHost\
|
Value: SysIns
|
Data: Ups??? (??? are three random
|
chars)
|
Path to backdoor
|
Note: deleted after stage 1
|
SYSTEM\CurrentControlSet\Services\
|
Ups???\Parameters\
|
Value: ServiceDLL
|
Data: (full path to the backdoor)
|
Path to backdoor
|
Note: persistent
|
SYSTEM\CurrentControlSet\Services\
|
RaS???\Parameters\
|
Value: ServiceDLL
|
Data: (full path to the backdoor)
|
February 10, 2010 5
|
ACTIONABLE INTELLIGENCE
|
PATTERN
|
Potential variation
|
SYSTEM\CurrentControlSet\Services\
|
RaS???\Parameters\
|
Value: ServiceDLL
|
Data: %temp%\c_####.nls (where
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.