Analysis of Windows spyware, will you still easily download Windows crack software?

0 21
I. Event SummaryRecently, during the Windows terminal threat hunting, a Windows...

I. Event Summary

Recently, during the Windows terminal threat hunting, a Windows spyware was captured that spreads and distributes through crack software websites. After the victim clicks to run the malware, it will steal sensitive information such as account numbers, passwords, browsing history, cookies, desktop specific format files, installed application information, operating system information, and desktop screenshots from the victim's computer, encrypt and compress it in memory, and send it to the remote C2 server. At the same time, the analysis found that the malware author understands how to decompress and expand large files, memory loading, and uses AutoIT to counter online sandboxes & intelligence, local AV & EDR security protection mechanisms.

II. Event Analysis

0x01 Method of transmission

0. The victim accesses the software crack website to download Snagit crack software by searching for the keyword 'snagit 2024 key' on Google
Analysis of Windows spyware, will you still easily download Windows crack software?

1. Crack software download website https://trycracksetup.com/
image

2. The downloaded crack software page
image

3. Click the download crack package button
image

4. It will then jump to a randomly assigned download address page (the download address page that jumps each time you click the download crack package button is different)
image

5. Access the mediafire drive link inside to download
image

6. The downloaded file is a RAR compressed package, with a size of about 18MB
image

7. After entering the password to unzip, two files were released, one Note.txt, and one 715.9MB setup_x64_86.exe executable file
image

setup_x64_86.exe HASH INFO
MD5: 8BE7E723295D8EE67C973EB4AB51D763
SHA1: 705728719729924DA518C17894FC94719EA9F6EF
SHA256: AA9E931BFABC3ABDBA085C7FDFC64848EF281E9C2C631DEF4D3F4EFAE2CA2F82
SHA512: 62051780288D38483D42A237A8DAEFECAEE6326996E1174422C178CC171C1C0A6D266A049A753FAE2B0E8578B1616740F42C2CFB3874E8521460F7CFAA15BA2A

8. PE file is unsigned
image

9. File related hash has no intelligence
image

10. The maximum file that the sandbox allows to upload is 650MB, but this file is 715.9MB. The developer of the trojan used the method of decompressing and inflating large files to bypass the online sandbox dynamic behavior analysis and static intelligence query.
image

0x02 Behavior Analysis

Local dynamic analysis found that after running the trojan, it first checks whether it is running repeatedly. If the %AppData%/Xuginida directory exists, exit.
image

If the %AppData%/Xuginida directory does not exist, create the %AppData%/Xuginida directory
image

0x021 Obtain Screen Capture

After the environment detection is passed, the screen capture is obtained next
image

image

Name the obtained screenshot file as $SCREEN.JPEG
image

0x022 Obtain System Information

1. Obtain Computer Name
image

image

2. Obtain System Version Information
image

image

3. Obtain Description Information of Drivers
image

image

4. Obtain Processor Information of the Machine
image

image

0x023 Obtain Applications Installed on the Computer
image

image

0x024 Obtain Sensitive Browser Information
1. Obtain Sensitive Configuration File of Chrome Browser
image

image

2. Obtain Sensitive Configuration File of Firefox Browser
image

image

3. Obtain Sensitive Configuration File of Edge Browser
image

0x025 Obtain Files in Specific Format
image

image

0x026 Send Out Stolen Sensitive Information
After stealing sensitive information, compress the stolen files in memory
image

Send the compressed package of obtained sensitive information to qpone1vt.top/zip.php
image

Content of the Zip Compression Package Sent Out
image

Chrome Browser Sensitive Configuration File
image

Firefox Browser Sensitive Configuration File
image

Obtained specific format files
image

0x027 Create Task Scheduler to Maintain Permissions

Release the signed Ceroves.exe (AutoIT V3 script loader) and Ceroves.jpg (AutoIT V3 malicious script) to the %AppData%/Service/Data directory, and execute in a white + black memory manner to bypass the corresponding security mechanisms.

Ceroves.exe, an AutoIT V3 script loader with a legitimate signature
image

Ceroves.jpg, a malicious AutoIT V3 script after obfuscation
image

Task Scheduler File
image

Create a task scheduler named /Service/Data
image

Task Scheduler Details: Running in a white-black memory loading method, undetected by 360, Huorong, and Defender security software throughout the process.

image

0x03 Behavior Detection

It should be noted that, at the time of writing this analysis article, the malware can still bypass the detection of 360, Huorong, and Defender, successfully stealing sensitive information from the victims' computers. The following lists several detection methods based on suspicious behavior dimensions for unknown threats.

1. Suspicious Firefox Sensitive Credentials Acquisition Behavior
image

2. Suspicious Edge Sensitive Credentials Acquisition Behavior
image

3. Suspicious Chrome Sensitive Credentials Acquisition Behavior
image

4. Suspicious Task Scheduler Creation
image

Chapter 3 - Event Summary

Reviewing this Windows spyware incident reveals that the essence of such security incidents is still a problem with the terminal software supply chain management. If corporate employees can obtain the required software within the corporate internal network, then it is highly likely that they will not go out to download and install cracked software provided by third-party untrusted sources. I think it is possible to target this terminal software supply chain poisoning risk scenario from the three aspects of before, during, and after the event.

Before the event: Establish the security baseline for office terminals, provide employees with a trusted official software download channel within the corporate internal network, regularly conduct safety risk awareness training for employees, and continuously improve the basic defense capability of office terminals and the safety awareness of employees;

During the event: Based on the ATT&CK framework, through attack simulation, data analysis, strategy development & optimization, continuously improve the threat awareness capability of office terminals;

After the event: Establish a rapid止血 SOP mechanism for emergency response, review mechanism, reward and punishment reporting system, and continuously improve the risk disposal capability of office terminals;

Chapter 4 - Appendices - IOC

C2&Malicious Domains

130.193.43.88:80

qpone1vt.top

https://trycracksetup.com/

https://profullversion.com/

SHA256

AA9E931BFABC3ABDBA085C7FDFC64848EF281E9C2C631DEF4D3F4EFAE2CA2F82

你可能想看:
最后修改时间:
admin
上一篇 2025年03月27日 02:26
下一篇 2025年03月27日 02:48

评论已关闭