blogs.keysight.com Open in urlscan Pro
104.96.95.73  Public Scan

Submitted URL: https://www.bing.com/ck/a?!&&p=120e3280bd739997JmltdHM9MTY3Njg1MTIwMCZpZ3VpZD0xOWI2NmFjYS00ZjY2LTY2MTMtMDFkNS03ODc0NG...
Effective URL: https://blogs.keysight.com/blogs/tech/nwvs.entry.html/2022/02/25/angler_exploit_kitdeobfuscationandanalysis-FQg7.html
Submission: On February 20 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

/blogs/tech/nwvs.entry.html/2022/02/25/

<form id="form-search-input-inline" action="/blogs/tech/nwvs.entry.html/2022/02/25/" data-paths="/content/keysight-blog/en/blogs" class="scf-js-searchform navbar-form">
  <div class="scf-quicksearch-form-group form-group">
    <input type="text" id="scf-js-quicksearch-input-inline" placeholder="Search Blogs" data-dropdown="drop_search" aria-controls="drop_search" aria-expanded="false" name="input_value"
      class="scf-quicksearch-value scf-js-search-value placeholder form-control ui-autocomplete-input" value="" autocomplete="off"><button id="header-search-submit">Search Blogs</button>
    <input type="hidden" name="resultPage" class="scf-js-seach-resultPage" value="/content/keysight-blog/en/blogs/search-results">
    <input type="hidden" name="searchEndpoint" class="scf-js-search-endpoint" value="/content/keysight-blog/en/blogs/search-results/jcr:content/root/responsivegrid/searchresult">
    <ul id="ui-id-1" tabindex="0" class="ui-menu ui-widget ui-widget-content ui-autocomplete ui-front" style="display: none;"></ul>
  </div>
</form>

Text Content

Enable browser cookies for improved site capabilities and performance.
Enable Javascript and browser cookies for improved site capabilities and
performance.
Search Blogs
Keysight Blogs
Toggle Menu
 * Insights
   
   Insights 
   
    * Simulation + Design
    * Benchtop
    * RF + Microwave
    * High Volume Traffic Generators
    * Network Visibility + Security
    * Education/University
    * Archived Blogs

 * Industries
 * Get to Know Keysight
   
   Get to Know Keysight 
   
    * Culture
    * Corporate Social Responsibility
    * Executive Perspectives

Keysight Picks

NETWORK VIRTUALIZATION – ARE 3RD PARTY NETWORK VISIBILITY SOLUTIONS STILL
RELEVANT?





INSIGHTS > NETWORK VISIBILITY + SECURITY


NETWORK APPS & SECURITY BLOG TEAM




 * #Network Security



Network Visibility + Security


ANGLER EXPLOIT KIT DEOBFUSCATION AND ANALYSIS

2021-09-27  |    8 min read 



By Wei Gao | Angler Exploit Kit (EK) is one of the most sophisticated exploit
kits in the world, used by cybercriminals to deliver diverse malware to
compromised websites and infect victims. Angler EK first appeared in late 2013,
and its authors have been adding new evasion features frequently to it ever
since.

Angler EK’s exploit code and malware payload are highly obfuscated in order to
bypass IDS/IPS. The kit uses 302 cushioning and Domain Shadowing to evade
detection, and it checks anti-virus software and the virtualized environment
before running the exploit. The Angler EK also includes a feature called
“Fileless infection [2]” to infect a victim without writing malware on the
drive.

Furthermore, Angler EK is still evolving. It is continually adding new IP
addresses, domains, and subdomains to host exploits and malware. Angler EK also
may use Zero-day vulnerability, such as “Hacking Team” vulnerabilities
(CVE-2015-5119, CVE-2015-5122) in its exploitation activities. These features
make Angler EK itself very difficult to detect by the majority of today’s
security defenses. Due to these features, Angler EK is reaching a prolific
scale. Accounting to the Distribution of Exploit Kit Activity as measured by
detection telemetry based on a week’s worth of data in May 2015 [1], Angler EK
has begun to dominate the market in exploit kits.



Angler EK starts with a compromised legitimate website and uses this to redirect
its visitors to an actual landing page. HTML iframe can be used to redirect the
traffic and make detection more difficult. However, in order to evade detection
by signature-based IDS/IPS, more and more redirection methods have recently been
used in Angler EK. 302 Cushioning [3] or cushion attack is used to redirect a
victim’s browser to a compromised website. Domain shadowing is also used in
Angler EK to bypass the domain URL blocklists and make it difficult to create an
IOC list.

In this blog, we will use sample pcap files to take a closer look at the Angler
EK. The sample pcaps are from www.malware-traffic-analysis.net

HTTP Redirection

In this example, the compromised website uses iframe to redirect the victim’s
browser to the Angler EK’s landing page.



Angler EK Landing Page

Thousands of new Angler EK landing pages are emerging. In order to make
detection more difficult and frustrate security researchers, the landing page
uses many obfuscation methods. The Angler EK landing page consists of four
elements:

 * Plain English Text
 * Paragraph element (Obfuscated JS code)
 * Deobfuscation functions
 * Encrypted URLs and Exploit paths

The first obfuscation method is plain English text, which may quote from the
author Jane Austen's novel, Sense and Sensibility.



The second obfuscation element of the Angler EK landing page is the paragraph
element in the HTML, which can be deobfuscated by the deobfuscation functions in
the landing page.



The third element of the landing page is deobfuscation function, which grabs the
paragraph elements, decodes them, and then decrypts them. The deobfuscation
function is highly deobfuscated in the landing page to bypass IDS/IPS
signatures.



The last element is encrypted URLs and exploit paths, which can be used to
download and execute the malware payload. The encrypted URL may include the name
of the server hosting the exploit kit or the path used to locate Silverlight or
flash content.



Environment Check:

After deobfuscation of the Angler EK landing page, we found its environment
check section. The Angler EK checks some installed Kaspersky ActiveX control as
well as IE browser.



It also checks whether the running environment is sandbox by going through a
checklist that contains specific file paths and files:



Decryption of URL:

Here, we can see the decryption function for the encrypted URLs in the Angler
EK. It uses “LGWZsrv1LGWZsrvIc3” as the default decryption key, which is shown
in this figure. We can easily rewrite this JS code and decrypt the encrypted
URLs.



Here, we rewrote this code and decrypted the URL:





Here, we got the host name and request page.

Dropper and Payload:

The Angler EK will do more browser and system checking. In this code, it will
check whether it is an IR, and whether it is running on x32 or x64.



The dropper will be loaded into memory after the IE is compromised. Shellcode is
partly encrypted. The default decryption key is “Du9J08gkbfzGvmFF” as shown in
this figure.



After deobfuscation, we found that the Angler EK uses highly obfuscated
JavaScript code to bypass IDS/IPS detection and make security researchers spend
more time on it. Also, Angler EK has code to check the AV product and VM
product. Furthermore, the payload will be encrypted and encoded during the
sending stage. All of these features make detection more difficult.

CVE-2013-2551(Microsoft Internet Explorer COALineDashStyleArray Integer
Overflow):





To the left is the actual vulnerability used in the Angler EK; to the right is
the POC code of CVE-2013-2551. After analysis, we found that this Angler EK
sample is using the CVE-2014-2551 Microsoft Internet Explorer
COALineDashStyleArray Integer Overflow.

Other vulnerabilities used in Angler EK are listed in the following table:

Product CVE IE

CVE-2015-2419

CVE-2014-0322

CVE-2014-1776

CVE-2014-4130

CVE-2013-2551

CVE-2013-7331

Flash

CVE-2015-5560

CVE-2015-5122

CVE-2015-5119

CVE-2015-3113

CVE-2015-3104

CVE-2015-3090

CVE-2015-2419

CVE-2015-0359

CVE-2015-0336

CVE-2015-0313

CVE-2015-0311

CVE-2015-0310

CVE-2014-8440

CVE-2014-8439

CVE-2014-0515

CVE-2014-0497

CVE-2013-5329

Silverlight CVE-2015-1617

CVE-2013-0074

CVE-2013-3896

Summary

Angler EK is a very sophisticated attack and is still continually evolving. This
exploit kit is almost impossible to detect by the majority of today’s security
defenses. In this blog, we try to analyze Angler EK behavior and its exploit
landing page, and to identify its encode and obfuscation methods. As we can see,
Angler EK tries to use numerous method variations, such as obfuscation, AV
product, sandbox check, payload encryption, and fileless injection to defeat
traditional detection methods.

Ixia ATI is introducing the Angler Exploit Kit canned test, which emulates
Angler EK communication behavior. In addition, the Nuclear Exploit Kit canned
test is under development and will be released soon.

Additional Resources:

Ixia ATI subscription

References:

[1] https://blogs.sophos.com/2015/07/21/a-closer-look-at-the-angler-exploit-kit/

[2] http://malware.dontneedcoffee.com/2014/08/angler-ek-now-capable-of-fileless.html

[3] http://blog.malwaremustdie.org/2013/09/302-redirector-new-cushion-attempt-to.html






--------------------------------------------------------------------------------


RELATED POSTS

Network Visibility + Security

THE FOG OF WAR IN INCIDENT RESPONSE AWARENESS

Bob DuCharme 2023.02.03



7 min read

#Network Security #Cybersecurity #Software

Network Visibility + Security

KRPC PROTOCOL: THE LANGUAGE OF TORRENT PEERS

RAKESH SEAL 2023.01.31



14 min read

#Network Security #Network Analysis Apps #Network Test #Network Visibility

Simulation + Design

THE WORLD OF POSSIBLE WHAT-IFS: EXPLORING THE LIMITLESS POTENTIAL FOR DIGITAL
TWIN TECHNOLOGY

Jenn Mullen 2023.01.27



10 min read

#Industry Trends #Network Security #Design + Automation #STEM

RELATED TAGS

 * #Network Security
 * #Cybersecurity
 * #Network Visibility
 * #Network Test
 * #Packet Brokers
 * #Network Taps
 * #Internet of Things
 * #Data Privacy
 * #Cloud
 * #Performance Monitoring
 * #CloudLens
 * #Software
 * #Industry Trends
 * #Healthcare
 * #Data Center Infrastructure
 * #SDN + NFV
 * #Bypass Switches
 * #Network Analyzers
 * #Cloud Test
 * #Test Automation
 * #Government
 * #Network Analysis Apps
 * #Hawkeye

See All Tags



 * © Keysight Technologies 2000–2023
 * 
 * 
 * 
 * 


Keysight Blogs