www.kroll.com
Open in
urlscan Pro
2606:4700::6812:102a
Public Scan
URL:
https://www.kroll.com/en/insights/publications/cyber/idatloader-distribution
Submission: On August 04 via api from BY — Scanned from DE
Submission: On August 04 via api from BY — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Solutions * Hotlines * Contact Us Kroll-Logo * Solutions * Hotlines * Contact Us Search-Icon * Quick links * Global Technology Outage and Implications for Businesses * Why High-Quality Data is Crucial to Fighting Financial Crime * Kroll Lowers Its Recommended U.S. Equity Risk Premium to 5.0% * Popular topics * Valuation Advisory Services * Compliance and Regulation * Corporate Finance and Restructuring * Cyber Risk * Investigations and Disputes * Digital Technology Solutions * Business Services * Environmental, Social and Governance Advisory Services (ESG) Search-Icon Burger-Icon * SOLUTIONS * INDUSTRIES * ABOUT * INSIGHTS * CAREERS * Valuation * Compliance and Regulation * Investigations and Disputes * Business Services * Cyber Risk * Corporate Finance and Restructuring * Digital Technology Solutions * Environmental, Social and Governance See All Solutions * Consumer and Retail * Financial Services * Industrials * Technology, Media and Telecom * Energy and Mining * Healthcare and Life Sciences * Real Estate See all Industries Who We Are * Overview * Our Experts * History * Locations * Newsroom Our Work * Client Stories * Transactions * Restructuring Administration Cases * Settlement Administration Cases Trending Topics * Anti-Money Laundering * Artificial Intelligence * Cost of Capital * Cryptocurrency * Cyber Risk * Financial Crime * M&A Updates * Valuation Outlook By Type * Blogs / Publications * Client Stories * Events * Webcasts and Videos CAREERS Learn about careers with us and search open job opportunities here. Cyber Mo, Jun 24, 2024 NOVEL TECHNIQUE COMBINATION USED IN IDATLOADER DISTRIBUTION Dave Truman Dave Truman Kroll’s Managed Detection and Response (MDR) team responded to an incident in which suspected malware was exhibiting strange download behavior. After successfully containing and resolving the incident, Kroll’s Cyber Threat Intelligence (CTI) team investigated further. The investigation uncovered a complex infection chain involving many layers of obfuscation being used to deliver IDATLOADER. Ultimately this would result in the deployment of information stealing malware. The infection hinged around utilizing Microsoft’s mshta.exe to execute code buried deep within a specially crafted file masquerading as a PGP Secret Key. The campaign made used of novel adaptations of common techniques and heavy obfuscation to hide the malicious code from detection the extent of which is described below. This incident involved a victim accessing a Bollywood pirate movie download site. When attempting to download a video, the victim was directed to a page hosted on Bunny CDN that provided a bit[.]ly link that ultimately download a ZIP file. Figure 1 – Download page providing link to zip file The downloaded ZIP file contained another ZIP file, which was password protected, along with a text file containing the password. The nested ZIP file contained a 192 MB LNK file along with a decoy “trailer” video file. The LNK file triggered the first element of the novel technique used in this infection chain for distributing IDATLOADER. The LNK file was using mshta.exe to execute what appeared to be a “PGP Secret Key,” hosted again hosted on Bunny CDN. The Microsoft binary mshta.exe is used to execute “HTML Application” files, which contain HTML markup and web technology scripting languages such as JavaScript. HTML applications should follow HTML standards including the use of supported character sets, since HTML is primarily text based. However, looking at the file being downloaded in a hex editor, it clearly contains a large amount of binary data. Figure 2– Downloaded “PGP Secret Key” clearly containing binary data Static analysis indicates that the file is not a legitimate PGP Secret Key, but an amalgamation of a large set of junk bytes, an embedded HTA file and an embedded EXE file. It is worth noting that junk non-printable bytes can be seen even inside the embedded HTA file. The reason the file is being interpreted by tooling as a PGP key is simply because the first two bytes of the file are the magic bytes for a “PGP Secret Sub-key”. The embedded EXE file is the legitimate calc.exe supplied with the Windows operating system, likely to add known good indicators for bypassing AI/ML detections. Figure 3 – Embedded HTA within suspicious binary download Figure 4 – Embedded calc.exe within suspicious binary download The file itself has an extremely low detection ratio on VirusTotal with only one out of 70 anti-virus engines detecting it as malicious. Figure 5 – Extremely low detections for the suspicious binary download From this it appears that mshta.exe will execute the HTA code hidden within this file even through the file itself is not a legitimate HTA containing HTML that meets the standard. The Kroll CTI team ran the file through the World Wide Web Consortium (W3C) HTML validator, which gave up validating when the number of parsing errors exceeded 1,000. Some example HTML errors that occurred were: * Forbidden code point * Malformed byte sequences * Non-space characters found without seeing a DOCTYPE first * Bad character after < * & did not start a character reference * A slash was not immediately followed by > * < in attribute name * Quote ' in attribute name It is common for web browsers to try to render an HTML page even if there are errors. This is because of the number of inconsistences between different web browsers, and poor coding practices or lack of testing by developers for the millions of websites on the internet. Microsoft’s mshta.exe continues this practice. But there is an important difference between a web browser and mshta.exe: Web browsers are usually sandboxed and do not allow the scripts to interact directly with the operating system, while mshta.exe scripts can interact with Windows without these restrictions. The technique used here allows a malicious script to potentially mimic hundreds of possible file types, many of which will be treated differently by various security tools depending on what file type they mimic, allowing for easy bypasses. The threat actor takes advantage of this behavior that the actor is taking advantage of to deploy IDATLOADER. The Kroll CTI team performed some testing to demonstrate this technique. We appended an HTA file that contained code to launch notepad.exe to a copy of calc.exe. The operating system detects the resulting file as a PE file. We then ran the resulting EXE file with mshta.exe and then directly from cmd.exe. When launched with mshta.exe. Notepad was launched without warnings or errors. Figure 6 – HTA code executing in mshta.exe regardless of file type and HTML standards nonconformity When the Kroll CTI team ran a generated test file directly from the command line without mshta.exe, the calc.exe image is started as a process. We then generated an HTA file with a series of deliberate bad bytes in the middle of the code and tested this. In this case, mshta.exe still ran the code to launch notepad.exe. Figure 7 – Test file appears as an EXE file when not opened with mshta.exe When we extracted the HTA code from the original fake PGP key file, the code was heavily obfuscated and even inside the HTA code there were random non-printable character sequences, making the code invalid for HTML. Figure 8 – HTA Code extracted from fake PGP Key File There were four layers of obfuscation. The first three were total obfuscation of the next stage in the obfuscation chain. The fourth stage had readable code, but certain variables had obfuscated content. Figure 9 – Stages 2, 3 and 4 of de-obfuscation Figure 10 – Stage 4 modified to make readable Once fully deobfuscated, the code can be seen to download two separate ZIP archives. The script uses an unzip function with interesting functionality: it will unzip the archive in %AppData% and try to use the ZIP file content as a command to execute. In the case of a ZIP file with lots of files, or with a file that is not executable, this will not work. However, if the ZIP archive contains only one executable file that file gets executed. This is where the second of the novel combination of techniques occurs. The first of the two ZIP archives, “K1.zip,” contained a large set of files while the second, “K2.zip,” contained a single EXE file. Figure 11 – Contents of downloaded zip files The file ‘jdekl.exe’ in K2.zip is the renamed legitimate binary RttHlp.exe from IOBit. The file “hydrogeology” looks like it’s an encrypted payload that gets decrypted and deployed by IDATLOADER, based on the presence of IDATLOADER marker bytes within the file. Figure 12 – IDAT Marker bytes within hydrogeology.wav Initially this appeared to be straightforward DLL sideloading a malicious Register.dll file. However on closer inspection this was not the case. Figure 13 – Executable being detected as compiled with Delphi The file itself appears to have been written and compiled in Delphi and lLooking at the imports for the EXE it is clear that this EXE does not import Register.dll; however, it does import VCL120.BPL. Instead of being a regular DLL, this is a Borland Package Library (BPL) file, which is a DLL-like file created by Borland for use with their suite of compilation tools (notably including Delphi). So, instead of traditional DLL sideloading, this is a case of BPL sideloading. At time of writing there is no MITRE sub-technique for BPL sideloading, we have raised a request for a new sub-technique to be added. Figure 14 – Screenshot showing BPL file being imported into EXE file Within the VCL120.BPL there exists code accessing the encrypted data file hydrogeology.wav, indicating this is the file containing the malicious IDATLOADER code. Figure 15 – Code within the malicious BPL accessing IDATLOADER encrypted file During testing, the Kroll CTI team has seen the chain starting with the fake PGP key file deploying LUMMASTEALER and another currently unidentified generic password stealer, which is currently being analyzed. ANALYSIS This IDATLOADER campaign is using a complex infection chain containing multiple layers of direct code-based obfuscation alongside innovative tricks to further hide the maliciousness of the code. This all resulted in a low detection ratio for the initial file. Tools that look at behavior are likely to have an easier time detecting this malware, as opposed to tools that rely heavily on signature-based technologies. As always it’s important to have defense in depth so, though a crafted and heavily obfuscated HTA file masquerading as an innocuous file might make it through perimeter scanning, it can still be detected by endpoint detection and response (EDR) or other technologies. DETECTION METHODS Threat actors continue to abuse the legitimate and trusted mshta.exe binary in attack chains, detecting this behavior was key in detecting both this infection and a previous incidents involving the TODDLERSHARK malware. Abnormal mshta.exe behavior is a high confidence indicator that malicious activity is taking place. System administrators may consider blocking execution or removing MSHTA altogether as its functionality is tied to older versions of Internet Explorer. Behavior Detection Method MITRE ATT&CK System Binary Proxy Execution:MSHTA Executing with URL Detect mshta.exe executing with URL parameters. e.g., ‘http://’, ‘https://’ etc. T1218.005 System Binary Proxy Execution:MSHTA Spawning cmd.exe Detect mshta.exe executing commands in cmd.exe or PowerShell T1218.005 Hijack Execution Flow: BPL Sideloading Detect sideloading of BPL files, alert on BPL loads that are uncommon or loaded using binaries executing from abnormal directories T1574 IOCS IOC Value Comment 97db294fe0daf6c8dd581ca8f7eacd573ff00416d00839fad252cfb0b127e462 K1.zip 2f4f9fae763b5c99421a845449240b305ecdc288804268e2a411db2cce8035c3 K2.zip 1da4ed3380f7477e728f6881129a20e33efcaa21191043eda902cf923332f924 hydrogeology.wmv d6dd7a4f46f2cfde9c4eb9463b79d5ff90fc690da14672ba1da39708ee1b9b50 rtl120.bpl 7d0f90081a1b3500d724731a5c2f1bf120267a4803a59e59c734bcaff291220b vcl120.bpl https://matodown[.]b-cdn[.]com/K1.zip Second stage download https://matodown[.]b-cdn[.]com/K2.zip Second stage download https://streamvideoz[.]b-cdn[.]com/Download-Video_HD.html Initial download Stay Ahead With Kroll -------------------------------------------------------------------------------- CYBER RISK Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory. Cyber Risk Cyber Risk CYBER THREAT INTELLIGENCE Threat intelligence are fueled by frontline incident response intel and elite analysts to effectively hunt and respond to threats. Cyber Threat Intelligence Cyber Threat Intelligence KROLL RESPONDER MDR Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response. Kroll Responder MDR Kroll Responder MDR -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- MANAGED SERVICES Processes and strategies to manage and optimize information produced through M&A, divestitures and integration. Managed Services Managed Services CYBER RISK RETAINER Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services. Cyber Risk Retainer Cyber Risk Retainer DIGITAL RISK PROTECTION Proactively safeguard your organization’s digital assets and accelerate visibility of online threats. Digital Risk Protection Digital Risk Protection KROLL IS HEADQUARTERED IN NEW YORK WITH OFFICES AROUND THE WORLD. 55 East 52nd Street 17 Fl New York NY 10055 +1 212 593 1000 Social-Icons Social-Icons Social-Icons Social-Icons Social-Icons Sign up to receive periodic news, reports, and invitations from Kroll. Our privacy policy describes how your data will be processed. Subscribe to Kroll More About Kroll * About * Solutions * Trending Topics * Client Stories * Careers * Find an Expert * Locations * Media Inquiry Global * Accessibility * Code of Conduct * Cookies * Data Privacy Framework * Disclosure * Kroll Ethics Hotline * Modern Slavery Statement * Privacy Policy * Licensing © 2024 Kroll, LLC. All rights reserved. Kroll is not affiliated with Kroll Bond Rating Agency, Kroll OnTrack Inc. or their affiliated businesses. Read more. Return to top We use cookies to remember users and provide the best possible experience. Some cookies are essential, others help us improve your experience through insights on how the site is used. Please visit ourcookie notice for more information. Manage Preferences Decline Accept All COOKIES PREFERENCE CENTER * YOUR PRIVACY * ESSENTIAL COOKIES * FUNCTIONAL COOKIES * ANALYTICS COOKIES * ADVERTISING COOKIES YOUR PRIVACY We use cookies to remember users and give you the best possible experience. Some cookies are essential, others help us improve your experience through insights on how the site is used. Please visit our cookie notice for more information. ESSENTIAL COOKIES Always Active These cookies are essential in order to enable you to move around the site and use its features. Without these cookies, services you have asked for cannot be provided. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to function. Certain functional cookies also allow us to respond to service or other inquiries received through a form. Cookies Details ANALYTICS COOKIES Analytics Cookies Analytics cookies track aggregate site performance, web speed, traffic sources, video plays and other aggregate data across the site. These cookies allow us to personalize web experience by type of visitor and, upon certain circumstances, by individual user. Individual user information is recognized through form completions or response to other marketing campaigns. Cookies Details ADVERTISING COOKIES Advertising Cookies Upon occasion, our firm advertises on certain media sites and these cookies track campaign performance. Cookies may be set by our firm or by our advertising partners. The cookies may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm Allow All