unit42.paloaltonetworks.com
Open in
urlscan Pro
104.71.188.216
Public Scan
URL:
https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/
Submission: On September 05 via api from US — Scanned from CA
Submission: On September 05 via api from US — Scanned from CA
Form analysis
1 forms found in the DOMName: Unit42_Subscribe — POST https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json
<form action="https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json" method="post" novalidate="" class="subscribe-form" name="Unit42_Subscribe" id="unit42footerSubscription_form">
<input type="hidden" name="emailFormMask" value="">
<input type="hidden" value="1086" name="formid">
<input type="hidden" value="531-OCS-018" name="munchkinId">
<input type="hidden" value="2141" name="lpId">
<input type="hidden" value="1203" name="programId">
<input type="hidden" value="1086" name="formVid">
<input type="hidden" name="mkto_optinunit42" value="true">
<input type="hidden" name="mkto_opt-in" value="true">
<div class="form-group">
<label for="newsletter-email" id="newsletter-email-label">Your Email</label>
<input type="emal" placeholder="Your Email" name="Email" class="subscribe-field" id="newsletter-email" aria-labelledby="newsletter-email-label">
<p class="error-mail mb-15 text-danger" style="color: #dc3545"></p>
<p>By submitting this form, you agree to our <a title="Terms of Use" href="https://www.paloaltonetworks.com/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="Get updates from Unit 42:Terms of Use">Terms of Use</a> and
acknowledge our <a title="Privacy Statement" href="https://www.paloaltonetworks.com/legal-notices/privacy" data-page-track="true" data-page-track-value="Get updates from Unit 42:Privacy Statement">Privacy Statement.</a></p>
<div class="g-recaptcha" data-expired-callback="captchaExpires" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
<p class="error-recaptcha d-none mt-15 text-danger" style="color: #dc3545">Invalid captcha!</p>
<button class="l-btn is-disabled" data-page-track="true" data-page-track-value="footer:Get updates from Unit 42:Subscribe" id="unit42footerSubscription_form_button"> Subscribe <img
src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/right-arrow.svg" alt="Right Arrow" class="arrow">
<img src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/icon-loader.svg" alt="loader" class="loader">
</button>
<div class="form-success-message"></div>
</div>
</form>
Text Content
Menu * Tools * ATOMs * Security Consulting * About Us * Under Attack? * * About Unit 42 * Services Services Assess and Test Your Security Controls * AI Security Assessment * Attack Surface Assessment * Breach Readiness Review * BEC Readiness Assessment * Cloud Security Assessment * Compromise Assessment * Cyber Risk Assessment * M&A Cyber Due Diligence * Penetration Testing * Purple Team Exercises * Ransomware Readiness Assessment * SOC Assessment * Supply Chain Risk Assessment * Tabletop Exercises * Unit 42 Retainer Transform Your Security Strategy * IR Plan Development and Review * Security Program Design * Virtual CISO * Zero Trust Advisory Respond in Record Time * Cloud Incident Response * Digital Forensics * Incident Response * Managed Detection and Response * Managed Threat Hunting * Unit 42 Retainer UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more * Unit 42 Threat Research Unit 42 Threat Research Unit 42 Threat Research * Threat Briefs and Assessments Details on the latest cyber threats * Tools Lists of public tools released by our team * Threat Reports Downloadable, in-depth research reports THREAT REPORT 2024 Unit 42 Incident Response Report Read now THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT REPORT Highlights from the Unit 42 Cloud Threat Report, Volume 6 Learn more * Partners Partners Partners * Threat Intelligence Sharing * Law Firms and Insurance Providers THREAT REPORT 2022 Unit 42 Ransomware Threat Report: Understand trends and tactics to bolster defenses Learn more THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT BRIEF Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email Compromise Ring Members Learn more * Resources Resources Resources * Research Reports * Webinars * Customer Stories * Datasheets * Videos * Infographics * Whitepapers * Cyberpedia Industries * Financial Services * Healthcare * Manufacturing ANALYST REPORT Unit 42® has been named a Leader in “The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024.” Read the Forrester report to learn why. Get the report THREAT REPORT 2024 Unit 42 Incident Response Report: Get the latest threat insights and expert recommendations to safeguard your organization better. Learn more * * Under Attack? Search All * Tech Docs Close search modal * Threat Research Center * Threat Research * Malware Malware SPOOFED GLOBALPROTECT USED TO DELIVER UNIQUE WIKILOADER VARIANT 12 min read Related Products Advanced DNS SecurityAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesCode to Cloud PlatformCortexCortex XDRManaged Threat HuntingPrisma CloudUnit 42 Incident Response * By: * Mark Lim * Tom Marsden * Published:2 September, 2024 at 3:00 AM PDT * Categories: * Malware * Threat Research * Tags: * DLL Sideloading * Emotet * Evasion * Loader as a service * Malvertising * SEO poisoning * Spoof * WailingCrab * WikiLoader * * Share * * * * * * * EXECUTIVE SUMMARY The Unit 42 Managed Threat Hunting team (MTH) identified a variant of WikiLoader loader for rent (aka WailingCrab) being delivered via SEO poisoning and spoofing our GlobalProtect VPN software. Analysis conducted by the Advanced WildFire reverse engineering team has uncovered the latest evasion techniques for WikiLoader, providing new insights into its evolution. We provide multiple XQL queries for Cortex XDR to hunt for this WikiLoader campaign. We also provide hashes that identify samples found in the wild as well as command and control (C2) URLs extracted from the original sample that spoofed GlobalProtect. Palo Alto Networks customers are better protected from the threats discussed in this article through detection mechanisms available from the following products: * Cortex XDR * Next-Generation Firewall with Cloud-Delivered Security Services * Advanced WildFire * Advanced DNS Security * Advanced URL Filtering * The Prisma Cloud Cloud Security Agent (CSA) Additionally, Google has confirmed that all sites mentioned in this article are known to Safe Browsing. Any user that visits these sites will receive a warning of potential security risks. Related Unit 42 Topics Malvertising, DLL Sideloading OVERVIEW OF TRADECRAFT USED BY WIKILOADER IN CAMPAIGNS SPOOFING GLOBALPROTECT WikiLoader is a multistage malware loader that adversaries developed with consideration toward evasion. Our industry partners have documented this threat well. As such, we’ll focus on the specific tradecraft we observed related to campaigns spoofing GlobalProtect, anti-analysis techniques employed by the loader and resources for threat hunters. Proofpoint has reported WikiLoader has been active since at least late 2022. They also noted that phishing was initially the primary means of delivery. Its operators used compromised WordPress sites and public MQ Telemetry Transport (MQTT) brokers for C2. We have not observed the follow-on payloads from complete WikiLoader infections. However, Proofpoint reported attackers used the threat to deliver banking Trojans such as Danabot and Ursnif/Gozi to organizations based in Italy. In June 2024, we observed a WikiLoader campaign leveraging GlobalProtect themed SEO poisoning, rather than using previously documented phishing tactics. SEO poisoning is the process of getting an attacker-controlled site on the front page of search engine results for a legitimate product through purchasing advertisements or improving page rank. Attackers commonly use SEO poisoning as an initial access vector to trick people into visiting a page that spoofs the legitimate search result to deliver malware rather than the searched-for product. This campaign’s delivery infrastructure leveraged cloned websites relabeled as GlobalProtect along with cloud-based Git repositories. Unit 42 primarily observed WikiLoader affecting the U.S. higher education and transportation sectors. However, the use of SEO poisoning for delivery almost certainly broadens the scope of possible victims as compared to phishing. WikiLoader is a loader for rent, which is suspected to be leveraged by at least two initial access brokers (IABs). Attribution for this specific campaign requires further research. However, we do make the following observations. * Campaigns leveraging WikiLoader and spoofing GlobalProtect have shown reasonable regard for evasion * The threat operators show an awareness of simple techniques that, when executed well, make machine and signature-based detection of such threats difficult Such OPSEC considerations include: * Using the MQTT internet of things (IoT) event queue protocol for C2 * Typosquatting and spoofing download pages modified to deliver WikiLoader throughout the life of a campaign * Using legitimate sites running vulnerable, third-party WordPress plugins as C2 infrastructure * Using cloud-hosted Git solutions to host malicious content * Using legitimate, signed binaries for sideloading WikiLoader * Using common file names associated with security tooling, where allowlistings in security products would reduce detection and response efficacy * Embedding payloads in seemingly benign file names and types * Hiding attributes for all files except the file that receives user interaction * Encrypting shellcode that is stored in separate binaries from the WikiLoader executables * Decrypting keys for shellcode that operators stored in the C2 servers * Performing multiple anti-analysis checks * Displaying fake error messages on execution Figure 1 provides a summary of the infection chain. Figure 1. Attack diagram from the delivery through WikiLoader backdoor Execution. Source: Inspired by attack flow detailed in AhnLab blog, "'Totally Unexpected' Package Malware Using Modified Notepad++ Plug-in (WikiLoader)." DELIVERY AND EXECUTION The following section details the execution of WikiLoader as delivered through GlobalProtect-based SEO poisoning. The advertisements we observed linked to multiple fake sites serving spoofed GlobalProtect installers. Figure 2 shows a malicious advertisement that attackers used to lure victims to a spoofed GlobalProtect download page. Figure 2. Google ad linked to the websites to download spoofed GlobalProtect. The first site is a clone of a legitimate business that fetches the malicious payload upon download shown in Figure 3. Bitbucket took the site offline when we notified them of it. Figure 3. A cloned website that directs users to download the spoofed GlobalProtect installer hosted on Bitbucket. The second site shown in Figure 4 is a site that spoofs the GlobalProtect client download page. Figure 4. A cloned GlobalProtect page that directs users to download spoofed GlobalProtect installers. Upon download, Cortex XDR shows the following information associated with Chrome where the sample is enriched with Mark of the Web (MotW) data as shown in Figure 5. MotW is a security feature in Windows that adds metadata to files downloaded from the internet to indicate a potentially unsafe source. Analysts can use this information to assist in understanding the source of a file, and where someone may have been browsing before downloading the file. Figure 5. File write and read of the GlobalProtect64.zip file enriched with MotW data streams indicating one of the download URLs in the File Origin text area. Figure 6 shows how the sample appears to the victim. The sample only shows a single file in the folder. Figure 6. The contents of GlobalProtect64.zip following extraction as viewed by a user. Figure 7 shows that when viewing all the hidden files and folders, there are more than 400 files. Figure 7. The contents of GlobalProtect64.zip following extraction, showing hidden items. Figure 8 shows what we see when viewing all files in the archive and checking the signer. GlobalProtect64.exe is a renamed copy of a legitimate share trading application that attackers used to sideload the first WikiLoader component. Figure 8. A screenshot of Cortex XDR showing a copy of the trading platform renamed as GlobalProtect64.exe being abused to sideload the first WikiLoader loader component (i4jinst.dll) upon execution. Figure 9 shows that upon execution of GlobalProtect64.exe, the threat loads the first WikiLoader component i4jinst.dll, located inside the directory .install4j. Figure 9. A screenshot of Cortex XDR events associated with spoofed GlobalProtect64.exe. The i4jinst.dll Load Image event causes the malicious module to be loaded into the binary spoofing GlobalProtect64.exe. Once loaded, i4jinst.dll reads the first stage encrypted shellcode from certificate.pem. It then decrypts the shellcode and injects it into explorer.exe. This includes the following discrete actions: 1. The decrypted certificate.pem contains the first stage shellcode that is executed 2. The shellcode loads C:\Windows\System32\BingMaps.dll 3. The function GetBingMapsFactory is then overwritten with another shellcode decrypted from certificate.pem 4. The overwritten shellcode then carries out thread injection into the explorer.exe process At this point in the infection chain, Cortex’s shellcode prevention raised alerts as shown in Figure 10. Figure 10. Cortex shellcode protection prevents the injection from the malicious process into explorer.exe. If unprevented, the injected code in explorer.exe will contact a compromised site running WordPress CMS as a C2 server for the WikiLoader backdoor. It will then establish persistence and communicate with MQTT brokers for tasking. The injected code will load license_us_EN.html. In the GlobalProtect spoofing campaign, license_us_EN.html is a renamed copy of the AdInsight.exe Microsoft Sysinternals binary. License_us_EN.html will side load the WikiLoader backdoor downloaded from the C2 server. Upon establishing persistence, AdInsight.exe (renamed to license_us_EN.html) will be renamed again to a random filename. This file will be written into a randomly named folder in ProgramData along with a randomly named file with the extension .pem and the WikiLoader backdoor as a .dll. This process is shown in Figure 11. Figure 11. Files contained in a randomly named directory when WikiLoader writes persistence components to disk. In testing environments where shellcode protection was disabled, Cortex XDR still generated an analytic behavioral indicator of compromise (BIOC) detection for the unusual creation of a scheduled task created by explorer.exe following the shellcode injection. In summary, the infection chain is as follows: 1. Malicious behaviors begin when the victim launches GlobalProtect64.exe and this file then loads i4jinst.dll (located inside .install4j) 2. Once loaded, i4jinst.dll will read and decrypt the contents of the file certificate.pem 3. The decrypted certificate.pem contains the first stage shellcode that the threat executes 4. The shellcode loads C:\Windows\System32\BingMaps.dll 5. The function GetBingMapsFactory is then overwritten with another shellcode decrypted from certificate.pem 6. The overwritten shellcode then carries out thread injection into the explorer.exe process 7. The injected code in the explorer.exe process will contact the C2 server for the WikiLoader backdoor 8. If persisting, the threat will write license_us_EN.html and another file with extension .pem to a randomly named folder in ProgramData along with the WikiLoader backdoor as a .dll 9. The threat will establish persistence via a scheduled task to execute the renamed license_us_EN.html 10. The injected code will read and execute a hidden PE file from license_us_EN.html 11. License_us_EN.html will side load the WikiLoader backdoor downloaded from the C2 server 12. The backdoor will decrypt the shellcode encrypted in the randomly named file with extension .pem. The decryption key is the name of the folder where the backdoor is located. We have added additional protections to Cortex, and we share a collection of hunting rules written in XQL at the end of this post. HIGHLIGHTING WIKILOADER ANTI-ANALYSIS AND DEFENSE EVASION The following are some unique tricks that this sample of WikiLoader used. FAKE ERROR MESSAGE As the spoofed GlobalProtect installer is not an actual installer, the authors of WikiLoader needed another trick to fool victims. The threat shows a fake error message when it completes infection of the victim machine. This prevents the victim from wondering why GlobalProtect is not installed. Figure 12 shows the fake error message generated by the sample. Figure 12. Fake error message displayed when the sample completes infection RENAMED LEGITIMATE SOFTWARE USED FOR SIDE-LOADING BACKDOOR Attackers renamed the Microsoft Sysinternals tool ADInsight.exe to license_us_EN.html, and hid it inside the spoofed GlobalProtect installer. ADInsight.exe is used to side load the WikiLoader backdoor. Figure 13 shows the contents of license_us_EN.html. Figure 13. Hex dump of license_us_EN.html showing it is a PE file. CHECKS FOR ANALYSIS ENVIRONMENTS The sample checks the running processes in the victim machine against a list of hashes of software commonly used by malware analysts. As most malware analysts would be using a virtualized environment to analyze malware samples, the WikiLoader sample will terminate if it finds processes related to virtual machine software. To hide the list of processes that WikiLoader is looking for, the malware uses a 32-bit hashing routine similar to those used by Emotet back in 2021. Figure 14 shows the hashing routine used by this WikiLoader sample. Figure 14. Hashing routine used to obfuscate the analysis processes from above. FOLDER NAME AS DECRYPTION KEY FOR THE BACKDOOR The backdoor is encrypted using the CryptUnprotectData API. This sample of WikiLoader used the folder name (RamDQ) as the decryption key for its backdoor. Figure 15 shows the folder named RamDQ, which contained the encrypted backdoor 1FoWZv.pem and the executables (s2VT3.exe and version.dll) required to decrypt and execute the backdoor. Figure 15. Screenshot showing CryptUnprotectData being passed the folder name, ultimately to be used to decrypt the shellcode in 1FoWZv.pem. CONCLUSION Financially motivated threat actors will continue to use WikiLoader as a loader for rent in a variety of campaigns where they require a robust, stealthy Windows loader that pays reasonable attention to OPSEC. What remains to be seen is why threat actors have shifted from phishing to SEO poisoning to deliver WikiLoader. One hypothesis is that another initial access broker (IAB) has begun to work with WikiLoader to operationalize its delivery through SEO poisoning in recent months. Alternatively, groups that are publicly tracked using WikiLoader could have shifted to SEO poisoning from phishing after an improvement in endpoint security controls or industry reporting disrupted their operations. While SEO poisoning is not a new technique, it continues to be an effective way to deliver a loader to an endpoint. Spoofing trusted security software is likely to assist in bypassing endpoint controls at organizations that rely on filename based allow listing. The combination of spoofed, compromised and legitimate infrastructure leveraged by WikiLoader campaigns reinforces the malware authors attention to building an operationally secure and robust loader, with multiple C2 configurations. The authors suspect that we will likely see continued WikiLoader use throughout 2024 and beyond. Regardless of the anti-analysis and EDR evasion techniques employed by WikiLoader, the procedures employed can be identified using many common endpoint threat hunting methods. We share a selection of four queries in our appendix that organizations can use to hunt for WikiLoader with high fidelity in endpoint data. The queries can be expanded in scope with minimal changes from XQL users to cast a wider net, or narrow in on threats that may be more applicable to an organization’s environment. Google has confirmed that all sites mentioned in this article are known to Safe Browsing. Any user that visits these sites will receive a warning of potential security risks. PALO ALTO NETWORKS PROTECTION AND MITIGATION Palo Alto Networks customers are better protected from the threats discussed above through the following products: * Next-Generation Firewall with Cloud-Delivered Security Services, including Advanced WildFire, detect the files mentioned within this report as malicious. Additionally Advanced URL Filtering and Advanced DNS Security identify known URLs and domains associated with this activity as malicious. * Cortex XDR customers are better protected against the sideloads and shellcode injection attempts mentioned in the article. Cortex XDR detects and prevents these malware activities based on Behavioral Threat Protection, AI-driven local analysis, analytics profiles and other security engines across Windows, Linux and Mac systems. * Prisma Cloud can detect known WikiLoader binaries executed from within cloud environments through the Cloud Security Agent (CSA). If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: * North America Toll-Free: 866.486.4842 (866.4.UNIT42) * EMEA: +31.20.299.3130 * APAC: +65.6983.8730 * Japan: +81.50.1790.0200 Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance. XQL HUNTING QUERIES Explorer.exe communicating with MQTT brokers // Description: Communication to known MQTT broker services from explorer.exe. Observed samples have communicated with MQTT brokers over over plaintext or encrypted TCP ports, not using websockets. Typically these are TCP 1883,8883,8884 config case_sensitive = false | dataset=xdr_data | filter event_type = ENUM.STORY | filter dst_action_external_hostname in ("broker.emqx.io","broker-cn.emqx.io","mqtt.eclipseprojects.io","test.mosquitto.org","broker.hivemq.com","*mqtt.one","*iotbind.com") and actor_process_image_name = "explorer.exe" and action_remote_port not in (53,80,443) | fields _time, agent_hostname, agent_ip_addresses, actor_effective_username, actor_process_image_name, actor_process_image_path, dst_action_external_hostname, action_remote_port, action_remote_ip 1 2 3 4 5 6 7 8 9 10 11 // Description: Communication to known MQTT broker services from explorer.exe. Observed samples have communicated with MQTT brokers over over plaintext or encrypted TCP ports, not using websockets. Typically these are TCP 1883,8883,8884 config case_sensitive = false | dataset=xdr_data | filter event_type = ENUM.STORY | filter dst_action_external_hostname in ("broker.emqx.io","broker-cn.emqx.io","mqtt.eclipseprojects.io","test.mosquitto.org","broker.hivemq.com","*mqtt.one","*iotbind.com") and actor_process_image_name = "explorer.exe" and action_remote_port not in (53,80,443) | fields _time, agent_hostname, agent_ip_addresses, actor_effective_username, actor_process_image_name, actor_process_image_path, dst_action_external_hostname, action_remote_port, action_remote_ip Common DLL sideload targets (step 8 in infection chain) // Description: Processes that have have written 2 PEs, one must be a .exe, and the // other a .dll with a name commonly abused for search order hijacking. config case_sensitive = false | dataset = xdr_data // Get DLL and Exe writes excluding users and program files directories. | filter event_type = ENUM.FILE and event_sub_type in (ENUM.FILE_WRITE, ENUM.FILE_CREATE_NEW) and action_file_extension IN ("dll","exe") and action_file_path !~= "C\:\\(?:Users|Program\sFiles(\s\(x86\))?)\\.*" // Collate the file writes by the actor (writing) process | comp count_distinct(action_file_path) as cnt_pe_written, count_distinct(action_file_extension) as cnt_pe_extensions, count_distinct(action_file_signature_status) as cnt_pe_sig_status, values(action_file_path) as pe_written, values(action_file_signature_status) as action_file_signature_status, values(action_file_signature_vendor) as action_file_signature_vendor, values(action_file_signature_product) as action_file_signature_product, values(actor_effective_username) as username, values(action_file_sha256) as action_file_sha256, values(_time) as time, values(actor_process_command_line) as command_line, values(action_file_name) as pe_written_name, values(agent_hostname) as agent_hostname by actor_process_instance_id // Filter out those that have only written 1 Exe and 1 DLL, with a DLL using a known abused name | filter cnt_pe_written=2 and cnt_pe_extensions=2 and pe_written_name ~= "^(?:vcruntime140|vcruntime|oci|version|msfte|secur32|nw|rw32core|iphlpapi|wininet)\.dll" | filter pe_written_name not in ("*cortex-xdr-payload*","*xdrhealth.exe*","*winpty-agent.exe*") 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 // Description: Processes that have have written 2 PEs, one must be a .exe, and the // other a .dll with a name commonly abused for search order hijacking. config case_sensitive = false | dataset = xdr_data // Get DLL and Exe writes excluding users and program files directories. | filter event_type = ENUM.FILE and event_sub_type in (ENUM.FILE_WRITE, ENUM.FILE_CREATE_NEW) and action_file_extension IN ("dll","exe") and action_file_path !~= "C\:\\(?:Users|Program\sFiles(\s\(x86\))?)\\.*" // Collate the file writes by the actor (writing) process | comp count_distinct(action_file_path) as cnt_pe_written, count_distinct(action_file_extension) as cnt_pe_extensions, count_distinct(action_file_signature_status) as cnt_pe_sig_status, values(action_file_path) as pe_written, values(action_file_signature_status) as action_file_signature_status, values(action_file_signature_vendor) as action_file_signature_vendor, values(action_file_signature_product) as action_file_signature_product, values(actor_effective_username) as username, values(action_file_sha256) as action_file_sha256, values(_time) as time, values(actor_process_command_line) as command_line, values(action_file_name) as pe_written_name, values(agent_hostname) as agent_hostname by actor_process_instance_id // Filter out those that have only written 1 Exe and 1 DLL, with a DLL using a known abused name | filter cnt_pe_written=2 and cnt_pe_extensions=2 and pe_written_name ~= "^(?:vcruntime140|vcruntime|oci|version|msfte|secur32|nw|rw32core|iphlpapi|wininet)\.dll" | filter pe_written_name not in ("*cortex-xdr-payload*","*xdrhealth.exe*","*winpty-agent.exe*") Processes executing as GlobalProtect without a parsed Palo Alto Networks certificate. // Description: A signed process starts with GlobalProtect or PanGP in the image name, but is not signed by a known Palo Alto Networks certificate. config case_sensitive = false | dataset=xdr_data | filter event_type IN (ENUM.PROCESS) and event_sub_type = ENUM.PROCESS_START | filter (action_process_image_name contains "GlobalProtect" or action_process_image_name contains "PanGP") and action_process_signature_vendor not in ("Palo Alto Networks","Palo Alto Networks (Netherlands) B.V.","Developer ID Application: Palo Alto Networks (PXPZ95SK77)","Palo Alto Networks, Inc") and action_process_signature_status=ENUM.SIGNED | fields _time, agent_hostname, actor_effective_username, action_process_image_path , action_process_image_command_line , action_process_image_sha256, action_process_signature_status, action_process_signature_vendor, action_process_signature_product, action_process_image_sha256, actor_process_image_path , os_actor_process_command_line, causality_actor_process_command_line 1 2 3 4 5 6 7 8 9 10 11 // Description: A signed process starts with GlobalProtect or PanGP in the image name, but is not signed by a known Palo Alto Networks certificate. config case_sensitive = false | dataset=xdr_data | filter event_type IN (ENUM.PROCESS) and event_sub_type = ENUM.PROCESS_START | filter (action_process_image_name contains "GlobalProtect" or action_process_image_name contains "PanGP") and action_process_signature_vendor not in ("Palo Alto Networks","Palo Alto Networks (Netherlands) B.V.","Developer ID Application: Palo Alto Networks (PXPZ95SK77)","Palo Alto Networks, Inc") and action_process_signature_status=ENUM.SIGNED | fields _time, agent_hostname, actor_effective_username, action_process_image_path , action_process_image_command_line , action_process_image_sha256, action_process_signature_status, action_process_signature_vendor, action_process_signature_product, action_process_image_sha256, actor_process_image_path , os_actor_process_command_line, causality_actor_process_command_line Review ZIP files with GlobalProtect naming that have Mark of the Web applied for suspicious download sources // Description: Delivery via .zip files is common, display those that were downloaded with Mark of the Web data. config case_sensitive = false | dataset=xdr_data | filter event_type=ENUM.FILE and event_sub_type IN (ENUM.FILE_OPEN, ENUM.FILE_CREATE_NEW) | filter action_file_extension="zip" and action_file_path ~= "Downloads|Appdata" and action_file_name contains "GlobalProtect" and not action_file_name contains "GlobalProtectLogs" | fields _time, event_sub_type, agent_hostname, actor_effective_username, action_file_name, action_file_path, action_file_web_mark, action_file_sha256 , actor_process_image_name, actor_process_image_sha256 1 2 3 4 5 6 7 8 9 10 11 // Description: Delivery via .zip files is common, display those that were downloaded with Mark of the Web data. config case_sensitive = false | dataset=xdr_data | filter event_type=ENUM.FILE and event_sub_type IN (ENUM.FILE_OPEN, ENUM.FILE_CREATE_NEW) | filter action_file_extension="zip" and action_file_path ~= "Downloads|Appdata" and action_file_name contains "GlobalProtect" and not action_file_name contains "GlobalProtectLogs" | fields _time, event_sub_type, agent_hostname, actor_effective_username, action_file_name, action_file_path, action_file_web_mark, action_file_sha256 , actor_process_image_name, actor_process_image_sha256 INDICATORS OF COMPROMISE These indicators were active throughout June 2024. Delivery URLs * URL: hxxps://globalprotect[.]securedownload[.]today/GlobalProtect64.zip Description: URL serving archive impersonating GlobalProtect. * URL: hxxps://globalprojectvpn[.]com Description: Fake GlobalProtect site that delivers fake GlobalProtect64.zip * URL: hxxps://globalprojectvpn[.]com Description: Fake GlobalProtect site that pulled from a Bitbucket project to deliver fake GlobalProtect64.zip * URL: hxxps://bitbucket[.]org/bitprotect/globalproject/src/main/ Description: Bitbucket project that hosted fake GlobalProtect64.zip WikiLoader C2 URLs * hxxps://carniceriamartinezadria.com/wp-content/themes/twentytwentyfour/rleoec.php?id=1 * hxxps://jlholgado.com/wp-content/themes/twentytwentyfour/zca2ck.php?id=1 * hxxps://elpgtextil.com/wp-content/themes/twentytwentyfour/44snwx.php?id=1 * hxxps://arbeitsschutz-mmk.de/plugins/search/contacts/chrndi.php?id=1 * hxxps://www.estudioemm.com/wp-content/themes/twentytwelve/d4kih3.php?id=1 Description: C2 providing the decryption key to the payload of the WikiLoader sample SHA-256 hashes for WikiLoader shellcode loader DLLs * d4eb9a4ee389f03c402e553724015af8d5b85835828bd66b1b45131b6837802f * 534c989d110ece8c429d2ded913933b961710726d8655b858474bc31dfed25c3 * a001642046a6e99ab2b412d96020a243a221e3819eaac94ab3251fad7d20614b * c6c250e1cd6d5477b46871ffe17deac248d723ad45687fc54ae4fc5e3f45d91c * f1a49cea454bac3e78ac765b247b65d00c896d84de2028892b00d4310453c665 * 2ab449666cf006125075e3ded8053cdfd318e4772d4145f0fa861f1d42cb2b08 * 1d6f76acecff63fb373b5774a3cb34b87266a4a4bbb8e3a0757d107187d280ee * b412b2c190b8406392406d9a8e3abce91c9014950bcf835eb7d9b50d0f128cb0 * 66735d0178badf035be0e142f4fb8e23d860bfc9bbdc3e12ad1f2764de91ee9b * edec55f87e535f869119db44e4e7302081f53dbf33a27aaf905430cedc5a78b9 * 148b29123bb0c28614858460d7a10707469fecebd6a9ff1da98a0c76a89a9819 * 0de42118dd0cd861bea13de097457ccb407aae901b14e0bec59b0abe660cdf1f * 5576ab87eb11ca4d2944bc1c2c6a8c349e18c7ded583c1ba9bd99eff9d8ac4d7 * 551da6814a01a280afe90aa6bb238f499d98ad496c0d8472a1705540a6f422da * 4f573ab13882efa234a79483d305b3001cb09c0a166ff94c925844b860162415 * 4f2079cd2e228a2777df45ae00714c8679531fd8ad82a66b5c1b10e800771f18 * 2add886330db1480da7314ee38428ca79af04f8c461c3bbbd68e202bb5f4c415 * 76d1a876c90ec16f44685f795e64ab84bd2d3f5a91db659c9879b3461ee104f9 * 6aa4a830aa8d89b629fe87d3d3e986042215b5bcd670417933fca854b6dd58d9 * 1c1d739f0282bfd9367e29ca81c61ed4a731e5150a836d0371e5e9d0121c9dfd * 69a94bbed366bfd917dfd8fb6e5fd7ba52e2dbf338edd0c259654981060943c8 * 9a48f32e00877a4335206c7da45a94ca8bd46648d3a0bc88e0789dabf8139024 * c3280452e7c96253b215342f2fac14634591adf68f88bcf7dc920d5f28022cd6 * 0c44a46f1c8e46fe6b6f83ec249c95301aca1bc4765cee7bdadd021bbfd2ff66 * 2b8b3f5b692f716116a1468b8d7b273baf7a6cef0726e831cd307d2f2c7452ec * e07787caf52dd3e7dd0da600dbd1d909f3799dcebcdc60d101baf3ea17ef1e32 * 50810e4696dd075ca23349e3e1c3a87fc7b46ab89f4b1eb093a5cfb74f84cc51 * 912cc2a3592b3b7835205d275cbf92bb66effc99cbd5cc338a223888de1b0d35 * f04715827e5453b33ba6fae8475b8c45150b27cc1361441648c46d13025283d2 * e693652763141522621f9fcd80efb30cefa363f8bd9bdc65e5ffbf9fb8d76d3b * 8d5e185d53e81e90646d684dff7cb399973e3cde6d833e6f7431074f4362139a * ec59616b1c80951d6597d4f25a9c031be0391151dc1073a5bece466473f0bdfe * e7e674218a7d93595e33a092f4f519a65499651a398ca350f5a50e135e64fa41 * 78f6f94aaa72e41d64e4dc309a3553399db2b4cd0edae5653ca4b6e7839e1215 * abce298ebb4ac7bc1a5167179875afc88e7e99475bf681953e8b964237b7d7ed * 82ec4e1a6ddf6eeb4030d6dd698f4576d0445d4d5722d5c60b0cc74ac501bb85 * 0d495a94e29faa4dfded29253322be1b2c534a56c078bea1ad8f1dc1fd23b742 SHA-256 hashes for WikiLoader backdoor * 4044a0d7a0ed7f66efc2bd13616ec63a5722fc7a73a28fe3bda513f60ef24dd9 * c9eaaa6aee55704ce651c8b4cde7949cfa9711e05a136fa15f234d1bb2ea994c ADDITIONAL RESOURCES * Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool – Trend Micro * X thread on spoof of GlobalProtext– @malwrhunterteam, X * Protection Highlight: WikiLoader Returns – Broadcom * 20mb zip drop via discord – @pr0xylife, X * Stealthy WailingCrab Malware misuses MQTT Messaging Protocol – Security Intelligence, IBM Updated Sept. 4, 2024, at 1:20 p.m. PT to include clarifying language from Google. Back to top TAGS * DLL Sideloading * Emotet * Evasion * Loader as a service * Malvertising * SEO poisoning * Spoof * WailingCrab * WikiLoader Threat Research Center Next: TLD Tracker: Exploring Newly Released Top-Level Domains TABLE OF CONTENTS * * Executive Summary * Overview of Tradecraft Used by WikiLoader in Campaigns Spoofing GlobalProtect * * Delivery and Execution * Highlighting WikiLoader Anti-Analysis and Defense Evasion * Fake Error Message * Renamed Legitimate Software Used for Side-Loading Backdoor * Checks for Analysis Environments * Folder Name as Decryption Key for the Backdoor * Conclusion * Palo Alto Networks Protection and Mitigation * XQL Hunting Queries * Indicators of Compromise * Additional Resources RELATED ARTICLES * DarkGate: Dancing the Samba With Alluring Excel Files * Dissecting GootLoader With Node.js * Payload Trends in Malicious OneNote Samples RELATED MALWARE RESOURCES Threat Research ATTACKERS EXPLOITING PUBLIC COBALT STRIKE PROFILES * Cobalt Strike * Malleable C2 profile Read now Threat Research OPERATION DIPLOMATIC SPECTER: AN ACTIVE CHINESE CYBERESPIONAGE CAMPAIGN LEVERAGES RARE TOOL SET TO TARGET GOVERNMENTAL ENTITIES IN THE MIDDLE EAST, AFRICA AND ASIA * Advanced Persistent Threat * Backdoor * China Read now Threat Research PAYLOAD TRENDS IN MALICIOUS ONENOTE SAMPLES * Malvertising * Microsoft OneNote * Phishing Read now Threat Actor Groups FIGHTING URSA LURING TARGETS WITH CAR FOR SALE * Advanced Persistent Threat * APT28 * Fancy Bear Read now Threat Research SCAM ATTACKS TAKING ADVANTAGE OF THE POPULARITY OF THE GENERATIVE AI WAVE * ChatGPT * GenAI * Cybersquatting Read now Threat Research ACCELERATING ANALYSIS WHEN IT MATTERS * Remote Access Trojan * Memory detection * Redline infostealer Read now Threat Research BEWARE OF BADPACK: ONE WEIRD TRICK BEING USED AGAINST ANDROID DEVICES * Android APK * APK * Cerberus trojan Read now Threat Research DARKGATE: DANCING THE SAMBA WITH ALLURING EXCEL FILES * Sandbox * Microsoft Excel * Malware-as-a-service Read now Threat Research DISSECTING GOOTLOADER WITH NODE.JS * Sandbox * Memory detection * Anti-analysis Read now Threat Research ATTACKERS EXPLOITING PUBLIC COBALT STRIKE PROFILES * Cobalt Strike * Malleable C2 profile Read now Threat Research OPERATION DIPLOMATIC SPECTER: AN ACTIVE CHINESE CYBERESPIONAGE CAMPAIGN LEVERAGES RARE TOOL SET TO TARGET GOVERNMENTAL ENTITIES IN THE MIDDLE EAST, AFRICA AND ASIA * Advanced Persistent Threat * Backdoor * China Read now Threat Research PAYLOAD TRENDS IN MALICIOUS ONENOTE SAMPLES * Malvertising * Microsoft OneNote * Phishing Read now Threat Actor Groups FIGHTING URSA LURING TARGETS WITH CAR FOR SALE * Advanced Persistent Threat * APT28 * Fancy Bear Read now Threat Research SCAM ATTACKS TAKING ADVANTAGE OF THE POPULARITY OF THE GENERATIVE AI WAVE * ChatGPT * GenAI * Cybersquatting Read now Threat Research ACCELERATING ANALYSIS WHEN IT MATTERS * Remote Access Trojan * Memory detection * Redline infostealer Read now Threat Research BEWARE OF BADPACK: ONE WEIRD TRICK BEING USED AGAINST ANDROID DEVICES * Android APK * APK * Cerberus trojan Read now Threat Research DARKGATE: DANCING THE SAMBA WITH ALLURING EXCEL FILES * Sandbox * Microsoft Excel * Malware-as-a-service Read now Threat Research DISSECTING GOOTLOADER WITH NODE.JS * Sandbox * Memory detection * Anti-analysis Read now Threat Research ATTACKERS EXPLOITING PUBLIC COBALT STRIKE PROFILES * Cobalt Strike * Malleable C2 profile Read now Threat Research OPERATION DIPLOMATIC SPECTER: AN ACTIVE CHINESE CYBERESPIONAGE CAMPAIGN LEVERAGES RARE TOOL SET TO TARGET GOVERNMENTAL ENTITIES IN THE MIDDLE EAST, AFRICA AND ASIA * Advanced Persistent Threat * Backdoor * China Read now Threat Research PAYLOAD TRENDS IN MALICIOUS ONENOTE SAMPLES * Malvertising * Microsoft OneNote * Phishing Read now * * Get updates from Unit 42 PEACE OF MIND COMES FROM STAYING AHEAD OF THREATS. CONTACT US TODAY. Your Email By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Invalid captcha! Subscribe PRODUCTS AND SERVICES * Network Security Platform * CLOUD DELIVERED SECURITY SERVICES * Advanced Threat Prevention * DNS Security * Data Loss Prevention * IoT Security * Next-Generation Firewalls * Hardware Firewalls * Strata Cloud Manager * SECURE ACCESS SERVICE EDGE * Prisma Access * Prisma SD-WAN * Autonomous Digital Experience Management * Cloud Access Security Broker * Zero Trust Network Access * Code to Cloud Platform * Prisma Cloud * Cloud-Native Application Protection Platform * AI-Driven Security Operations Platform * Cortex XDR * Cortex XSOAR * Cortex Xpanse * Cortex XSIAM * External Attack Surface Protection * Security Automation * Threat Prevention, Detection & Response * Threat Intel and Incident Response Services * Proactive Assessments * Incident Response * Transform Your Security Strategy * Discover Threat Intelligence COMPANY * About Us * Careers * Contact Us * Corporate Responsibility * Customers * Investor Relations * Location * Newsroom POPULAR LINKS * Blog * Communities * Content Library * Cyberpedia * Event Center * Manage Email Preferences * Products A-Z * Product Certifications * Report a Vulnerability * Sitemap * Tech Docs * Unit 42 * Do Not Sell or Share My Personal Information * Privacy * Trust Center * Terms of Use * Documents Copyright © 2024 Palo Alto Networks. All Rights Reserved * * * * * EN * Select your language * USA (ENGLISH) Your browser does not support the video tag. DEFAULT HEADING Read the article Seekbar Volume This site uses cookies essential to its operation, for analytics, and for personalized content and ads. Please read our privacy statement for more information.Privacy statement Cookies Settings Reject All Accept All Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information on cookie consent Allow All MANAGE YOUR CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices