PlugX: Bad guy disguises as an msi file

I. Overview

plugx.drawio

II. Analysis

1. Locate suspicious files

Use msitool to extract msidump -s -t mal.msi. In File.idt, we can see that there are 3 embed file.

1

These files are extracted to %LOCALAPPDATA\kjnBsLsJo\

2024Contact.exe
security.dll
contactDB.dat

Upon running, the program opens an pdf file called Meeting Invitation.pdf

image

2. DLL Side-loading technique

security.dll export 3 functions

2

2024Contact.exe load security.dll which trigger the call to NimMain in Dll dispatcher. Then, the executable calls InitSecurityInterfaceW after resolving its address.

3

The NimMain function's role is to resolve global variables's value. Most of them are api's address and config. Below is one of the functions called in NimMain

4

For InitSecurityInterfaceW, it registers a Window class object and a message dispatcher.

5

The call to RegisterClassW at line 50 requires a WNDCLASSW object. According to this docs, the object's structure is below

6

The second entry WNDPROC is A pointer to the window procedure. The function pointed to by that entry is going to be registered for this window class.

7

8

The window proc opens contactDB.dat file, reads it to an allocated memory, decrypt and use it as a callback in EnumSystemGeoID

9

The data after decrypted is an PE file.

10

The interesting thing is the header can be converted to executable code to be able to pass into EnumSystemGeoID. It will eventually jump into Initialize function.

11

3. Depression: Navigating through the control-flow obfuscation

Initialize function implemented a control flow obfuscation method.

image

Checking the functions calls, there are only a few call instructions in this function. The obfuscation method set up the call manually and place the called address to eax.

image

By placing breakpoints in all these calls, we can monitor the api used by this function as below:

kernel32_VirtualAlloc
kernel32_LoadLibraryA (kernel32.dll)
kernel32_GetProcAddress 
    GetProcAddress
    LoadLibraryA
    GetLastError
    WriteConsoleW
    CloseHandle
    CreateFileW
    QueryPerformanceCounter
    GetCurrentProcessId
    GetCurrentThreadId
    GetSystemTimeAsFileTime
    ...
kernel32_LoadLibraryA (User32.dll)
kernel32_GetProcAddress
kernel32_VirtualProtect
kernel32_VirtualProtect
kernel32_VirtualProtect
kernel32_VirtualProtect
ntdll_NtFlushInstructionCache
DllEntryPoint
DllEntryPoint

It just initialize api and memory, the 2 importance calls are to DllEntryPoint function with args fdwReason equal to 1 and 4

image

For fdwReason equal to 4, it calls this function, which contains some suspicious activity of decrypting strings

image

The decryped string is used to resolve api, here at line 66 it resolves SetUnhandledExceptionFilter and call it imediately.

image

Then the program changes a few byte from the start of SetUnhandledExceptionFilter

image

image

image

A new thread is created to call sub_5B313F3

image

The thread first applies an anti debug check using 2 api kernel32_GetCurrentProcess and kernel32_CheckRemoteDebuggerPresent

image

To bypass this, we just have to change the return value of eax from 1 to 0

4. The config

Tracing for a while, the program hit this function which decrypt a block of data

image

The algorithm used is RC4 with key 10C6F. After being decrypted, the data block contains many interesting strings.

ZwNlqMnRE
529
Meeting Invitation.pdf
buyinginfo[.]org

5. Victim's info gathering

This sample collects multiple information about the victim to for identification. That information is exfiltrate through http.

image

Here is the list of infos that this malware collects:

Window's version
Computer name
Username
File in %appdata%/Render
Machine's IP
Architecture

6. Suspicious pdf file opening

The malware first create %temp%/tmp.dat file by copying contactDB.dat. Read the content and then decrypt it.

image

Then, payload of the pdf is written to %temp%/Meeting Invitation.pdf

image

Finally, it call ShellExecuteW to open the pdf as we see at first. %temp%/tmp.dat then is deleted.

7. Anti-debug, mutex, and other shenanigans...

Mutex

Mutex ZwNlqMnRE is created to ensure that one instance of malware runs concurrently. The mutex name is taken from the config data.

image

Anti-debug

This sample actively checks for debugger by running a thread just to call CheckRemoteDebuggerPresent every 1 second with a call to Sleep

image

Registry activities

This sample creates/queries many registry keys for multiple purposes, like info collection or defense bypass.

SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSetting - ProxyEnable
SOFTWARE\Microsoft\Internet Explorer\Version Vector - IE
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\50\User Agent\Post Platform - *
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform - *
Software\CLASSES\ms-pu - CLSID

To disable the proxy, it set the value of ProxyEnable to 0

image

It also copies modules to %programdata%\VirtualFile\ and creates a value of the key CurrentVersion\Run to achieve persistence.

image

The copy destination folder like%programdata%\VirtualFile\ is randomly set, which variant between these:

%userprofile%\Intelnet
%allusersprofile%\VirtualFile
%public%\SamsungDriver
%appdata%\SecurityScan
%localappdata%\DellSetupFiles

8. How it communicate under the hood

image

This sample interacts with buyinginfo[.]org at port 443, it first receives a key from malicious server then uses it to encrypt traffic afterward.

The first request to the server includes randomly generated data

image

Another piece of data included is the CLSID value of registry key Software\CLASSES\ms-pu

Note that these data is located in the header section of the http request as it is added using winhttp_WinHttpAddRequestHeaders

image

After sending those data, it read 32 bytes from the response of the server.

image

For the second round, it collects the host's info (which was mentioned in section 5 before), encrypts it using RC4 algorithm using those 32 bytes of data as a key and sends the encrypted data to the server. Then, if there is a response from the server, it decrypt the data and uses the dword value at offset 4 as command and control option. For example, here it checks if the option value is equal to 0x7002.

image

9. Command and Control

0x1005: Bro gonna leave

This option deletes %programdata%\VirtualFile\, notice the server and then kill the process.

  1. Search for module 2024 Contact.exe

It uses APIs below to iterate through processes running on the machine and stop when 2023 Contact.exe is found.


kernel32_CreateToolhelp32Snapshot

kernel32_Process32FirstW

kernel32_OpenProcess

kernelbase_EnumProcessModules

kernelbase_GetModuleFileNameExW

kernel32_Process32NextW
  1. Create %temp%\del_Contact Update.bat using kernel32_CreateFileW and kernel32_WriteFile.

image

The written content:

image

  1. Execute the .bat file using kernel32_CreateProcessW

image

  1. Exit the process

image

0x1007: Bro leaves violently

image

First it call kernel32_SetUnhandledExceptionFilter, which was previously modified from the begining. This fuction now leads us to a piece of 2 line instruction which only returns 0.

image

Then it call kernel32_UnhandledExceptionFilter to detect debugger and invoke the pre-registered handler.

Finally, GetCurrentProcess and TerminateProcess is called to exit.

However, if there is no debugger, it executes the exception handler. The handler then call FatalAppExitW with this message.

image

0x3004: Drop / modify a file

  1. Create new thread execute sub_541312A

image

  1. Query SOFTWARE\Microsoft\Internet Explorer\Version Vector value IE

image

  1. Enumerate through all the values in SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\50\User Agent\Post Platform

image

  1. Send data to the server, then receive the file name and file data

  2. Open file then write the content.

image

0x7002: spawn cmd shell

To establish a connection between cmd shell and a malicious server, it uses a named pipe to send and receive data from the shell. By using 2 threads for reading and writing, it can interact with cmd simultaneity.

Here is the function that creates 2 named pipes and stores those handles to global variables.

image

It then cratf a STARTUPINFO structure and stores our handle to hStdInput and hStdOutput. By doing so, it can read data and write commands to the shell through the named pipe.

image

Finally, it creates a process cmd.exe using a crafted struct.

image

III. IOC

TypeValue
MutexZwNlqMnRE
URLbuyinginfo[.]org
FilenameMeeting Invitation.pdf
Filenamedel_Contact Update.bat
Filehash7486cefa12be05d7c027c6d85b024835346e2450
Filehash3e67011bbb2867de4ba17c0d2bb64db324d3b0c9
Filehash2705079351efebe935ccbc395cbc16a523f69125
Filehashdc62cb7c24c14d6dbb16412e6553c4f10c34051d
Registry keyHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run - Contact Update
Folder%userprofile%\Intelnet
Folder%allusersprofile%\VirtualFile
Folder%public%\SamsungDriver
Folder%appdata%\SecurityScan
Folder%localappdata%\DellSetupFiles

IV. Att&ck technique used

image

0
Subscribe to my newsletter

Read articles from Ngô Thành Văn directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Ngô Thành Văn
Ngô Thành Văn