{"id":2707,"date":"2024-05-28T16:41:09","date_gmt":"2024-05-28T14:41:09","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=2707"},"modified":"2024-05-28T16:48:08","modified_gmt":"2024-05-28T14:48:08","slug":"dll-side-loading-through-iobit-against-colombia","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/dll-side-loading-through-iobit-against-colombia\/","title":{"rendered":"DLL Side Loading through IObit against Colombia"},"content":{"rendered":"\n<p>Early in May 2024, S2 Grupo&#8217;s intelligence unit, Lab52, detected a new phishing campaign in which attackers impersonated the Colombian Attorney General&#8217;s Office. The attack aims to infect victims&#8217; systems with the generic malware artefact AsyncRAT. To do so, it deploys a series of malicious files, including the legitimate file of the free IObit anti-malware solution used to execute the rest of the artefacts and initiate the infection using the DLL side-loading technique.<\/p>\n\n\n\n<p>Although the beacon, the objectives, and the artefacts used by the attackers match with those known to be used by APT-C-36, the kill-chain does not correspond with the one used by the actor in their latest campaigns. Therefore, this could mean a modification of their Tactics, Technics, and Procedures.<\/p>\n\n\n\n<p>This time, the threat actor employs a ZIP file containing four relevant documents: an IObit antivirus legitimate file, a malicious BPLfile, which is a type of DLL for AutoCAD, a malicious M4A file which is an Apple audio file, and a malicious VCF text format file. The attackers use the HijackLoader malware to execute the malicious artefacts.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image.png\" alt=\"\" class=\"wp-image-2708\" width=\"732\" height=\"549\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image.png 803w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-300x225.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-768x577.png 768w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><figcaption>Current infection chain<\/figcaption><\/figure><\/div>\n\n\n\n<p>The following figure represents the infection chain employed by the APT-C-36 threat actor in recent years, as explained in this Lab52 publication.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"475\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-1.png\" alt=\"\" class=\"wp-image-2709\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-1.png 767w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-1-300x186.png 300w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/><figcaption>Prior APT-C-36 infection chain<\/figcaption><\/figure><\/div>\n\n\n\n<p>The figure below shows two decoys used by the attackers. On the&nbsp;left,&nbsp;is&nbsp;the decoy used in the new campaign discovered by Lab52. On the&nbsp;right,&nbsp;is&nbsp;an APT-C-36 campaign from July 2022.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"917\" height=\"319\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-2.png\" alt=\"\" class=\"wp-image-2710\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-2.png 917w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-2-300x104.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-2-768x267.png 768w\" sizes=\"(max-width: 917px) 100vw, 917px\" \/><figcaption>Decoy used in the campaign<\/figcaption><\/figure><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Killchain<\/h1>\n\n\n\n<p>The infection starts with the file \u201c08 CITACION DEMANDA.zip\u201d which contains the files: a legitimate executable signed as IObit RttHlp \u201c08 CITACION DEMANDA.exe\u201d, \u201cRegister.dll\u201d, \u201cvcl120.bpl\u201d, \u201cdreamland.m4a\u201d and \u201ccutcherry.vcf\u201d and on execution, all files, except for the executable are copied to C:\\Users\\XXXX\\AppData\\Roaming\\WUKApp.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"192\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-3.png\" alt=\"\" class=\"wp-image-2711\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-3.png 938w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-3-300x61.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-3-768x157.png 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><figcaption>Files droped by the ZIP<\/figcaption><\/figure><\/div>\n\n\n\n<p>In the same way as other HijackLoader infections, the first-stage executable \u201c08 CITACION DEMANDA.exe\u201d loads the malicious DLL \u201cvcl120.bpl\u201d through DLL Side Loading. &nbsp;Then, the DLL creates a cmd.exe process that starts a suspended MSBuild process.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"924\" height=\"91\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-4.png\" alt=\"\" class=\"wp-image-2712\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-4.png 924w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-4-300x30.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-4-768x76.png 768w\" sizes=\"(max-width: 924px) 100vw, 924px\" \/><figcaption>Highlighted processes<\/figcaption><\/figure><\/div>\n\n\n\n<p>The loader manages the process explained above through the files contained in the zip. It will deobfuscate and use \u201cdreamland.m4a\u201d in order to inject a shellcode into memory. It will then perform the same process with \u201ccutcherry.vcf\u201d. Finally, the loader injects into the previously created \u201cMSBuild.exe\u201d the AsyncRAT contained in \u201ccutcherry.vcf\u201d via Process Hollowing. The communications with the C2 were detected through this process.<\/p>\n\n\n\n<p>During the execution process, we managed to detect the use of the mutex AsyncMutex_6SI8OkPnk and the creation of other processes, such as a PowerShell:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"174\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-5.png\" alt=\"\" class=\"wp-image-2713\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-5.png 930w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-5-300x56.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-5-768x144.png 768w\" sizes=\"(max-width: 930px) 100vw, 930px\" \/><figcaption>Detailed procces execution <\/figcaption><\/figure><\/div>\n\n\n\n<p>In order to obtain persistence, the attackers followed through with two different mechanisms that load the executable file uncopied before to the secondary folder. In the first place, via the creation of a link file on the user&#8217;s home folder \u201cchromeHttp_zx_test\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"28\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-6.png\" alt=\"\" class=\"wp-image-2714\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-6.png 930w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-6-300x9.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-6-768x23.png 768w\" sizes=\"(max-width: 930px) 100vw, 930px\" \/><figcaption>LNK to load on Startup<\/figcaption><\/figure>\n\n\n\n<p>Furthermore, the attackers also created a scheduled task called \u201cmlt_Archive\u201d:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-7.png\" alt=\"\" class=\"wp-image-2715\" width=\"732\" height=\"155\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-7.png 928w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-7-300x64.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/image-7-768x163.png 768w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><figcaption>Scheduled task created<\/figcaption><\/figure><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusions<\/h1>\n\n\n\n<p>This article analyses a new campaign detected in Colombia. In this campaign, we found several similarities with previous decoys and malware used by APT-C-36. Therefore, we might find ourselves before a new kill-chain used by this group.<\/p>\n\n\n\n<p>As a side note, campaigns using RATs, such as AsyncRAT, are commonly found in attacks against Colombian entities as we analysed in our previous <a href=\"https:\/\/lab52.io\/blog\/apt-c-36-from-njrat-to-apt-c-36\/\">blog<\/a>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Indicators of compromise<\/h1>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>08 CITACION DEMANDA.zip<\/td><td>ab731fe108986f53117e09272f12701a77e013d8<\/td><\/tr><tr><td>08 CITACION DEMANDA.exe<\/td><td>22afcdc180400c4d2b9e5a6db2b8a26bff54dd38<\/td><\/tr><tr><td>cutcherry.vcf<\/td><td>931c51eed1716a0dddeb005899efd16a79a22782<\/td><\/tr><tr><td>dreamland.m4a<\/td><td>a31edd70cb923893c736b633806e294a66ffbd41<\/td><\/tr><tr><td>Register.dll<\/td><td>8fb5da182dea64c842953bf72fc573a74adaa155<\/td><\/tr><tr><td>rtl120.bpl<\/td><td>e6ccaf016fc45edcdadeb40da64c207ddb33859f<\/td><\/tr><tr><td>vcl120.bpl<\/td><td>1e387320704c8b94c41df2409e79c67a030018c4<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Early in May 2024, S2 Grupo&#8217;s intelligence unit, Lab52, detected a new phishing campaign in which attackers impersonated the Colombian Attorney General&#8217;s Office. The attack aims to infect victims&#8217; systems with the generic malware artefact AsyncRAT. To do so, it deploys a series of malicious files, including the legitimate file of the free IObit anti-malware [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":2723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[21,16],"tags":[80,29],"class_list":{"0":"post-2707","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apt","8":"category-ttp","9":"tag-asyncrat","10":"tag-colombia","11":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/1024-600x400.jpg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2024\/05\/1024-600x600.jpg","author_info":{"display_name":"Erlebnis","author_link":"https:\/\/lab52.io\/blog\/author\/erlebnis\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2707"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=2707"}],"version-history":[{"count":5,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2707\/revisions"}],"predecessor-version":[{"id":2722,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2707\/revisions\/2722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/2723"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=2707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=2707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=2707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}