{"id":594,"date":"2019-10-22T16:19:44","date_gmt":"2019-10-22T14:19:44","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=594"},"modified":"2019-10-22T17:25:49","modified_gmt":"2019-10-22T15:25:49","slug":"new-patchwork-campaign-against-pakistan","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/new-patchwork-campaign-against-pakistan\/","title":{"rendered":"New PatchWork Spearphishing Attack"},"content":{"rendered":"\n<p>Recently, a somewhat more elaborated phishing has caught our attention at Lab52, it consists on a malicious office document of a real article from Samaa.tv published on 07-10-2019, one of the most important media in Pakistan. The article used in this campaign is related to the current rise of tension in the geopolitical Indian-Pakistani conflict with Kashmir. The headline of the article is: <em>\u201cIndia to become center of extremism under Modi: AJK PM\u201d<\/em> ([1]). <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image1-1.png\" alt=\"\" class=\"wp-image-597\" width=\"604\" height=\"315\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image1-1.png 980w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image1-1-300x156.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image1-1-768x400.png 768w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><figcaption>Illustration 1: Headlines used in the Campaign<\/figcaption><\/figure><\/div>\n\n\n\n<p>The document, with name \u201cIndia\u2019s_Extremisms_Under_Mobi.docx\u201d and hash \u201c167062593cb9e42a404dc9c8a0347e74888712a1256731724417e6f1d411cbbb\u201d was written in English, an official language for both countries. The startling headline selected in the campaign tries to attract the attention and interest of the Pakistani and Indian people through the social fear. So the main target would be more focused to the Pakistani victims to download the malicious document. At the moment, Delhi and Islamabad claim the control of the whole Kashmir area. However, each public administration manage a concrete area of the region ([2]) ([3]).  <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image2-666x1024.png\" alt=\"\" class=\"wp-image-587\" width=\"243\" height=\"374\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image2-666x1024.png 666w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image2-195x300.png 195w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image2-768x1180.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image2.png 1920w\" sizes=\"(max-width: 243px) 100vw, 243px\" \/><figcaption>Illustration 2: External Kashmir&#8217;s influence<\/figcaption><\/figure><\/div>\n\n\n\n<p>China is also involved in this geopolitical scenario as China is carrying out an important investment in Pakistan, especially in the \u201cChina-Pakistan Economic Corridor\u201d. A public officer from Beijing declared that if there is any unacceptable geostrategic movement from India, China would defend the legal right of Pakistan in the Kashmir\u2019s area ([3]). <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image3.png\" alt=\"\" class=\"wp-image-588\" width=\"360\" height=\"360\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image3.png 700w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image3-300x300.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image3-75x75.png 75w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image3-600x600.png 600w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><figcaption>Illustration 3: China Pakistan Economic corridor<\/figcaption><\/figure><\/div>\n\n\n\n<p>The economic and trade geopolitical interests of China in Pakistan are highly relevant. Currently, it is relevant the investments of China in Pakistan to keep developing the China &amp; Pakistan economic which will join to the OBOR\u2019s route until the Gwadar and Karachi Port ([4]).  The Indian claim to control of the whole Kashmir area, means an important approach of India to the Economic Corridor of China-Pakistan, this geopolitical situation provokes discomfort to both partners as their logistical project would be in danger to be disrupted. As it is showed; China, Pakistan and India are showing more interests in the Kashmir area.<\/p>\n\n\n\n<p>The document appeared in public sources around 15-10-2019 and the internal data of the document dates from the 12-10-2019 so it seems a recent campaign. When the document is opened, the MSOffice Word editor process is constantly suspended and acts in an unstable way. Analyzing in depth the document, it can be observed that it contains a file called image1.eps that corresponds to a Flash element of the document that exploits the adobe Flash vulnerability known as \u201cCVE-2017-0261\u201d.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"721\" height=\"182\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image4.png\" alt=\"\" class=\"wp-image-589\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image4.png 721w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image4-300x76.png 300w\" sizes=\"(max-width: 721px) 100vw, 721px\" \/><figcaption>Illustration 4: Dropped files by the document<\/figcaption><\/figure><\/div>\n\n\n\n<p>The exploit executed by the document contains a shellcode that dumps into the folder \u201cC:\\ProgramData\\Microsoft\\DeviceSync\u201d 3 executable files, two of them related to VMWare, and one named \u201cMSBuild.exe\u201d. After creating these files, the shellcode runs the binary named \u201cVMWareCplLauncher.exe\u201d.<strong>.<\/strong><\/p>\n\n\n\n<p>As described in this Unit42 report [6], the executable \u201cVMWareCplLauncher.exe\u201d is a signed binary from VMWare and the DLL is also a legitimate part of VMWare, which is automatically loaded by the executable, and has been modified to create in this case two scheduled tasks:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"278\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image5.png\" alt=\"\" class=\"wp-image-590\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image5.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image5-300x109.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption>Illustration 5: Tasks created by VMWareCplLauncher.exe<\/figcaption><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"47\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image6.png\" alt=\"\" class=\"wp-image-591\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image6.png 754w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image6-300x19.png 300w\" sizes=\"(max-width: 754px) 100vw, 754px\" \/><figcaption>Illustration 6: Second binary path<\/figcaption><\/figure><\/div>\n\n\n\n<p>The first task, points to the yet seen executable \u201cMSBuild.exe\u201d and the second to a binary that isn\u2019t generated at any time of the infection and that could point to a next stage of infection that may be downloaded after a \u201crecon\u201d of the infected machine made by this fist stage. After a minute, the task programmed with the name \u201cWindows Update\u2026\u201d launches the MSBuild.exe binary, which consists of a first stage trojan, with a multitude of capabilities described below.<\/p>\n\n\n\n<p>This sample contacts the domain &#8220;yetwq.twilightparadox.com&#8221; through the HTTP protocol to which constantly sends information collected from the victim computer, together with the parameter &#8220;crc=e3a6&#8221; which is &#8220;hardcoded&#8221; in its logic.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"270\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image7-1024x270.png\" alt=\"\" class=\"wp-image-592\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image7-1024x270.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image7-300x79.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image7-768x202.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image7.png 1617w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Illustration 7: Malware traffic with it&#8217;s C2<\/figcaption><\/figure><\/div>\n\n\n\n<p>The response of the server is checked in its logic, in search of one of the following numbers \u201c4, 5, 8, 13, 23, 33\u201d which correspond to different commands related to the download and execution of other binaries, keyboard monitoring, sending screenshots to the command and control server or theft of files with the following list of extensions: \u201cdoc:docx:pdf:ppt:pptx:jpg:jpeg:png:rtf:txt:7z:rar:zip:docm:msg:wps:xps:pptm\u201d.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image8.png\" alt=\"\" class=\"wp-image-593\" width=\"635\" height=\"449\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image8.png 1023w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image8-300x213.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/image8-768x544.png 768w\" sizes=\"(max-width: 635px) 100vw, 635px\" \/><figcaption>Illustration 8: Command switch\/case on the sample<\/figcaption><\/figure><\/div>\n\n\n\n<p>Both\nits capabilities and its code are practically the same as those\ndescribed by Unit42 in reference to the BadNews threat. In the same\nway, the TTPs of the entire infection chain coincide with those\ndescribed in several reports in relation to campaigns that have been\nattributed to the Patchwork group also known as \u201cDropping Elephant\u201d\nor \u201cAPT-C-09\u201d. \n<\/p>\n\n\n\n<p>Furthermore, due to the characteristics of the campaign and the current geopolitical scenario in the area, it seems that its main targets could be located in Pakistan and would be linked to the Chinese-Pakistani Economic Corridor (CPEC) route.<\/p>\n\n\n\n<p>IOCs:<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td>167062593cb9e42a404dc9c8a0347e74888712a1256731724417e6f1d411cbbb<\/td><\/tr><tr><td>6b656dc98773255cbc3592122db6487326e39b8e01966cca174dde87e72f82ec<\/td><\/tr><tr><td>5f5a1af57872610aa692ee3d0fba4a0171c2ec1a8cc3cf45f21f52caa2ab9041<\/td><\/tr><tr><td>31c913899d50d78f2d7d9657e7534bd36819ec9571566216f1c963bf605417f7<\/td><\/tr><tr><td>yetwq.twilightparadox.com<\/td><\/tr><tr><td>185.161.208.252<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>[1] <a href=\"https:\/\/www.samaa.tv\/news\/2019\/10\/india-to-become-center-of-extremism-under-modi-ajk-pm\/\">https:\/\/www.samaa.tv\/news\/2019\/10\/india-to-become-center-of-extremism-under-modi-ajk-pm\/<\/a>     <\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/www.bbc.com\/news\/world-asia-india-49737886\">https:\/\/www.bbc.com\/news\/world-asia-india-49737886<\/a><\/p>\n\n\n\n<p>[3]\n<a href=\"https:\/\/www.dw.com\/en\/pakistan-thanks-china-for-support-on-kashmir-issue\/a-50745277\">https:\/\/www.dw.com\/en\/pakistan-thanks-china-for-support-on-kashmir-issue\/a-50745277<\/a><\/p>\n\n\n\n<p>[4]<a href=\"https:\/\/www.dw.com\/en\/belt-and-road-forum-is-the-china-pakistan-economic-corridor-failing\/a-48473486\">https:\/\/www.dw.com\/en\/belt-and-road-forum-is-the-china-pakistan-economic-corridor-failing\/a-48473486<\/a><\/p>\n\n\n\n<p>[5]\n<a href=\"https:\/\/attack.mitre.org\/groups\/G0040\/\">https:\/\/attack.mitre.org\/groups\/G0040\/<\/a><\/p>\n\n\n\n<p>[6]\n<a href=\"https:\/\/unit42.paloaltonetworks.com\/unit42-patchwork-continues-deliver-badnews-indian-subcontinent\/\">https:\/\/unit42.paloaltonetworks.com\/unit42-patchwork-continues-deliver-badnews-indian-subcontinent\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, a somewhat more elaborated phishing has caught our attention at Lab52, it consists on a malicious office document of a real article from Samaa.tv published on 07-10-2019, one of the most important media in Pakistan. The article used in this campaign is related to the current rise of tension in the geopolitical Indian-Pakistani conflict [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":608,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[],"class_list":{"0":"post-594","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apts","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/patch-2-600x400.jpeg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/patch-2-600x580.jpeg","author_info":{"display_name":"JagaimoKawaii","author_link":"https:\/\/lab52.io\/blog\/author\/jagaimokawaii\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/594"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=594"}],"version-history":[{"count":12,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/594\/revisions"}],"predecessor-version":[{"id":613,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/594\/revisions\/613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/608"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}