{"id":86049,"date":"2018-03-19T19:49:13","date_gmt":"2018-03-19T14:19:13","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86049"},"modified":"2018-03-20T10:58:20","modified_gmt":"2018-03-20T05:28:20","slug":"depth-analysis-new-emerging-url-malware-campaign-analysis-quick-heal-security-labs","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/depth-analysis-new-emerging-url-malware-campaign-analysis-quick-heal-security-labs\/","title":{"rendered":"An in-depth analysis of a new, emerging &#8220;.url&#8221; malware campaign &#8211; by Quick Heal Security Labs"},"content":{"rendered":"<p>Last week, we had blogged about the emergence of a new <a href=\"https:\/\/blogs.quickheal.com\/email-campaign-using-url-extensions-abuse-internet-explorer-vulnerabilities-cve-2016-3353\/\">attack vector \u2018.url\u2019<\/a> which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this \u2018.url\u2019 vector and elaborate on the Quant Loader malware which is actively making use of it.<\/p>\n<p>Let\u2019s take a look at the below attack chain which depicts the execution sequence observed in this attack where a &#8220;.url&#8221; file is being used to spread malware.<\/p>\n<figure id=\"attachment_86050\" aria-describedby=\"caption-attachment-86050\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86050\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig1-Attack-Chain-650x159.png\" alt=\"Fig 1. Attack Chain\" width=\"650\" height=\"159\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig1-Attack-Chain-650x159.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig1-Attack-Chain-300x73.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig1-Attack-Chain-768x188.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig1-Attack-Chain-789x193.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig1-Attack-Chain.png 1580w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86050\" class=\"wp-caption-text\">Fig 1. Attack Chain<\/figcaption><\/figure>\n<p>Following is the figure of process summary of the attack chain.<\/p>\n<figure id=\"attachment_86052\" aria-describedby=\"caption-attachment-86052\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-86052 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig2-Process-Summary-650x127.png\" alt=\"Fig 2. Process Summary\" width=\"650\" height=\"127\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig2-Process-Summary-650x127.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig2-Process-Summary-300x59.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig2-Process-Summary-768x150.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig2-Process-Summary-789x154.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig2-Process-Summary.png 1222w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86052\" class=\"wp-caption-text\">Fig 2. Process Summary<\/figcaption><\/figure>\n<p>As explained above, generally \u201c.url\u201d contains URL (\u201chttps:\/\/\u201d or \u201chttps:\/\/\u201d), but in this case, we have observed SMB shares being accessed to execute a malicious JavaScript.<\/p>\n<figure id=\"attachment_86053\" aria-describedby=\"caption-attachment-86053\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86053\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig3-.URL-File-accessing-SMB-share-650x141.png\" alt=\"Fig 3. .URL File accessing SMB share\" width=\"650\" height=\"141\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig3-.URL-File-accessing-SMB-share-650x141.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig3-.URL-File-accessing-SMB-share-300x65.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig3-.URL-File-accessing-SMB-share-768x166.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig3-.URL-File-accessing-SMB-share-789x171.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig3-.URL-File-accessing-SMB-share.png 999w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86053\" class=\"wp-caption-text\">Fig 3. .URL File accessing SMB share<\/figcaption><\/figure>\n<p>The above file is related to <a href=\"https:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2016-3353\">CVE-2016-3353<\/a> where an Internet Explorer mishandles \u2018.url\u2019 files from the Internet zone and allows remote attackers to bypass intended access restrictions via a crafted file.<\/p>\n<p>These SMB shares are publicly accessible and can be accessed without authentication. Fig 3 and 4 show public SMB share location \u201cbuyviagraoverthecounterusabb[.]net\/documents\/\u201d where the malicious JavaScript files are stored. The malicious SMB share location IP address is \u201c91.102.153.90\u201d.<\/p>\n<figure id=\"attachment_86054\" aria-describedby=\"caption-attachment-86054\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86054\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/wireshark-650x154.png\" alt=\"Fig 4. Communication captures while SMB shares access \" width=\"650\" height=\"154\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/wireshark-650x154.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/wireshark-300x71.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/wireshark-768x182.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/wireshark-789x187.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/wireshark.png 1328w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86054\" class=\"wp-caption-text\">Fig 4. Communication captures while SMB shares access<\/figcaption><\/figure>\n<figure id=\"attachment_86055\" aria-describedby=\"caption-attachment-86055\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-86055 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig5-JavaScript-Files-stored-publicly-650x331.png\" alt=\"Fig 5. JavaScript Files stored publicly\" width=\"650\" height=\"331\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig5-JavaScript-Files-stored-publicly-650x331.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig5-JavaScript-Files-stored-publicly-300x153.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig5-JavaScript-Files-stored-publicly-768x390.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig5-JavaScript-Files-stored-publicly-789x401.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig5-JavaScript-Files-stored-publicly.png 1300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86055\" class=\"wp-caption-text\">Fig 5. JavaScript Files stored publicly<\/figcaption><\/figure>\n<p>The following figure shows a malicious JavaScript being delivered to the victim via SMB protocol.<\/p>\n<figure id=\"attachment_86056\" aria-describedby=\"caption-attachment-86056\" style=\"width: 557px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-86056 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig6-SMB-request-557x390.png\" alt=\"Fig 6. SMB request\" width=\"557\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig6-SMB-request-557x390.png 557w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig6-SMB-request-300x210.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig6-SMB-request.png 584w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><figcaption id=\"caption-attachment-86056\" class=\"wp-caption-text\">Fig 6. SMB request<\/figcaption><\/figure>\n<p>Upon opening the malicious JavaScript, it\u2019s opening by \u2018wscript.exe\u2019 application.<\/p>\n<figure id=\"attachment_86057\" aria-describedby=\"caption-attachment-86057\" style=\"width: 409px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86057\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig7-User-Prompt.png\" alt=\"Fig 7. User Prompt\" width=\"409\" height=\"271\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig7-User-Prompt.png 409w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig7-User-Prompt-300x199.png 300w\" sizes=\"(max-width: 409px) 100vw, 409px\" \/><figcaption id=\"caption-attachment-86057\" class=\"wp-caption-text\">Fig 7. User Prompt<\/figcaption><\/figure>\n<p>The second stage malware is downloaded by a malicious JavaScript once the victim clicks on \u2018Open\u2019, as shown in Fig 5. This malicious JavaScript is highly obfuscated and is only used as a first stage downloader.<\/p>\n<figure id=\"attachment_86058\" aria-describedby=\"caption-attachment-86058\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86058\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig8-Malicious-JavaScript-downloader-650x292.png\" alt=\"Fig 8. Malicious JavaScript downloader\" width=\"650\" height=\"292\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig8-Malicious-JavaScript-downloader-650x292.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig8-Malicious-JavaScript-downloader-300x135.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig8-Malicious-JavaScript-downloader-768x345.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig8-Malicious-JavaScript-downloader-789x354.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig8-Malicious-JavaScript-downloader.png 1292w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86058\" class=\"wp-caption-text\">Fig 8. Malicious JavaScript downloader<\/figcaption><\/figure>\n<p>The second stage malware is downloaded in \u2018%TEMP%\u2019 location by JavaScript and spawned through \u2018cmd.exe\u2019. This is a heavily obfuscated executable which gets directly executed in the memory. This malware appears to be a variant of \u2018<strong>Quant Loader<\/strong>\u2019 and can be used to download other malware. At the time of analysis by Quick Heal Security Labs, we did not observe malware downloaded by Quant Loader. Let\u2019s take a look at the working of the Quant Loader malware.<\/p>\n<p>The Quant Loader malware checks for all of the keyboard locale of the system through \u201cKeyboard Layout\\Preload\u201d. It exits if the locale is any amongst the Russian, Ukraine, and Kazakhstan.<\/p>\n<figure id=\"attachment_86059\" aria-describedby=\"caption-attachment-86059\" style=\"width: 614px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86059\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-9.-Check-for-the-locale-of-system.png\" alt=\"Fig 9. Check for the locale of the system\" width=\"614\" height=\"166\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-9.-Check-for-the-locale-of-system.png 614w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-9.-Check-for-the-locale-of-system-300x81.png 300w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><figcaption id=\"caption-attachment-86059\" class=\"wp-caption-text\">Fig 9. Check for the locale of the system<\/figcaption><\/figure>\n<p>Quant Loader makes use of the following registry key to identify the 32\/64 bit configuration of the victim\u2019s system. It then uses the same information as part of CNC request while communicating with the CnC server.<\/p>\n<p><em>HKLM\\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion\u00a0 ProgramFilesDir (x86)<\/em><\/p>\n<p>It also checks for the presence of following registry entries.<\/p>\n<figure id=\"attachment_86060\" aria-describedby=\"caption-attachment-86060\" style=\"width: 530px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86060\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-10.-Check-presence-of-different-security-products.png\" alt=\"Fig 10. Check presence of different security products\" width=\"530\" height=\"75\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-10.-Check-presence-of-different-security-products.png 530w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-10.-Check-presence-of-different-security-products-300x42.png 300w\" sizes=\"(max-width: 530px) 100vw, 530px\" \/><figcaption id=\"caption-attachment-86060\" class=\"wp-caption-text\">Fig 10. Check presence of different security products<\/figcaption><\/figure>\n<p>It drops a self-copy by the name \u2018dwm.exe\u2019 in \u2018&lt;Appdata ShellFolder&gt;\\&lt;8DigitNumeric&gt;\u2019 folder and sets the same for auto execution through \u201cRun\u201d entry in registry. This is done to achieve persistence in the system.<\/p>\n<figure id=\"attachment_86061\" aria-describedby=\"caption-attachment-86061\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86061\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-11.-Self-copy-of-malware-file-650x161.png\" alt=\"Fig 11. Self-copy of the malware file \" width=\"650\" height=\"161\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-11.-Self-copy-of-malware-file-650x161.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-11.-Self-copy-of-malware-file-300x75.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-11.-Self-copy-of-malware-file-768x191.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-11.-Self-copy-of-malware-file-789x196.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-11.-Self-copy-of-malware-file.png 809w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86061\" class=\"wp-caption-text\">Fig 11. Self-copy of the malware file<\/figcaption><\/figure>\n<p>This 8 Digit Number is used as a Bot ID (BotId) while communicating with the CNC Server. It generates the BotId through the following steps:<\/p>\n<ol>\n<li>Read \u2018HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\MachineGuid\u2019<\/li>\n<li>Extracts only digits from the value of Machine ID in occurring sequence<\/li>\n<li>Omit first 5 numbers and considers 8 digits from 5 onwards<\/li>\n<\/ol>\n<figure id=\"attachment_86062\" aria-describedby=\"caption-attachment-86062\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86062\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-12.-Use-of-MachineGuid-as-BotId-650x87.png\" alt=\"Fig 12. Use of MachineGuid as BotId\" width=\"650\" height=\"87\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-12.-Use-of-MachineGuid-as-BotId-650x87.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-12.-Use-of-MachineGuid-as-BotId-300x40.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-12.-Use-of-MachineGuid-as-BotId.png 691w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86062\" class=\"wp-caption-text\">Fig 12. Use of MachineGuid as BotId<\/figcaption><\/figure>\n<p>It then changes the user access permission of 8 digit folder and \u2018dwm.exe\u2019 file to read mode for the logged-in user. This restricts the user to delete or modify the folder and \u2018dwm.exe\u2019. This is achieved by making use of a genuine CACLS windows file through the following command.<\/p>\n<p><strong><em>cmd \/c echo Y|CACLS &#8220;c:\\users\\&lt;username&gt;\\appdata\\roaming\\48378942\\dwm.exe&#8221; \/P &#8220;&lt;username&gt;:R&#8221;<\/em><\/strong><\/p>\n<p><strong>\u00a0<\/strong>The Quant Loader then adds the below rule in the Firewall with the name &#8220;Quant&#8221; which allows the malware to communicate on the Internet bypassing Firewall rules.<\/p>\n<p><strong><em>netsh advfirewall firewall add rule name=&#8221;Quant&#8221; program=&#8221;c:\\users\\&lt;username&gt;\\appdata\\roaming\\48378942\\dwm.exe&#8221; dir=Out action=allow<\/em><\/strong><\/p>\n<p>It also tries to connect to the CNC domain \u2018wassronledorhad[.]in\u2019 and download other malicious files.<\/p>\n<p>The CNC was not responding when the analysis was carried out. However, the static analysis gives some insights into the probable CNC communication and other functionalities of Quant Loader.<\/p>\n<p>The below files would have been downloaded if the CNC server was alive.<\/p>\n<p><em>hxxp:\/\/wassronledorhad.in\/q2\/lib\/zs.dll.c<br \/>\n<\/em><em>hxxp:\/\/wassronledorhad.in\/q2\/lib\/bs.dll.c<br \/>\n<\/em><em>hxxp:\/\/wassronledorhad.in\/q2\/lib\/sql.dll.c<\/em><\/p>\n<p>These files are stored in %APPDATA%\\z folder as zs.dll, bs.dll and sqlite3.dll respectively.<\/p>\n<figure id=\"attachment_86063\" aria-describedby=\"caption-attachment-86063\" style=\"width: 389px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86063\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-13.-Download-file-names.png\" alt=\"Fig 13. Download file names \" width=\"389\" height=\"84\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-13.-Download-file-names.png 389w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-13.-Download-file-names-300x65.png 300w\" sizes=\"(max-width: 389px) 100vw, 389px\" \/><figcaption id=\"caption-attachment-86063\" class=\"wp-caption-text\">Fig 13. Download file names<\/figcaption><\/figure>\n<p>It checks the filesize of \u2018zs.dll\u2019 and \u2018sqlite3.dll\u2019 for less than 0x20000. It then executes the \u201cMain\u201d function from zs.dll.<\/p>\n<figure id=\"attachment_86064\" aria-describedby=\"caption-attachment-86064\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86064\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-14.-Load-and-execute-the-downloaded-DLL-650x328.png\" alt=\"Fig 14. Load and execute the downloaded DLL\" width=\"650\" height=\"328\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-14.-Load-and-execute-the-downloaded-DLL-650x328.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-14.-Load-and-execute-the-downloaded-DLL-300x152.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-14.-Load-and-execute-the-downloaded-DLL.png 675w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86064\" class=\"wp-caption-text\">Fig 14. Load and execute the downloaded DLL<\/figcaption><\/figure>\n<p>Quant Loader tried to send the following requests to the CNC Server.<\/p>\n<p><strong><em>hxxp:\/\/wassronledorhad[.]in\/q2\/index.php?id=48378942&amp;c=2&amp;mk=75490e&amp;il=H&amp;vr=1.73&amp;bt=32<\/em><\/strong><\/p>\n<p>Wherein the id = BotId, c = request counter, bt = 32\/64 bit system<\/p>\n<p>It waits for the command from the CNC server which has the following structure:<\/p>\n<p><em>[BotId][Command][Data]<\/em><\/p>\n<p>The command can be any of the following &#8211; \u201cpwd\u201d, \u201cexe\u201d, \u201cdoc\u201d, \u201cdll\u201d.<\/p>\n<figure id=\"attachment_86065\" aria-describedby=\"caption-attachment-86065\" style=\"width: 337px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86065\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-15.-List-of-bot-commands.png\" alt=\"Fig 15. List of bot commands\" width=\"337\" height=\"164\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-15.-List-of-bot-commands.png 337w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-15.-List-of-bot-commands-300x146.png 300w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/><figcaption id=\"caption-attachment-86065\" class=\"wp-caption-text\">Fig 15. List of bot commands<\/figcaption><\/figure>\n<p>The \u201cpwd\u201d command was also found to be executing the zs.dll with the \u201cMain\u201d function.<\/p>\n<p>For the rest of the commands, the malware creates a file with a name as windows timestamp in \u2018temp\u2019 folder.<\/p>\n<figure id=\"attachment_86066\" aria-describedby=\"caption-attachment-86066\" style=\"width: 419px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86066\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-16.-Use-of-system-time-to-make-file-name.png\" alt=\"Fig 16. Use of system time to make file name\" width=\"419\" height=\"225\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-16.-Use-of-system-time-to-make-file-name.png 419w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-16.-Use-of-system-time-to-make-file-name-300x161.png 300w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><figcaption id=\"caption-attachment-86066\" class=\"wp-caption-text\">Fig 16. Use of system time to make file name<\/figcaption><\/figure>\n<p>If the command is \u201cexe\u201d then it executes the file with ShellExecute API.<\/p>\n<figure id=\"attachment_86067\" aria-describedby=\"caption-attachment-86067\" style=\"width: 470px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86067\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-17.-Call-to-ShellExecute-to-execute-downloaded-exe-file.png\" alt=\"Fig 17. Call to ShellExecute to execute downloaded exe file\" width=\"470\" height=\"167\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-17.-Call-to-ShellExecute-to-execute-downloaded-exe-file.png 470w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-17.-Call-to-ShellExecute-to-execute-downloaded-exe-file-300x107.png 300w\" sizes=\"(max-width: 470px) 100vw, 470px\" \/><figcaption id=\"caption-attachment-86067\" class=\"wp-caption-text\">Fig 17. Call to ShellExecute to execute downloaded exe file<\/figcaption><\/figure>\n<p>If the command is \u201cdoc\u201d then it executes the file with WinExec API.<\/p>\n<figure id=\"attachment_86068\" aria-describedby=\"caption-attachment-86068\" style=\"width: 370px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86068\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Fig-18.-Call-to-WinExec-to-execute-downloaded-doc-file.png\" alt=\"Fig 18. Call to WinExec to execute downloaded doc file\" width=\"370\" height=\"121\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-18.-Call-to-WinExec-to-execute-downloaded-doc-file.png 370w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Fig-18.-Call-to-WinExec-to-execute-downloaded-doc-file-300x98.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><figcaption id=\"caption-attachment-86068\" class=\"wp-caption-text\">Fig 18. Call to WinExec to execute downloaded doc file<\/figcaption><\/figure>\n<p>If the command is \u201cdll\u201d then it makes use of \u201cLoadLibrary\u201d and \u201cGetProcaddress\u201d to execute the desired function from dll as seen in fig 13 given earlier.<\/p>\n<p>Thus, depending on the commands, the bot may download other malicious files and execute them.<\/p>\n<p>The \u2018.Url\u2019 attack vector is currently being used by Quant Loader. We may see a rise in the use of this novice attack vector (.url) by other malware families in the coming days.<\/p>\n<p><strong>Indicators of compromise:<\/strong><\/p>\n<p>50C359167CC74A962CACAFF2A795B23C<br \/>\n4394536E9A53B94A2634C68043E76EF8<br \/>\nbuyviagraoverthecounterusabb[.]net\/documents\/B200795218387[.]js<br \/>\n91.102.153.90<\/p>\n<p><strong>Subject Matter Experts<\/strong><\/p>\n<ul>\n<li>Pradeep Kulkarni, Amar Patil, Aniruddha Dolas | Quick Heal Security Labs<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Last week, we had blogged about the emergence of a new attack vector \u2018.url\u2019 which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this \u2018.url\u2019 vector and elaborate on the Quant Loader malware which is actively making use of it. Let\u2019s take a look at the [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":86070,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24,303,5],"tags":[78,1327,247,49,25,1588,1328,1587],"class_list":["post-86049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-malware","category-phishing","category-security","tag-botnet","tag-cve","tag-javascript","tag-malware","tag-phishing","tag-smb","tag-spam-campaign","tag-url"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86049"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86049"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86049\/revisions"}],"predecessor-version":[{"id":86071,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86049\/revisions\/86071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86070"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}