You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following block of functions allows to decode the stream in base 64, that used on the next declared functions.
FunctionStream_BinaryToString(Binary)OnErrorResumeNextConstadTypeText=2ConstadTypeBinary=1DimBinaryStream'As New StreamSetBinaryStream=CreateObject("ADODB.Stream")BinaryStream.Type=adTypeBinaryBinaryStream.OpenBinaryStream.WriteBinaryBinaryStream.Position=0BinaryStream.Type=adTypeTextBinaryStream.Charset="us-ascii"Stream_BinaryToString=BinaryStream.ReadTextSetBinaryStream=NothingEndFunctionFunctionBase64DecodeToBinary(ByValvCode)OnErrorResumeNextDimoXML,oNodeSetoXML=CreateObject("Msxml2.DOMDocument.3.0")SetoNode=oXML.CreateElement("base64")oNode.dataType="bin.base64"oNode.Text=vCodeBase64DecodeToBinary=oNode.nodeTypedValueSetoNode=NothingSetoXML=NothingEndFunctionFunctionBase64DecodeToString(ByValvCode)OnErrorResumeNextDimoXML,oNodeSetoXML=CreateObject("Msxml2.DOMDocument.3.0")SetoNode=oXML.CreateElement("base64")oNode.dataType="bin.base64"oNode.Text=vCodeBase64DecodeToString=Stream_BinaryToString(oNode.nodeTypedValue)SetoNode=NothingSetoXML=NothingEndFunction
This block of function extracts the dll in function of the architecture (X86 or X64), the lure document for the victim all on the path pushed in argument.
We can note that the functions used for the name generation give a name based on the current path of the dotm file but like a dll, this check if the files already exist and rename it, this avoids to throw errors on the victim. We can also see that the same part of a common path used for store the dll continue to be used on their operation (\AppData\Local\Microsoft\).
The final part is the autoopen method for execute the macro at the beginning of the document, extract the lure and the dll, give their names and execute dll in passing the lure document in argument for show it to the victim.
On the command of the persistence, we can note the key and the increment used for AES, this increment is also used as ID victim where each ID is attributed to a target.
Key
Increment
Target
S-6-81-3811-75432205-060098-6872
17
Boeing DSS
S-6-81-3811-75432205-060098-6872
61
BAE/Lockheed Martin
S-6-38-4412-76700627-315277-3247
43
Boeing PMS
S-6-38-4412-76700627-315277-3247
18
ROK Army
Liking supposed on the argument for launch the dll, this used the dll sqlite3 for parsing the SQLite databases and extract the informations. Each version released of the sqlite3.dll content a tracker for getting, the time of the build and the hash relative at this build (here on the X86 version).
The implant pushes the persistence in using the startup folder created by the dotm file. The Lazarus group continue to use the name of the products of Microsoft company as lure for the victim as lnk file.
The malware in more parse the SQLite database, use the function sqlite3_win32_is_ntof the dll sqlite3 for getting the OS version of the victim.
Once this did, this executes the main function for getting the system informations.
For getting the process running on the computer, the malware use the common method CreateToolhelp32Snapshot for create a snapshot of all the process and parse for have the modules and informations.
Like for the process, this use the common methods by API (GetLogicalDrives, GetDriveTypeW, GetDiskFreeSpaceExW) for getting the informations on the disks and volumes present on the computer (Logical, space ...).
After regrouping all the data. This push the header with the common header for Mozilla in finding it by the method ObtainUserAgentString (this gives the header in searching with a predefined profile, here Mozilla).
Once this done, send the data by a POST request to the C2.
For all the samples, this is the same TTPs used by the Lazarus group. On compare the date of creation, modification, template and the users, we can note that all grouped for one common operation.
Filename
Creation date
Last modified date
Creator
Last user
Template
Application
US-ROK Relations and Diplomatic Security.docx
2020-04-06 08:47:00
2020-04-06 08:49:00
JangSY
user
ApothecaryLetter.dotx
Microsoft Office Word 16
pubmaterial.dotm
2020-04-06 08:12:00
2020-04-06 08:12:00
user
user
Normal.dotm
Microsoft Office Word 16
Boeing_PMS.docx
2020-04-06 08:47:00
2020-04-06 08:49:00
JangSY
user
ApothecaryLetter.dotx
Microsoft Office Word 16
43.dotm
2020-04-13 18:42:00
2020-04-24 05:36:00
User
User
43.dotm
Microsoft Office Word 16
Boeing_DSS_SE.docx
2020-04-13 18:44:00
2020-04-28 23:08:00
Windows User
Windows User
17122A7A.htm
Microsoft Office Word 16
17.dotm
2020-04-13 18:42:00
2020-04-28 23:19:00
User
Windows User
17.dotm
Microsoft Office Word 16
Senior_Design_Engineer.docx
2020-04-13 18:44:00
2020-05-06 14:04:00
Windows User
Windows User
2CB4AF25.htm
Microsoft Office Word 16
61.dotm
2020-04-13 18:42:00
2020-05-06 14:12:00
User
Windows User
61.dotm
Microsoft Office Word 16
The infrastructure of the C2 reuse again windows server, the same management panel of the IIS web server, all C2 are up since early February 2020.
Domain
Panel
Webserver
OS
elite4print.com
PleskWin
Microsoft-IIS/7.5
Windows Server 2008 R2
astedams.it
PleskWin
Microsoft-IIS/10.0
Windows Server 2016
On the structure of the media on the maldocs, we can note that all the images and references are doubled maybe by wrong coding the builder.
Threat intelligence
Boeing
The choice of the attack of the airbus is logical by the actualities on the Boeing group. With the COVID-19 event, the business with the possible customers become more harder, that an additional problem when we had the problem with the Boeing 737 MAX banned from flying following numerous crashes. The direction of the group has announced the possible massive cuts of jobs in the company. The group was to make the setting of priorities with these military and civil appliances and the communication of the economic result of the first quarter of the year 2020. On these tensions, it is obvious that the parts of the Human resources were knowingly targeted by pretending a possible job or communication for the staff.
We can hypothesize about the target groups:
Research center in the Republic of Korea (Boeing Military)
Boeing Defense, Space & Security
Lockheed Martin
As said earlier, South Korea negotiated the support contract for its F-35 fleet, Lockheed Martin had selected BAE Systems for build engineering and training facilities at Royal Air Force in Norfolk.
In view of the phishing campaign on the landing armies in South Korea, North Korea is interested in another event on the presentation at Future Armored Vehicles Weapon Systems 2020.
The maldoc for Lockheed Martin use a reedited cover of the annual report 2019 of BAE and Lockheed Martin.
Korean Army
April 2020 have been a full month in events on the ROK, despite the reduction in costs with events related to COVID-19 in the military events, the south korean airforce have planned to upgrade the actual F-16 and F-35 fleet for theirs operational support and equipment. An event for joint drill operation with the US air force was previously planned have been canceled due to the COVID-19 restriction.
This event has been used to become familiar with the recently arrived RQ-4 drones from South Korea. This improvement precedes the firing of short-range missiles a few days before the start of discussions about the elections in South Korea.
This event with also impacted the modification of the measures to protect tanks of the South Korean army, information that is interested in North Korea in the light of recent phishing campaigns in the land forces.
Likewise, recent changes have taken place in the South Korean Navy with the change of chief of naval operations to the hands with the new minesweeper ship and upgrade of Destroyers for the adapt the response of the threats to South Korea (Korea south, China ...). So many changes that attract the lusts of North Korea to learn more from the measures taken by South Korea. However, it can't be excluded that other countries are very interested in these famous measures such as China, which borders with North Korea and in these economic zones with South Korea.
Cyber kill chain
This process graph represent the cyber kill chain used by the attacker.