{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
27 January, 2022
By Jack Simpson, Cyber Threat Intelligence, PwC
In January 2021, PwC observed a phishing page that prompted an investigation into a new threat actor we now call ‘White Tur’. Per our in-house naming convention for threat actors, the use of the colour 'White' indicates that we have not yet formally attributed White Tur as being based in a specific geographic location.
Our journey began when hunting for newly registered domains with TLS certificates that use the term ‘qov’, spoofing the legitimate term ‘gov’. Spoofing the word ‘gov’ has previously been a favoured technique of several unrelated threat actors, such as Blue Athena (a.k.a. Sofacy, APT28)1. On 31st January 2021, we observed the subdomain mail[.]mod[.]qov[.]rs being used to phish for Serbian Ministry of Defence credentials. The phishing page shown in Figure 1 when visited not only logged credentials, but logged visits to the phishing page itself.
Figure 1 - Serbian Ministry of Defence phishing page mail[.]mod[.]qov[.]rs
When tracking domain registrations and domain resolutions to White Tur attributed infrastructure, we observed it to be a persistent threat actor operating over a number of years, from at least 2017 through to 2021, as shown in Figure 2.
Figure 2 - Timeline of domain registration and domain resolution activity by White Tur
The techniques used by White Tur included:
This blog is focused on our analysis of White Tur’s use of the open-source project OpenHardwareMonitor for payload execution. This project monitors temperature sensors, fan speeds, voltage and load and clock speeds of a computer2. We observed an archive named OpenHardwareMonitor-revised.zip with patterns we commonly associate with White Tur.
Filename |
OpenHardwareMonitor-revised.zip |
---|---|
SHA-256 |
317f14542cba69453d1f5da8c7d5a2ecad2b502ebcbb6256cc397a9fdb18bb9c |
File type |
Zip archive |
File size |
2,810,227 bytes |
First Observed |
2021-05-26 17:50:34 |
After analysing the contents of the ZIP file, we assessed that White Tur was likely packaging the OpenHardwareMonitor project and backdooring parts of it to execute its payloads. There were three files that White Tur had modified or created inside the archive, listed in Table 1.
Filename |
SHA-256 |
Description |
---|---|---|
OpenHardwareMonitorLib.csproj |
7e187735d3701b681e60605563e4bb9c0febab5f4af2cbf40ba92722bf3e8f9e |
Modified Visual Studio project through the pre-build event |
command.dat |
3e59b5a07becf6956ee9271d57135d4d6524bfc3f4e9bd7866c16810f4ff3020 |
Windows binary malware |
CWRITE.ps1 |
3f99e107781c531db626e94a457bb630df4f4f37893ec2dfb2789a0b3115064b |
PowerShell downloader |
In the file OpenHardwareMonitorLib.csproj, White Tur modified the file to inject PowerShell code into the pre-build event, available in Visual Studio projects. This technique for gaining execution was discussed by Microsoft in January 2021, when they observed the North Korea-based threat actor ZINC (which we track as Black Artemis) using this method3. The PowerShell code retrieves environmental information from the victim using PowerShell WMI objects and utilises the BitsTransfer Module available in PowerShell to download a payload shown in Figure 3. The payload is downloaded and copied to \APPDATA\Local\Microsoft\OneDrive\WOFUTIL.dll - this filename has been observed in previous White Tur activity.4
Figure 3 - PowerShell code contained in the PreBuildEvent tag
The PowerShell script will generate a unique ID for the infected machine and name it a ‘UUID’. This unique identifier is sent to the C2 when the payload is downloaded through the URL:
hxxp[:]//onedrive-login[.]us/download.php?uuid=<unique_ID>
CWRITE.ps1 is a PowerShell downloader script; however, unlike the prebuild event, it uses a different technique for C2 communication and logs environmental information to a separate IP. The PowerShell script sends environmental information to the following URL via BitsTransfer:
hxxp[:]//193.37.213[.]135/BitsData/
The PowerShell script will then download the payload to the same folder via the same URL as the previous script:
hxxp[:]//onedrive-login[.]us/download.php?uuid=<unique_ID>
However, its method for communication has been modified; in this sample, the PowerShell script initiates a COM object, specifically XML HTTP 3.05. The script uses the .Open() method to send a HTTP request shown in Figure 4.
Figure 4 - Payload being downloaded using XML HTTP 3.0 COM object in PowerShell
The binary command.dat is a DLL that contains exports previously observed in White Tur payloads. These exports are:
The payload correctly functions by executing the default DLL entry point, DllEntrypoint. PwC assesses White Tur likely uses the name WOFUTIL.dll for payloads in a DLL search order hijacking attack. The Windows binary OneDriveStandAloneUpdater.exe is vulnerable to DLL side order hijacking and loads the DLL WOFUTIL.dll6. The DLL also makes use of the BitsTransfer COM objects, it calls CoCreateInstance with class identifiers (CLSIDs) related to the BitsTransfer control class shown in Figure 5.
Figure 5 - Malware utilising BitsTransfer control class COM objects
Like the PowerShell scripts, the Windows binary will generate a unique identifier for the victim. This is achieved by dynamically loading the library RPCRT4.dll and calling UuidCreateSequential(). The malware will use the following URL with the BitsTransfer COM object for C2 communication:
hxxp[:]//onedrive-login[.]us/tp/reply.php
From our observations, this is the most functional backdoor we have observed from White Tur which is capable of:
However, White Tur has been experimenting with malware development and open-source projects. For example, we identify an open-source malware project name present on the command.dat PDB path. “Storm Kitty” is an open-source C# stealer used to capture credentials and keylogs by the victim.
C:\Users\tensho\Desktop\StormKitty-master\Cameleon\Release\Cameleon.pdb
This threat actor uses several techniques often observed by a wide variety of threats actors, such as DLL search order hijacking, phishing and use of COM objects. The unique feature this threat actor has is its victimology, targeting defence, governmental and research organisations based in Serbia and Republika Srpska. The full infection chain we observed with this technique is shown in Figure 6.
Figure 6 - Part of the infection chain used by White Tur
We are still in the technical phases of attribution with this threat actor; if we refer to the 4C model7 of attribution phases we are currently at the clustering phase. With some threat actors it is clear there are links to other APTs. However, from our assessment, this particular threat actor has a range of motivations with no clear links to well-known threat actors which are attributed to a government or organisation.
The threat actor focuses attacks on a region where there is little coverage in threat intelligence blogs, in this blog we aim to encourage some public dialogue about who would want to backdoor OpenHardwareMonitor and target these regions? This blog complements a talk presented at the SANS CTI Summit on 27th January 2021, which explores the wider context of this technical analysis.
Command and Scripting Interpreter: PowerShell
User Execution: Malicious File
Exfiltration Over Command and Control Channel
Command and Scripting Interpreter: Visual Basic
Command and Scripting Interpreter: Windows Command Shell
Deobfuscate/Decode Files or Information
Software Discovery: Security Software Discovery
15265520a6622fc5a254854768da0545
f6aea82e0be4863e5535759f9ddea659
7bdb4b03eaf03db90f02c5b2e59a8282
5e149c121a1015cb90132645c44bf87a
9a958fd2053d610dd380f75f028da308baa39eb1
672629577295fa71192a737bc196de2bfea65c9b
42e32d40607e29b761b6be42ccf93ea78cd65021
50203cbf82be50616d2992c2d8cad5a432a22d6a
7e187735d3701b681e60605563e4bb9c0febab5f4af2cbf40ba92722bf3e8f9e
3e59b5a07becf6956ee9271d57135d4d6524bfc3f4e9bd7866c16810f4ff3020
3f99e107781c531db626e94a457bb630df4f4f37893ec2dfb2789a0b3115064b
50483830696fd3b1be3a893e39c98fdcf615412dd7f4c02fe462304ff6d6136e
onedrive-login[.]us
windows[.]system-update[.]org
vladars[.]co
onedrive-login[.]net
system-update[.]org
94[.]156[.]189[.]122
193.37.213[.]135
stucked[.]bobcked23@protonmail[.]com
[1] ‘APT28: A Window into Russia’s Cyber Espionage Operations?’, FireEye, https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf (5th February 2010)
[2] 'Open Hardware Monitor - Core temp, fan speed and voltages in a free software gadget', OpenHardwareMonitor, https://openhardwaremonitor.org/ (n.d)
[3] ‘ZINC attacks against security researchers’, Microsoft, https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/ (28th January 2021)
[4] CTO-TIB-20210903-01A - Darth Vladars under attack Part 3
[5] ‘MSXML 3.0 GUIDs and ProgIDs’, Microsoft, https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ms766426(v=vs.85) (27th October 2018)
[6] ‘Hunting for Evidence of DLL Side-Loading With PowerShell and Sysmon’, SecurityIntelligence, https://securityintelligence.com/posts/hunting-evidence-dll-side-loading-powershell-sysmon/ (18th August 2021)
[7] 'Attribution of Advanced Persistent Threats', Springer: Timo Steffens, 20th July 2020, https://link.springer.com/book/10.1007/978-3-662-61313-9
Louise Taggart
Cyber Threat Intelligence Senior Manager, PwC United Kingdom
Tel: +44 (0)7702 699119
Cyber Threat Operations Lead Partner, PwC United Kingdom
Tel: +44 (0)7725 707360