[Malware] Kimsuky group's resume impersonation malware

04 Mar 2020 | | 악성코드, 김수키, 북한, APT, hwp, malware, kimsuky, north korea, english

Malware disguised as a resume


This malware is one of the variants of the APT attack that the Kimsuky group has continued to attack South Korea. This variant, created on February 27, 2020, is a file titled “이력서 양식.hwp.scr”(“resume sample.hwp.scr” in English), which looks like a hwp file but as a scr (screen saver extension but executable as an exe) file. When executed, the script is executed and the Hangeul document file with the actual resume form is loaded as follows.

hwp

Analysis


MD5 : 47c95f19ebd745d588bb208ff89c90ba

It’s a fairly complex piece of malware that can’t be easily analyzed statically. Therefore, I tried analysis is based on behavior. When executed, the actions are as follows :

Create files


  1. C:\Users[User]\AppData\Local\Temp\À̷¼­ ¾ç½Ä.hwp
  2. C:\Users[User]\AppData\Local\Temp\654A.tmp.db
  3. C:\Users[User]\AppData\Local\Temp\67DB.tmp.bat
  4. C:\Users[User]\AppData\Local\Temp\65E7.tmp.bat
  5. C:\Users[User]\AppData\Roaming\Microsoft\Windows\Defender\AutoUpdate.dll

### À̷¼­ ¾ç½Ä.hwp — After execution, the .scr file is replaced by this .hwp file. Actual resume form file.

### 654A.tmp.db — It is actually a dll and is injected into explorer.exe.

Imgur

### 67DB.tmp.bat — Batch script that deletes the first executable file(.scr file).

### 65E7.tmp.bat — This batch script deletes the 654A.tmp.db file.

### AutoUpdate.dll — It is actually an exe executable and performs actual malicious behaviors such as connecting to the C & C server, tampering the registry, and injecting explorer.exe.

autoupdate

Network connections


http://suzuki.datastore.pe.hu (45.13.135.103:80) Attempt to connect to the C & C server.

Download additional malicious files through http://suzuki.datastore.pe.hu//?m=a&p1=5254004a04af&p2=win_6.1.7601-x32_DROPPER.

p1 contains the mac address, and p2 contains the version of Windows.

network

Registry tampering


Register AutoUpdate.dll with Registry Server using regsvr32.exe. Make it run every time the computer starts.

reg

Injecting to explorer.exe


AutoUpdate.dll registered through regsvr32.exe infects explorer.exe. The execution graph is as follows: Source app.any.run

graph

If you check the memory dump of explorer.exe, you can see that the malicious code is inserted inside explorer.exe.

mal1

mal2

mal3

comments powered by Disqus

Older · View Archive (6)

[악성코드] WannaCry 이전 북한 Lazarus 그룹의 웜 Brambul - 2

분석


Newer

[악성코드] 김수키 조직의 이력서 사칭 악성코드

이력서 양식으로 위장한 악성코드


이 악성코드는 김수키 조직이 한국을 상대로 지속적으로 진행해오고 있는 APT 공격의 변종 중 하나입니다. 2020년 2월 27일에 제작된 이 변종은 “이력서 양식.hwp.scr” 이라는 파일이름으로, hwp 파일처럼 보이지만 scr(화면보호기의 확장자이지만 exe처럼 실행가능합니다.) 파일으로 실행하면 스크립트가 실행이 되고 다음과 같이 실제 이력서 양식이 있는 한글 파일을 불러오게 됩니다.