FIN7 Targets New Windows 10 Functionality

FIN7-11-18-header

Over the past few weeks, Morphisec Labs researchers identified a couple dozen documents that execute the GRIFFON javascript delivery backdoor. Following our investigation, we identified a high similarity to FIN7’s attack methodology.

FIN7 is one of the most active adversaries around and has created a significant number of fileless attacks over the past few years. We’ve been tracking this financially motivated threat actor for some time. In 2017 and 2018, for example, we tracked campaigns against the restaurant industry. This coincides with their financial motivations.

This time we have identified the use of the latest version of the remote desktop activeX control class that was introduced for Windows 10. FIN7 utilizes the activeX control for automatic execution of the malicious Macro following an enable of the Document content.

As newer features are introduced to a constantly updating OS, so too the detection vendors need to update their techniques to protect the system. This often creates very exhaustive and time-consuming work, which in turn can lead to the opposite effect of pushing defenders even farther behind the attacker. FIN7 has yet again taken advantage of the opportunity this change presents.

While tracing Fin7 abuse of the remote activeX control we also identified other groups misusing the same and earlier controls although with a slightly different technique.

Technical details

Document

Most of the targeted documents were following the naming convention “i<7-9 random digits>.doc“, as each document usually contained an image to convince targets to enable the content. This leads to the execution of the malicious macro, only this time the image also hid an ActiveX control slightly below it. The malicious GRIFFON JavaScript backdoor is then hidden in white colored letters in between the content, so it’s not visible to people but can be seen by machines.

Fin7 02-28 image 1

 

Examining the activeX control revealed the use of the MsRdpClient10NotSafeForScripting class (which is used for remote control). The Server field is empty in the script, which will later cause an error that the attackers will actually abuse to properly execute their own code.

Fin7 02-28 image 2

Macro

Inspection of the macro revealed an interesting trigger method —
“<name>_OnDisconnected” — which will be the main function that is first executed. This method didn’t execute immediately as it takes time for it to try and resolve DNS to an empty string and then return an error. The GRIFFON will not execute unless the error number matches exactly to “disconnectReasonDNSLookupFailed”(260); the GRIFFON wscript command is concatenated with a combination of characters that are dependent on the error number calculation.

Fin7 02-28 image 3

 

Fin7 02-28 image 4

 

Fin7 02-28 image 5

Going over the documentation for the msrdpclient10 reveals that it will not work on workstations that are not updated to windows 10.

Fin7 02-28 image 6

As soon as GRIFFON is created in the form of a BAT file, this file is executed, and the word document form is closed.

Fin7 02-28 image 7

GRIFFON

Fin7 02-28 image 8

The BAT will execute wscript back with its own content – an old trick using comments that the BAT will disregard during the execution of wscript (non-recognized command) while skipped together with its content when executed by wscript (or any other interpreter that adheres to the comments syntax).

Fin7 02-28 image 9-1

As soon as the JavaScript is beautified, we get back to the same old GRIFFON obfuscation pattern.

Fin7 02-28 image 10

Conclusions

Updating your operating system is necessary for better security, even though it doesn’t always serve that purpose. This example with GRIFFON makes it clear that this doesn’t always work. Even with an updated OS, there remains a need for preventive measures such as attack surface reduction, moving target defense, and hardening.

There are hundreds of other objects that have been introduced in the latest Windows 10 update and even dozen of more methods in the described object that sophisticated attackers can abuse. There might be additional opportunities for vulnerability exploitation with every new feature but this is not in the scope of this blog post.

 

Appendix

Hashes

74422ee3e1274bad11f5ac44712b1d10fce3a1e7fd9acc0a82fe88d9e9b7b78e

891c716d059459d97a726a9bb262bc20f369b6c810097ff312fd710a4d4da577

3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a

ff7334237ad5a76d682c32267ffbada9ef091eb87f3683981b71e1d84c3990a9

414744acddc03bb095a31708c66f33ae456af58ae85ab2887e9781b528034064

8b975bcdc73d28d299b60b7c1ab81c0a5b3a30153725dc41e836659a4ea78831

005a1e42bb3e5092124dfa40b9a765339c7ab9ea00c276ba2f2af32ce2ed81ce

200a0cc130113fedd2e3baa0e5988ca18102a652909b2530785242fd800dd4f5

c1374ddd0b06eb942a7d5224ebf3c6a10802902dd8eee03fe9603292714f8bf1

bb7a43ea1a305228e6ff36abef475e046e549e309fddf334d97707bfbc47aef4

683a9df3e291669e6a1ee35aa08222e228bd553f76ba049c4b8873f6d9eb8880

6226065b170ad402b35ff8307eab843f46b54cc7a93a3717af0fa9cf2eb433df

0d25947452fbd14301f660f357845760693eabf61e99bd55c7ab47a44a88ccd5

Domains:

insiderppe.cloudapp[.]net


*** This is a Security Bloggers Network syndicated blog from Morphisec Moving Target Defense Blog authored by Michael Gorelik. Read the original post at: https://blog.morphisec.com/fin7-targets-new-windows-10-functionality