2014-04-20 - SWEET ORANGE EK FROM 195.16.88.159 PORT 9290 - FLASH AND JAVA EXPLOITS
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-04-20-Sweet-Orange-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-20-Sweet-Orange-EK-malware.zip
NOTES:
- Because the HTTP exploit traffic happened over TCP port 9290, no events showed up from Sguil on Security Onion.
- I used tcprewrite to change port 9290 to 80 in the PCAP, then played back the file with tcpreplay on Security Onion, which generated Sweet Orange EK events.
- In this traffic, a Flash exploit is delivered like the one Kafeine found in Sweet Orange EK traffic on 2014-02-07 (link).
- I'm not sure if Sweet Orange is delivering an updated Flash exploit. Java delivered the malware payload this time--not Flash.
- I previously saw Sweet Orange EK over port 60012 on 2014-02-04 (link) and over port 80 on 2014-01-26 (link).
UPDATE
Kafeine has confirmed the Flash exploit in this example is, in fact, CVE-2014-0497
Sweet Orange has 2014-0497
Post upd.better late than never http://t.co/439P1Bh08A Thx @ekse0x cc @malware_traffic pic.twitter.com/VxQZRh2vKN
— kafeine (@kafeine) May 22, 2014
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 84.40.9.34 - www.cba.org.uk - Compromised website
- 217.12.214.105 - toolbarueries-googles.ru - First redirect
- 185.14.31.91 - toolbarueries-googless.ru - Second redirect (note the second "s" in "googless")
- 149.210.138.218 - dromessop.org - Last redirect
- 195.16.88.159 - seek7er.epicgamer.org:9290 and seek12er.shellcode.eu:9290 - Sweet Orange EK over port 9290
COMPROMISED WEB SITE AND REDIRECTS (all times UTC):
- 17:39:24 - www.cba.org.uk - GET /
- 17:39:25 - toolbarueries-googles.ru - GET /
- 17:39:27 - toolbarueries-googless.ru - GET /dlpage/?Acez
- 17:39:27 - dromessop.org - GET /3.html
SWEET ORANGE EXPLOIT KIT:
- 17:39:28 - seek7er.epicgamer.org:9290 - GET /Database_Administration/pic/media/family.php?space=287
- 17:39:30 - seek7er.epicgamer.org:9290 - GET /Database_Administration/pic/media/qOmwP [Flash exploit]
- 17:39:44 - seek7er.epicgamer.org:9290 - GET /Database_Administration/pic/media/QrWusuR.jar
- 17:39:44 - seek7er.epicgamer.org:9290 - GET /Database_Administration/pic/media/MPqEGpii.jar
- 17:39:44 - seek7er.epicgamer.org:9290 - GET /Database_Administration/pic/media/MPqEGpii.jar
- 17:39:45 - seek7er.epicgamer.org:9290 - GET /Database_Administration/pic/media/MPqEGpii.jar
- 17:39:46 - seek12er.shellcode.eu:9290 - GET /action.php?logos=654&page=344&bios=4&maps=355&sports=171&intm=470&flex=401&best=134&vista=216&changes=412
- 17:39:47 - seek12er.shellcode.eu:9290 - GET /action.php?logos=654&page=344&bios=4&maps=355&sports=171&intm=470&flex=401&best=134&vista=216&changes=329
PRELIMINARY MALWARE ANALYSIS
FLASH FILE
File name: 2014-04-20-Sweet-Orange-EK-flash-file.swf
File size: 9.0 KB ( 9242 bytes )
MD5 hash: 656b05763d88e086f9ce17769a7a78d8
Detection ratio: 0 / 49
First submission: 2014-04-20 22:47:39 UTC
VirusTotal link: https://www.virustotal.com/en/file/738672eb554c539040ebe892dcb3efe9e5dd00f4e99ef9dbbec8650d0ac02d74/analysis/
FIRST JAVA EXPLOIT
File name: 2014-04-20-Sweet-Orange-EK-java-exploit-1.jar
File size: 87.8 KB ( 89941 bytes )
MD5 hash: 6655a961b7cefafe1e696e602f3a1629
Detection ratio: 1 / 50
First submission: 2014-04-19 20:11:11 UTC
VirusTotal link: https://www.virustotal.com/en/file/d95e03dbc44e57419a7f2fea35fd04944ab1a567185db333aeb6d4e181dfbad1/analysis/
SECOND JAVA EXPLOIT
File name: 2014-04-20-Sweet-Orange-EK-java-exploit-2.jar
File size: 85.9 KB ( 87937 bytes )
MD5 hash: bb16b335054ca5e324b0926dafff9ad7
Detection ratio: 2 / 51
First submission: 2014-04-19 20:11:08 UTC
VirusTotal link: https://www.virustotal.com/en/file/65933c934783030dc86f38f350c360e74ddd1f1af2c8cb528a9c37997ac12acd/analysis/
MALWARE PAYLOAD
File name: 2014-04-20-Sweet-Orange-EK-malware-payload.exe
File size: 230.6 KB ( 236096 bytes )
MD5 hash: 2a0b477dace5fd141a0822eeeb3a2948
Detection ratio: 16 / 46
First submission: 2014-04-20 03:55:26 UTC
VirusTotal link: https://www.virustotal.com/en/file/7463ce99a724cf07937a70a087fdb524a799a5471f5d1223239ecbebfe47aff6/analysis/
Malwr link: https://malwr.com/analysis/Y2VlYTA1NmFjZDIyNGVjM2FlYWY1Zjc2NGRmMDY5YjI/
SNORT EVENTS
As mention earlier, because the HTTP exploit traffic happened over TCP port 9290, no events showed up from Sguil on Security Onion. However, I used tcprewrite to change port 9290 to 80 in the PCAP then replayed the file with tcpreplay on Security Onion.
sudo tcprewrite --portmap=9290:80 --infile=currentfile.pcap --outfile=newfile.pcap
sudo tcpreplay --intf1=eth0 newfile.pcap
The modified PCAP generated the following Sweet Orange EK events:
- ET CURRENT_EVENTS Sweet Orange Landing Page Dec 09 2013
- ET POLICY Vulnerable Java Version 1.7.x Detected
- ET INFO JAVA - Java Archive Download By Vulnerable Client
- ET CURRENT_EVENTS Possible Sweet Orange payload Request
- ET CURRENT_EVENTS Sweet Orange encrypted payload
HIGHLIGHTS FROM THE TRAFFIC
From www.cba.org.uk (compromised website) to toolbarueries-googles.ru (first redirect):
Embedded iframe from index page of compromised website.
From toolbarueries-googles.ru (first redirect) to toolbarueries-googless.ru (second redirect):
Note the first redirect is "googles", while the second redirect is is "googless".
The obfuscated Javascript shown below probably generated the traffic to toolbarueries-googless.ru.
From toolbarueries-googless.ru (second redirect) to dromessop.org (last redrect):
From dromessop.org (last redrect) to seek7er.epicgamer.org:9290 (Sweet Orange EK):
The first HTTP GET request to Sweet Orange EK returns some obfuscated script:
Take away the jeR--_ and 33S from the obfuscated section of the above script, and you'll find some Base64 encoded HTML:
The decoded Base64 script looks like a CVE-2013-2551 exploit:
Microsoft Security Essentials also thinks it's CVE-2013-2551:
The second HTTP GET request to Sweet Orange returns a Flash file, possibly an exploit for CVE-2014-0497 since it specifically identified my Flash version as 12.0.0.38.
Here are GET requests for the two different Java exploits:
Here are two GET requests for same encrypted malware payload delivered by the Java exploits:
I didn't see any callback traffic, but the malware copied itself to another directory and created the following registry entry:
- Registry key: KEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- Value name: etunc.exe
- Value data: C:\Users\User-1\AppData\Roaming\Utzoi\etunc.exe
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-04-20-Sweet-Orange-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-20-Sweet-Orange-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.