Skip to content

Latest commit

 

History

History
116 lines (84 loc) · 7.23 KB

install-additional-program.md

File metadata and controls

116 lines (84 loc) · 7.23 KB
ID B0023
Objective(s) Execution
Related ATT&CK Techniques None
Version 2.3
Created 1 August 2019
Last Modified 30 April 2024

Install Additional Program

Malware installs another, different program on the system. The additional program can be any secondary module as exemplified by backdoors, malicious drivers, kernel modules, and OS X Apps.

There are various ways to accomplish the installation. For example, malicious code can beacon to a C2 node for download of an additional program including updates (see Ingress Tool Transfer (E1105)), which is then executed and installed [1]. A threat actor can achieve the same goal using a dropper embedded in the binary files of the original executable or using API calls to extract resource files that are in fact hidden executables. Extracted files are then dropped to the disk.

Examples of droppers include malicious • Microsoft Excel files • ISO image files • self-extracting zip or archives files, which in turn may contain a second stage dropper as part of the payload [2] [3].

Droppers may be described as “single stage” or “two stage.” While the former embeds the malicious code internally, the latter installs itself before downloading additional code from a remote location [4].

Use in Malware

Name Date Method Description
WebCobra 2018 -- The malware downloads and executes Claymore's Zcash miner from a remote server. [5]
Geneio 2015 -- Malware tricks OS X keychain to create application files. Malware also installs the browser extension Omnibar.safariextz. [14]
GoBotKR 2019 -- GoBotKR reinstalls its running instance if it is removed. [7]
MazarBot 2016 -- MazarBot installs a backdoor. [18]
Mebromi 2011 -- Malware contains a dropper that installs additional programs like Cbrom.exe. [15]
YiSpecter 2015 -- The malware can download and install arbitrary iOS apps. [17]
UP007 2016 -- The malware is a dropper that creates multiple files. [8]
CozyCar 2010 -- Upon execution, CozyCar drops a decoy file and a secondary dropper. [9]
Clipminer 2011 -- Clipminer drops a file masquerading as a Control Panel (CPL) file. [10]
Vobfus 2016 -- Vobfus downloads malware from other malware families. [11]
Matanbuchus 2021 -- Malware drops the first loader which is responsible for loading the main loader into memory. [12] [13]
SearchAwesome 2018 -- The malware installs an open-source program called mitmproxy. [16]
Dark Comet 2008 -- The malware contains an embedded PE file. [19]
Gamut 2014 -- Gamut contains an embedded PE file. [19]
Redhip 2011 -- Redhip contains an embedded PE file. [19]
ElectroRAT 2020 -- ElectroRat looks for wallets to steal cryptocurrency. [20]

Detection

Tool: capa Mapping APIs
contain an embedded PE file Install Additional Program (B0023) --
write and execute a file Install Additional Program (B0023) --
Tool: CAPE Mapping APIs
bitcoin_opencl Install Additional Program (B0023) --
dropper Install Additional Program (B0023) --
sniffer_winpcap Install Additional Program (B0023) --

References

"Cyclops Blink: Malware Analysis Report, Version 1.0," National Cyber Security Centre/GCHQ, 23 Feb. 2022. [Online]. Available: https://www.ncsc.gov.uk/files/Cyclops-Blink-Malware-Analysis-Report.pdf.

Threat Hunter Team,"Shuckworm: Espionage Group Continues Intense Campaign Against Ukraine," Symantec, Enterprise Blogs/Threat Intelligence, 20 Apr. 2022. [Online]. Available: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-intense-campaign-ukraine.

"What's behind APT29? | How they attack: the story of our hunt for the CozyDuke cybercriminal group," Kaspersky.com, [Online]. Available: https://www.kaspersky.com/enterprise-security/mitre/apt29.

"Dropper," Computersecurity.fandom.com, wiki, [Online]. Available: https://computersecurity.fandom.com/wiki/Dropper.

[5] https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency/

[6] https://www.fortinet.com/blog/threat-research/deep-analysis-of-driver-based-mitm-malware-itranslator.html

[7] https://www.welivesecurity.com/2019/07/08/south-korean-users-backdoor-torrents/

[8] https://citizenlab.ca/2016/04/between-hong-kong-and-burma/

[9] https://unit42.paloaltonetworks.com/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke

[10] https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clipminer-bitcoin-mining-hijacking

[11] https://securitynews.sonicwall.com/xmlpost/revisiting-vobfus-worm-mar-8-2013/

[12] https://www.0ffset.net/reverse-engineering/matanbuchus-loader-analysis/

[13] https://www.cyberark.com/resources/threat-research-blog/inside-matanbuchus-a-quirky-loader

[14] https://blog.malwarebytes.org/mac/2015/08/genieo-installer-tricks-keychain/

[15] https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/

[16] https://www.malwarebytes.com/blog/news/2018/10/mac-malware-intercepts-encrypted-web-traffic-for-ad-injection

[17] https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/

[18] https://us.norton.com/internetsecurity-emerging-threats-mazar-bot-malware-invades-and-erases-android-devices.html

[19] capa v4.0, analyzed at MITRE on 10/12/2022

[20] https://www.intezer.com/blog/research/operation-electrorat-attacker-creates-fake-companies-to-drain-your-crypto-wallets/