#xor's spam folder
Explore tagged Tumblr posts
its-xornoth-bitch · 3 months ago
Note
Happy 1st birthday btw >:] /silly
I'm 29 and my birthday is in November.
43 notes · View notes
terabitweb · 6 years ago
Text
Original Post from Trend Micro Author: Trend Micro
by Llallum Victoria (Threats Analyst)
Windows Installer uses Microsoft Software Installation (MSI) package files to install programs. Every package file has a relational-type database that contains instructions and data required to install or remove programs.
We recently discovered malicious MSI files that download and execute other files and could bypass traditional security solutions. Malicious actors can abuse custom actions in these files to execute malicious scripts and drop malware that are either capable of initiating a system shutdown or targeting financial systems located in certain locations.
Analyzing malicious MSI files
We discovered JScript/VBScript codes within several samples of malicious *.msi files. However, the parts of the script were distributed (and truncated, it seems) to other parts of the file and did not directly execute wscript.exe to run them. (Installer msiexec.exe itself, however, has its interpreter.)
Figure 1. MSI file containing JavaScript that appears to be truncated
We used the tool Orca MSI Editor, which allows a user to look at how and where files may be delivered, to view the tables and find the script in question in the CustomAction table. The CustomAction table permits integration of custom code and data into installations. The source of the executed code can be a stream from within a particular database, an installed file, or an existing executable. The table lists various information such as action, type, source, target, and extended type to provide further details.
Figure 2. From Orca MSI Editor: CustomAction that contains JavaScript
The malicious JS code (detected by Trend Micro as Trojan.JS.MSAIHA.A) accesses the URL hxxps[:]//s3-eu-west-1[.]amazonaws[.]com/{random characters}/image2[.]png to download files. The downloaded file or .txt file will be stored in either of the following folders:
%User Startup%
%User Profile%Saved Games
%User Profile%Contacts
%User Profile%Links
%User Profile%Music
For downloaded files (.exe, .msi, or dump files from zip), the malware uses the filename jesus or dump. For created .txt files, the filename varies between desktop.txt, desktop, and desktop.ini. The malware can also initiate a system shutdown.
At the time of our analysis, one of the samples related to Trojan.PS1.MSAIHA.A had a URL that was still up. We learned that it won’t continue its malicious routine if it finds the file %Application Data%/{yyyyMM}.ini, and will drop the file as an infection marker instead. It also downloads an encrypted .zip file then decrypts it by using XOR with hardcoded 0x29.
Figure 3. Contents of the .zip file saved in the Microsoft folder
Figure 4. The trojan executing context_snapshot.exe
The .zip file contains normal files like iLua.inf, msvcr120.dll, and msvcp120.dll; files digitally signed by Avira; AutoIt-related files; and an encrypted dynamic-link library (DLL). The trojan executes the freeware automation language AutoIt to decrypt the encrypted DLL and execute context_snapshot.exe in order to inject its DLL, all while pretending to be a legitimate process.
The AutoIt script here (seen in Figure 3 as v8_context_snapshot.src and detected as Trojan.AutoIt.AUTINJECT.AA) is password-protected, so we ran a modified myAut2Exe, a tool for password-guessing and producing pathnames and other information.
Figure 5. Log output of v8_context_snapshot.src
Figure 6. Avira executable is injected with an encrypted DLL
After decrypting the file, it appears that the trojan used the AutoIt script, which we found available online, for injection and modified it for self-use. Additionally, it appended a DLL that it consequently loaded to its memory. This use of DLL is for the purpose of executing the digitally signed Avira file (context_snapshot.exe). The Avira executable is then injected with the encrypted DLL (Jlib.dll) in its process and passes itself as a legitimate process.
We shared our analysis with Avira, which responded with the following: “Our top priority is to protect our users, therefore we’ve immediately added detections for all files together with the accessed URLs. To be able to execute malicious code in the context of a legitimate process and bypass security solutions, the malware is using one of our Avira executables out of the context of an Avira regular installation to inject malicious code into it. This can be done only because the Avira protection is not enabled on the user machine. When Avira is installed, there is a software protection process in place which does not allow any third-party processes or components to modify or inject one of our own processes. In the past, there were no reports of malware infection/injection bypassing by any third-party processes. This issue is currently under investigation, thus we will be able to provide more information in the following days.”
Other samples related to Trojan.PS1.MSAIHA.A were also seen capable of restarting target machines and using Dropbox links to download the aforementioned .zip file. Some even check for the following folder names (whereby if the paths exist, the malware continues with its routine):
%AppDataLocal%Aplicativo Itau (related to a bank in Brazil)
%Program Files%AppBrad (related to banking and financial service companies in Brazil)
%ProgramFiles%DieboldWarsaw (related to the financial and retail technology company)
Figure 7. A supposed Adobe Acrobat Reader DC pop-up window
Another notable aspect of the malicious MSI files we analyzed is that they also pretended to be legitimate. The files were disguised as Adobe Acrobat Reader DC (as seen in Figure 7) and redirect the user to the site www[.]adobe[.]com/br/, which is in Portuguese.
Figure 8. The MSI files redirect users to this site
Figure 9. Spam containing a .zip file that downloads from a malicious URL
We also found a related spam email during our analysis. The email contains text written in Portuguese and is written concisely, indicating an attachment and asking the recipient to treat it urgently. It contains a .zip file labeled “Fatur432952-532-674.zip”, which downloads from one of the malicious URLs we detected to be part of this campaign. The “image2.png” in the said URL is, in fact, an archive when downloaded.
Figure 10. Script that downloads the archive
The archived file contains dump.msi (detected as Trojan.JS.MSAIHA.A), dump.exe (detected as TrojanSpy.Win32.CASBANEIRO.XLB), and ssleay64.dll (detected as TrojanSpy.Win32.CASBANEIRO.XLB).
Figure 11. Malicious routine of the MSI in spammed email
The malicious payload targets Brazil and Portugal by checking country codes in hxxps[:]//www[.]localizaip[.]com[.]br/api/iplocation[.]php. Specific events could be related to banking and financial information, or even keystrokes.
Figure 12. Flowchart of executed dump.exe’s routine
Here are some of the decrypted strings in the callback function of the created windows:
AMARELO_PASS_6 AMARELO_PASS_8 AMARELO_PASS_CERT AMARELO_QR AMARELO_CERT_SIMPLES AMARELO_PASS_SIMPLES AMARELO_PASS_QR SICREDI_ASS SICREDO_TOKEN_FISICO SICREDO_TOKEN_MOB SICREDO_PASS_QR SANTA_ASSI_ELECTRO SANTA_TOKEN SANTA_N_SERIE SANTA_PASS_QR SANTA_POS_TABELA CEF_ASS_NUMERO CEF_ASS_NUMER0_LETRAS CEF_PASS_QR NORD_POS_CARTAO NORD_PASS_QR BANESTER_CERTIFICADO BANESTES_COD_ACCESSO
BANESTES_PASS_QR BANRI_SENHA BANRI_SENHA_TECLADO SAFRA_TOKEN_MOB SAFRA_TOKEN_DISPLAY SAFRA_SENHA_TECLADO SAFRA_PASS_QR DESCO_POS_TABELA DESCO_CERT DESCO_TOKEN_6 DESCO_TOKEN_8 DESCO_PASS_QR DESCO_CEL_VISOR DESCO_PISCA BRB_CODIGO BRB_SENHA_TECLADO BRB_PASS_QR ITA_DATA ITA_SENH6 ITA_TOKAPP ITA_TOKCELL ITA_QR
Abusing custom actions in MSI
Outside of standard, built-in actions used to execute installations, there are cases where a developer may need to write a custom action. Microsoft enumerates the following scenarios where custom actions could be necessary:
An executable installed on the user’s machine or being installed with an application has to be launched during the installation process.
Special functions defined in a DLL has to be called during the installation process.
Functions written in the programming languages Microsoft Visual Basic Scripting Edition or Microsoft JScript literal script text have to be used during the installation process.
Some actions have to be deferred until the execution of the installation script.
Time and progress information have to be added to a ProgressBar control and a TimeRemaining Text control.
Consequent to these situations, abuse of the first and second scenarios is also not unlikely with sophisticated malware.
Figure 13. From Orca MSI Editor: CustomAction contains VBScript
After checking another sample containing VBScript (see Figure 13), we could infer that the malware creator used the Advanced Installer application to build the samples, because the sample needs a third-party library such as powershellscriptlauncher.dll to run the PowerShell script for viewing logs and processes.
Figure 14. Advanced Installer with other custom actions
We were able to add to or modify custom actions of the samples, such as executing JS, VBS, and PowerShell scripts, and even loading libraries, with Advanced Installer. This could be favorable to malicious actors looking to abuse the functions so that they can easily modify normal MSI packages and insert malicious scripts.
Figure 15. Custom actions indicating existing and newly created PowerShell scripts
Figure 16. Adding a new custom action to run a PowerShell script
Currently, the malware downloads archives that contain multicomponent (DLL side-loading) malware.
Mitigation and solutions
We have noted that abusing MSI packages for malicious intent is typically done to install potentially unwanted applications (PUAs) and not necessarily to drop malware. Malware installation utilizing MSI packages and custom actions is another mechanism to look out for, as malicious actors may use it to skirt around security software that only detects traditional installation methods.
The malware creators in this case might be testing different malware arrival methods and focusing on targets located in Brazil and Portugal, based on the language in the spam email, site redirection, and folder paths that we encountered during our analysis. As a first line of defense, we recommend that users avoid installing unknown files and clicking on URLs that may redirect to sites that download malicious files. Users can also practice good security hygiene by updating systems with the latest security patches or by employing solutions that can defend against possible exploits.
Trend MicroXGen security provides a cross-generational blend of threat defense techniques against a full range of threats for data centers, cloud environments, networks, and endpoints. It features high-fidelity machine learning to secure the gateway and endpoint data and applications, and protects physical, virtual, and cloud workloads. With capabilities like web/URL filtering, behavioral analysis, and custom sandboxing, XGen protects against today’s purpose-built threats that bypass traditional controls and exploit known, unknown, or undisclosed vulnerabilities. Smart, optimized, and connected, XGen powers Trend Micro’s suite of security solutions: Hybrid Cloud Security, User Protection, and Network Defense.
The list of indicators of compromise (IoCs) related to this threat can be found in this appendix.
With additional analyses by Henry Alarcon Jr., John Rey Cañon, and Jay Nebre
The post Analysis: Abuse of Custom Actions in Windows Installer MSI to Run Malicious JavaScript, VBScript, and PowerShell Scripts appeared first on .
#gallery-0-5 { margin: auto; } #gallery-0-5 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 33%; } #gallery-0-5 img { border: 2px solid #cfcfcf; } #gallery-0-5 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
Go to Source Author: Trend Micro Analysis: Abuse of Custom Actions in Windows Installer MSI to Run Malicious JavaScript, VBScript, and PowerShell Scripts Original Post from Trend Micro Author: Trend Micro by Llallum Victoria (Threats Analyst) Windows Installer uses Microsoft Software Installation (MSI) package files to install programs.
0 notes
its-xornoth-bitch · 3 months ago
Note
If you did fight shrub who do you think would win?
I mean, it's pretty obvious who would win, have you seen us standing next to each other? She's what, four foot? I'm six eight.
@yourfavoritegnome do you wanna find out? I would 100% understand if you don't, but I won't go easy on you if you do.
18 notes · View notes
its-xornoth-bitch · 9 months ago
Note
hands you. Lemonade
Um. Okay. What do I do with this?
18 notes · View notes
its-xornoth-bitch · 11 months ago
Note
what happened to you after the rapture
Oh. My. God.
Anon. You don't just ask people how they died! That's rude. 🙄
But fine. Scott killed himself (in some 'honorable sacrifice' that honestly just read like he wanted to kill himself.) and I died. Simple. Unfortunately, everyone from the original universe who was slightly tolerable is less tolerable in this one.
Well, other than Joey. He's slightly more tolerable here, I think. Less obsessed with dating a demon, and more like that annoying guy who has a crush on you.
18 notes · View notes
its-xornoth-bitch · 2 months ago
Note
he’d willingly leave you for a freaky god who hurts him
what does that say about him? what does that say about you?
don't. I don't want to think about it.
It's— It does say a lot about him though. He knows I could be just as bad, but I'm not. And he doesn't want that. He's— I don't know. I'd personally choose the person who might care than the one I know doesn't but he's always been a little weird.
5 notes · View notes
its-xornoth-bitch · 7 months ago
Note
is it possession if it feels like your choice?
is it possession if it feels like your choice?
Don't. Don't fucking do that. Don't put those thoughts in my head, I'll fucking believe them.
7 notes · View notes
its-xornoth-bitch · 2 months ago
Note
you will always be in his shadow.
I'm older than him.
4 notes · View notes
its-xornoth-bitch · 9 months ago
Note
| ||
|| |_
what the fuck is this
8 notes · View notes
its-xornoth-bitch · 10 months ago
Note
YOUR TURN IN THE THERAPY BOX LOSER‼️
⬇️⬇️⬇️
📦📦📦‼️
GET IN
No. Okay, you know what, I actually agree with you for once-
7 notes · View notes
its-xornoth-bitch · 9 months ago
Note
what even is your relationship with joey i'm so curious
uh. @lostemperorjoey? you take this one. i don't even know how to describe what we are.
6 notes · View notes
its-xornoth-bitch · 11 months ago
Note
How’s Scott doing? With the whole new reality thing?
Gone back to his usual annoyingness. He's even more insufferable now he and that fish guy got married (i cant be bothered to remember his name, i just call him fishy. it annoys everyone and i love it. why would i bother to learn his name when fishy works just fine)
But yeah, he's acting like all that stuff with the rapture, and killing us never happened. Or at least, trying to.
15 notes · View notes
its-xornoth-bitch · 2 months ago
Note
do you ever think about running away from it all
do you ever think about being sǒ̵̵͓̫̲̭͔̄̄̈́͟͞m̶̷͔ͪ̽͡eoň̵̵͓̫̲̭͔̄̄̈́͟͞e eḻ̸͈ͧ͑̓̓̀͡š̵̵͓̫̲̭͔̄̄̈́͟͞ę̷̵̧̖̫̗̆̊?
....no.
2 notes · View notes
its-xornoth-bitch · 11 months ago
Note
Wait, jeoys dead?
In the original universe.
In me and Scott's afterlife, he's alive. Just slightly different.
Less annoying, actually. But I do miss the guy who would do anything for me no questions asked.
7 notes · View notes
its-xornoth-bitch · 2 months ago
Note
do you still want Joey? I’m sure he’d be delighted to stay.
Yes. Of course I do. More than anything. That's why I'm here, isn't it? but not with him.
2 notes · View notes
its-xornoth-bitch · 2 months ago
Note
doesn’t that feel so much better?
not really.
Yeah. Mhm.
2 notes · View notes