Attackers abusing Internet Explorer to enumerate software and detect security products

Status
Not open for further replies.

Terry Ganzi

Level 26
Thread author
Verified
Top Poster
Well-known
Feb 7, 2014
1,540
During the last few years we have seen an increase on the number of malicious actors using tricks and browser vulnerabilities to enumerate the software that is running on the victim’s system using Internet Explorer.

In this blog post we will describe some of the techniques that attackers are using to perform reconnaisance that gives them information for future attacks. We have also seen these techniques being used to decide whether or not they exploit the victim based on detected Antivirus, versions of potential vulnerable software or the presence of certain security features such as Enhanced Mitigation Experience Toolkit EMET. EMET is a Microsoft tool that uses security mitigation to prevent vulnerabilities from being successfully exploited. This makes it more difficult for attackers – so they would prefer to avoid it.

1. Abusing res:\\

The first technique we are describing affects Internet Explorer 8 and earlier. Internet Explorer blocks attempts to access the local file system using “file://” but it used to be possible to access image files within a resource section of a DLL/EXE. In a previous blog post we mentioned how attackers were using this technique as part of a waterhole campaign affecting a Thailand NGO. In that case we found the following code in the HTML of the affected website:

internet_explorer_exploit_1.png


The resList array contains a list of executable files with resource sections containing an image file. An example using explorer.exe:

{id: 'Windows Explorer', res: 'res://explorer.exe/#2/#143'}

If we take a look at the resource sections present on explorer.exe we can find a resource named 143:

internet_explorer_exploit_resource_editor.png




The resLis array contains a big list of executable files that is used to detect Antivirus software and VMware (probably to check if it is an analysis machine used by a security researcher):

Internet_explorer_exploit_reslis.png


The complete list of detected software is:

  • Webroot
  • Sophos
  • Microsoft Security Client
  • F-Secure
  • BitDefender
  • Norton Antivirus
  • McAfee Antivirus
  • Kingsoft Antivirus
  • Avira Antivirus
  • Kaspersky Antivirus
  • 360 AV
  • ESET NOD32
  • Trend Micro Internet Security
  • Rising Antivirus
  • Vmware Player
  • Vmware Tools
We found similar code being used by the Sykipot actors in combination with a phishing scheme. In that case the list of software was much longer and it detected common software along with security products:



The list of detected software:

  • Microsoft Office (all versions)
  • WPS (Kingsoft Office)
  • Winrar
  • Winzip
  • 7z
  • Adobre Reader (all versions)
  • Skype
  • Microsoft Outlook (all versions)
  • Yahoo Messenger (all versions)
  • Flashget
  • Thunder
  • Emule
  • Serv-U
  • RAdmin
  • UltraVNC
  • pcAnywhere
  • RealVNC
  • Fetion
  • Google Talk
  • AliIM
  • POPO
  • ICQLite
  • ICQ
  • Tencent Messenger
  • Sina UC
  • QQ
  • BaihI
  • AIM
  • Microsoft Messenger
  • Windows Live MSN
  • Windows Media Player (all versions)
  • SSReader
  • PPStream
  • Storm Player
  • TTPlayer
  • Haojie SuperPlayer
  • Winamp
  • KuGoo
  • UltraEdit
  • Sylpheed
  • ACDSee
  • Photoshop
  • Foxmail
  • Gmail Notifier
  • Windows Live Mail
  • Adobe Media Player
  • Flash CS
  • Dreamwear
  • Fireworks
  • Delphi
  • Java
  • VMware Tools
  • Tracks Eraser
  • Microsoft Virtual PC
  • VMware
  • Microsoft ActiveSync
  • Microsoft .NET
  • PGP
  • CCClient
  • DriverGenius
  • Daemon Tools
  • MagicSet
  • Baidu Tool
  • Foxit Reader
  • MySQL Server (all versions)
  • SQLyog
  • Firefox
  • World IE
  • TT IE
  • Google Chrome
  • Maxthon
  • 360 IE
  • Opera
  • Safari
  • SaaYaa
  • GreenBrowser
Security software detected:

  • Microsoft Security Essentials
  • AVG
  • 360
  • SSM
  • Keniu
  • ESET
  • NOD32
  • Skynet Firewall
  • Kingsoft
  • Norton
  • Rising AV
  • Kaspersky
  • JingMin kav
  • Mcafee
  • BitDefender
  • AntiVir
  • TrendMicro
  • Avira
  • Dr Web
  • Avast
  • Sophos
  • Zone Alarm
  • Panda Security
They also used this code snippet to detect Adobe Acrobat Reader (English, Chinese and Taiwanese.)



Finally they were also able to list the patches that were installed in the Microsoft platform using a predefined list of patch numbers:

internet_explorer_exploit_patches_70_300.png




2. Microsoft XMLDOM ActiveX control information disclosure vulnerability

Another technique we found is being used by the Deep Panda actors. They usually use this code in waterholing campaigns to detect specific software installed on the intended victim's system. It exploits the XMLDOM ActiveX to check for the presence of multiple files and folders:



This vulnerability was disclosed last year and it affects Internet Explorer versions 6 through 11 running on Windows through version 8.1.



Software enumerated includes most of the Antivirus and endpoint security products on the market:

  • 7z
  • AhnLab_V3
  • BkavHome
  • Java
  • COMODO
  • Dr.Web
  • ESET-SMART
  • ESTsoft
  • F-PROT
  • F-Secure
  • Fortinet
  • IKARUS
  • Immunet
  • JiangMin
  • Kaspersky_2012
  • Kaspersky_2013
  • Kaspersky_Endpoint_Security_8
  • Mse
  • Norman
  • Norton
  • Nprotect
  • Outpost
  • PC_Tools
  • QuickHeal
  • Rising
  • Rising_firewall
  • SQLServer
  • SUPERAntiSpyware
  • Sunbelt
  • Symantec_Endpoint12
  • Trend2013
  • ViRobot4
  • VirusBuster
  • WinRAR
  • a-squared
  • antiyfx
  • avg2012
  • bitdefender_2013
  • eScan
  • eset_nod32
  • f-secure2011
  • iTunes
  • mcafee-x64
  • mcafee_enterprise
  • north-x64
  • sophos
  • symantec-endpoint
  • systemwaler
  • systemwaler-cap
  • trend
  • trend-x64
  • var justforfunpath
  • vmware-client
  • vmware-server
  • winzip
3. More XMLDOM vulnerabilities

At the beginning of the year we found a different method being used in combination with a Zeroday vulnerability affecting Internet Explorer (CVE-2014-0322) targeting the French Aerospace Association. In that case we found the following code snippet.

The attackers were using a similar technique to detect if EMET was present on the system. If EMET was detected they didn’t trigger the exploit since EMET was able to block it and alert the user to the 0 Day and diminish the attacker's effectiveness.



A month after the exploit code was made public we detected the same technique being used in the Angler Exploit Kit. They were using it to detect Kaspersky Antivirus.



In recent samples of the Angler Exploit Kit we have seen an improved version where they added detection for TrendMicro products.



In this blog post we have given an overview of the different techniques attackers are using to enumerate software running on a remote system. These techniques can give attackers information that they can use in future attacks to exploit certain vectors based on the software running (or not running) on a system. In addition, we've illustrated ways were cybercriminals have adapted and copied techniques used by more advanced attackers for their own purposes.

References:

Vulnerability in Internet Explorer 10.1

XMLDOM vulnerability

URI Use and Abuse

Angler Exploit Kit

ON-DEMAND WEBCAST:
Using Crowd-Sourced Threat Intelligence to Stay Ahead of Exploits
As part of developing a vulnerability management strategy, it’s important to think through the “what if” scenarios that you need to defend against. However, if you’re only considering your own knowledge of potential threats, your plan will likely be incomplete. Join Jaime Blasco, Director of AlienVault labs for a discussion on how to use collaborative threat intelligence to strengthen your vulnerability management strategy.

WATCH THE ON-DEMAND WEBCAST NOW
 
D

Deleted member 21043

Oh @Microsoft (is this even a proper tag? I don't think so :D)... When will you learn what you have to get down and fix on your Windows Operating Systems? How about you stop working on those pointless apps on metro and re-design and redo Internet Explorer? You own Windows, you coded it. Are you trying to tell me that over at Firefox and Google they have learnt to code better than you yourself on your OWN operating system and make more stable apps than you? Yes, everyone knows it, so do something about it.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top