• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Antivirus For Server • Malware • Security  /  An in-depth analysis of a new, emerging “.url” malware campaign
An in-depth analysis of a new, emerging “.url” malware campaign
19 March 2018

An in-depth analysis of a new, emerging “.url” malware campaign

Written by Pradeep Kulkarni
Pradeep Kulkarni
Antivirus For Server, Malware, Security
5
Shares

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it.

Let’s take a look at the below attack chain which depicts the execution sequence observed in this attack where a “.url” file is being used to spread malware.

Fig 1. Attack Chain
Fig 1. Attack Chain

Following is the figure of process summary of the attack chain.

Fig 2. Process Summary
Fig 2. Process Summary

As explained above, generally “.url” contains URL (“https://” or “https://”), but in this case, we have observed SMB shares being accessed to execute a malicious JavaScript.

Fig 3. .URL File accessing SMB share
Fig 3. .URL File accessing SMB share

The above file is related to CVE-2016-3353 where an Internet Explorer mishandles ‘.url’ files from the Internet zone and allows remote attackers to bypass intended access restrictions via a crafted file.

These SMB shares are publicly accessible and can be accessed without authentication. Fig 3 and 4 show public SMB share location “buyviagraoverthecounterusabb[.]net/documents/” where the malicious JavaScript files are stored. The malicious SMB share location IP address is “91.102.153.90”.

Fig 4. Communication captures while SMB shares access
Fig 4. Communication captures while SMB shares access
Fig 5. JavaScript Files stored publicly
Fig 5. JavaScript Files stored publicly

The following figure shows a malicious JavaScript being delivered to the victim via SMB protocol.

Fig 6. SMB request
Fig 6. SMB request

Upon opening the malicious JavaScript, it’s opening by ‘wscript.exe’ application.

Fig 7. User Prompt
Fig 7. User Prompt

The second stage malware is downloaded by a malicious JavaScript once the victim clicks on ‘Open’, as shown in Fig 5. This malicious JavaScript is highly obfuscated and is only used as a first stage downloader.

Fig 8. Malicious JavaScript downloader
Fig 8. Malicious JavaScript downloader

The second stage malware is downloaded in ‘%TEMP%’ location by JavaScript and spawned through ‘cmd.exe’. This is a heavily obfuscated executable which gets directly executed in the memory. This malware appears to be a variant of ‘Quant Loader’ and can be used to download other malware. At the time of analysis by Quick Heal Security Labs, we did not observe malware downloaded by Quant Loader. Let’s take a look at the working of the Quant Loader malware.

The Quant Loader malware checks for all of the keyboard locale of the system through “Keyboard Layout\Preload”. It exits if the locale is any amongst the Russian, Ukraine, and Kazakhstan.

Fig 9. Check for the locale of the system
Fig 9. Check for the locale of the system

Quant Loader makes use of the following registry key to identify the 32/64 bit configuration of the victim’s system. It then uses the same information as part of CNC request while communicating with the CnC server.

HKLM\ SOFTWARE \ Microsoft \ Windows \ CurrentVersion  ProgramFilesDir (x86)

It also checks for the presence of following registry entries.

Fig 10. Check presence of different security products
Fig 10. Check presence of different security products

It drops a self-copy by the name ‘dwm.exe’ in ‘<Appdata ShellFolder>\<8DigitNumeric>’ folder and sets the same for auto execution through “Run” entry in registry. This is done to achieve persistence in the system.

Fig 11. Self-copy of the malware file
Fig 11. Self-copy of the malware file

This 8 Digit Number is used as a Bot ID (BotId) while communicating with the CNC Server. It generates the BotId through the following steps:

  1. Read ‘HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid’
  2. Extracts only digits from the value of Machine ID in occurring sequence
  3. Omit first 5 numbers and considers 8 digits from 5 onwards
Fig 12. Use of MachineGuid as BotId
Fig 12. Use of MachineGuid as BotId

It then changes the user access permission of 8 digit folder and ‘dwm.exe’ file to read mode for the logged-in user. This restricts the user to delete or modify the folder and ‘dwm.exe’. This is achieved by making use of a genuine CACLS windows file through the following command.

cmd /c echo Y|CACLS “c:\users\<username>\appdata\roaming\48378942\dwm.exe” /P “<username>:R”

 The Quant Loader then adds the below rule in the Firewall with the name “Quant” which allows the malware to communicate on the Internet bypassing Firewall rules.

netsh advfirewall firewall add rule name=”Quant” program=”c:\users\<username>\appdata\roaming\48378942\dwm.exe” dir=Out action=allow

It also tries to connect to the CNC domain ‘wassronledorhad[.]in’ and download other malicious files.

The CNC was not responding when the analysis was carried out. However, the static analysis gives some insights into the probable CNC communication and other functionalities of Quant Loader.

The below files would have been downloaded if the CNC server was alive.

hxxp://wassronledorhad.in/q2/lib/zs.dll.c
hxxp://wassronledorhad.in/q2/lib/bs.dll.c
hxxp://wassronledorhad.in/q2/lib/sql.dll.c

These files are stored in %APPDATA%\z folder as zs.dll, bs.dll and sqlite3.dll respectively.

Fig 13. Download file names
Fig 13. Download file names

It checks the filesize of ‘zs.dll’ and ‘sqlite3.dll’ for less than 0x20000. It then executes the “Main” function from zs.dll.

Fig 14. Load and execute the downloaded DLL
Fig 14. Load and execute the downloaded DLL

Quant Loader tried to send the following requests to the CNC Server.

hxxp://wassronledorhad[.]in/q2/index.php?id=48378942&c=2&mk=75490e&il=H&vr=1.73&bt=32

Wherein the id = BotId, c = request counter, bt = 32/64 bit system

It waits for the command from the CNC server which has the following structure:

[BotId][Command][Data]

The command can be any of the following – “pwd”, “exe”, “doc”, “dll”.

Fig 15. List of bot commands
Fig 15. List of bot commands

The “pwd” command was also found to be executing the zs.dll with the “Main” function.

For the rest of the commands, the malware creates a file with a name as windows timestamp in ‘temp’ folder.

Fig 16. Use of system time to make file name
Fig 16. Use of system time to make file name

If the command is “exe” then it executes the file with ShellExecute API.

Fig 17. Call to ShellExecute to execute downloaded exe file
Fig 17. Call to ShellExecute to execute downloaded exe file

If the command is “doc” then it executes the file with WinExec API.

Fig 18. Call to WinExec to execute downloaded doc file
Fig 18. Call to WinExec to execute downloaded doc file

If the command is “dll” then it makes use of “LoadLibrary” and “GetProcaddress” to execute the desired function from dll as seen in fig 13 given earlier.

Thus, depending on the commands, the bot may download other malicious files and execute them.

The ‘.Url’ attack vector is currently being used by Quant Loader. We may see a rise in the use of this novice attack vector (.url) by other malware families in the coming days.

Indicators of compromise:

50C359167CC74A962CACAFF2A795B23C
4394536E9A53B94A2634C68043E76EF8
buyviagraoverthecounterusabb[.]net/documents/B200795218387[.]js
91.102.153.90

Subject Matter Experts

  • Pradeep Kulkarni, Amar Patil, Aniruddha Dolas | Quick Heal Security Labs

 Previous Post5 Must Have Features of a Network Security Solution
Next Post  Prioritizing cybersecurity: Where to start?
Pradeep Kulkarni

About Pradeep Kulkarni

Pradeep Kulkarni is leading the IPS team in Quick Heal Technologies Limited. Having worked in the IT security industry for over 11 years, he has worked on various...

Articles by Pradeep Kulkarni »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies