Skip to content

Commit

Permalink
2024.02.26.Earth_Lusca_Uses_Geopolitical_Lure_to_Target_Taiwan_Before…
Browse files Browse the repository at this point in the history
…_Elections

add 1 pdf and 2 txt
  • Loading branch information
eolwral committed Jun 27, 2024
1 parent 16f1cf2 commit b534fde
Show file tree
Hide file tree
Showing 4 changed files with 239 additions and 0 deletions.
Binary file not shown.
Original file line number Diff line number Diff line change
@@ -0,0 +1,201 @@
Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections

During our monitoring of Earth Lusca, we noticed a new campaign that used Chinese-Taiwanese relations as a social engineering lure to infect selected
targets.

By: Cedric Pernet, Jaromir Horejsi February 26, 2024
____________________________________________________________________________________________________________________________________________________

Introduction

Trend Micro previously published a number of entries discussing the operations of a China-linked threat actor we track as Earth Lusca. The group, which
has been active since at least 2020 and has regularly changed its modus operandi, has been known to launch several different campaigns at the same time.

During our monitoring of this threat actor, we noticed a new campaign that used Chinese-Taiwanese relations as a social engineering lure to infect
selected targets. We attribute this campaign to Earth Lusca with high confidence based on the tools, techniques, and procedures (TTPs) we observed in
previous research.

The attack campaign discussed in this report has likely been active between December 2023 and January 2024, with a file that contained a lure document
discussing Chinese-Taiwanese geopolitical issues. This file was created just two days before the Taiwanese national elections and the document seems to
be a legitimate document stolen from a geopolitical expert from Taiwan.

Note that a recent leak of private documents provides a new attribution path to a Chinese company called I-Soon. We discuss these connections in a
separate section in this entry. There is significant overlap between the victims, malware used, and probable location of Earth Lusca and I-Soon. This
suggests, at the very least, a significant connection between these groups. Our research is continuing at this time.

Earth Lusca attack chain

Figure 1. The infection chain used in the campaign

Initial access via spear phishing

Although we were not able to determine the initial method Earth Lusca used to deliver infection files to its targets, we found the initial infection
file, an archive (.7z) named China_s gray zone warfare against Taiwan.7z. Based on the threat actor's previous activities, we suspect this file was sent
to the targets via email, either embedded as an attachment or as a link.

The archive consists of a folder named "China's gray zone warfare against Taiwan" that contains two different Windows shortcut files (.LNK) and a
subfolder named "__MACOS".
Figure 2. The content of the 7-Zip archive

The __MACOS subfolder name resembles the legitimate __MACOSX folder name created by macOS, which is hidden by default and is used to store each folder's
various settings. In the case we analyzed, the __MACOS folder does not contain any metadata but instead hides another stage of the malicious payload.

The __MACOS subfolder contains two files named "_params.cat.js" and "_params2.cat.js".

All the files show metadata indicating that the files were last modified on Jan. 11, 2024.

First stage: Shortcut (LNK) file with hidden target attribute

The LNK files, once selected, executes the JavaScript code stored in the __MACOS folder.

If users attempt to right-click on the malicious LNK file and display its "target" parameter, they are presented only with an explorer.exe file name
followed by space characters, as can be seen in Figures 3 and 4.

Figure 3. Beginning (top) and end (bottom) of the "target" property field (space characters are in blue)

The threat actor inserted 255 space characters in the "arguments" attribute before including the actual path to the malicious script to ensure that users
don't notice anything is amiss.

Tools such as LNK parser reveal the entire content of the "arguments" field:

Figure 4. 255 space characters were used before the actual argument value.

Second stage: Obfuscated JavaScript file

The second stage is obfuscated with Dean Edward's JavaScript Packer, a tool designed to obfuscate JavaScript code to hinder analysis and detections.

Figure 5. Typical signature of Dean Edward's JavaScript Packer

Third stage: Deobfuscated JavaScript file and dropper

The third stage drops a text file containing hexadecimal data to the %APPDATA%\Roaming directory.

Figure 6. The text string with "4d534346 = MSCF" marker is written to a temporary file.

This text file contains a magic signature, 4d534346, which is the Microsoft Cabinet File (MSCF) signature of a cabinet archive. The JavaScript then uses
a living-off-the-land technique and calls a few LOLBins to decode a hexadecimal string to the binary file (certutil.exe) and unpack the cabinet archive
(expand.exe).

Figure 7. Content of cabinet archive

The extracted cabinet archive contains a decoy file, a signed legitimate executable file, and a malicious DLL library.

In the cases we observed, we found the decoy files to be either Microsoft Word documents, Microsoft PowerPoint documents, or PDF documents. Although
these were written by professionals involved in political relations between China and Taiwan, we could not find any of these documents online. We suspect
with moderate to high confidence that these documents were stolen from these authors or their employers. We have reached out to these individuals and
organizations and warned themabout the possible compromise of their systems.

The signed legitimate executable file, 360se.exe from Qihoo 360, was renamed to pfexec.exe by Earth Lusca in a case of DLL hijacking. Once executed, it
launches the DLL contained in the same folder (chrome_elf.dll).

Fourth stage: Cobalt Strike stageless client (malicious obfuscated DLL library)

The last stage of the infection chain is a stageless Cobalt Strike payload. The noteworthy parameters extracted from the embedded configuration are
listed here:

C2Server - upserver.updateservice.store,/common.html
HttpPostUri - /r-arrow
Watermark - 100000000

Similar attacks

During the monitoring of this campaign, we received more archives using similar structures and employing comparable tricks but having different file
names, decoy names, and command-and-control (C&C) servers, among others.

One such noteworthy file, another 7z archive file named "ppt-cih1w4.7z", contained a folder named "Sino-Africa_relations" as seen in Figure 8:

Figure 8. Content of the 7-Zip archive

The folder also contained an LNK file and a __MACOS folder with payload, this time timestamped Dec. 22, 2023.

Similar to the previously analyzed archive, several stages lead to this last stage (namely Cobalt Strike), only with different configurations. The C&C
server name abuses the name of the cybersecurity company Cybereason. The malleable profile is also different this time and uses different URLs, although
the watermark remains the same.

C2Server - www.cybereason.xyz,/mobile-android
HttpPostUri - /RELEASE_NOTES
Watermark - 100000000

Attack started shortly before 2024

As mentioned in the introduction, the campaign exposed in this report was likely active between December 2023 and January 2024, with the lure document
created just two days before the Taiwanese national elections.

The C&C domain used by Earth Lusca (updateservice[.]store) was registered anonymously on Dec. 12, 2023 and a subdomain was used for C&C communications
(upserver.updateservice[.]store).

Meanwhile, the other C&C domain used in this attack campaign (Cybereason[.]xyz) was registered anonymously on Oct. 27, 2023.

Both C&C servers are unavailable as of this writing.

We also found evidence that Earth Lusca targeted a Taiwan-based private academic think tank dedicated to the study of international political and
economic situations.

While we could not find other campaign targets at the time of writing, we suspect Earth Lusca might be planning to attack more politically related
entities.

The I-Soon lead

A recent leak on GitHub exposed sizeable data on a Chinese company called I-Soon that has seemingly been active since 2016. The company describes itself
on its website as an "APT Defense and Research Laboratory" and provides descriptions of its services: offensive and defensive security, antifraud
solutions, blockchain forensics solutions, security products, and more. The group also notes several law enforcement and government entities with which
it collaborates. As an interesting aside, I-Soon had been the recipient of a few rounds of fundings since 2017. One of its investors was the antivirus
company Qihoo from China -- which, as stated earlier, had an executable file abused for DLL hijacking.

We found a few indicators in the I-Soon leak that made us believe that some of the Earth Lusca activities are similar to the contents of the leak:
1. There is some victim overlap between Earth Lusca and I-Soon: Some of the names on the victim lists of the I-Soon leak were also victims of Earth
Lusca's attacks.
2. The malware and tools arsenal used by I-Soon and Earth Lusca has a few strong overlaps. Malware such as ShadowPad, Winnti and a few other tools have
been used extensively by Earth Lusca and are used by i-Soon as well.
3. We also discovered a location overlap between the two. In a blog entry in September 2023, we mentioned that Earth Lusca's source IP addresses are
from Chengdu, Sichuan province, where the main office of I-Soon's penetration teams is also located.

Conclusion

Earth Lusca remains an active threat actor that counts cyberespionage among its primary motivations. Organizations must remain vigilant against APT
groups employing sophisticated TTPs. In particular, government organizations face potential harm that could affect not only national and economic
security but also international relations if malicious actors were to succeed in stealing classified information. Meanwhile, businesses that fall prey to
cyberespionage attacks might face a decline in customer trust and operational disruptions that in turn lead to financial repercussions.

Given Earth Lusca's penchant for using email, resorting to social engineering as one of its main avenues of infection, and capitalizing on relevant
social and political issues as seen in this campaign, we advise individuals and organizations to adhere to security best practices, such as avoiding
clicking on suspicious email and website links and updating software in a timely manner to minimize the chances of falling victim to an Earth Lusca
attack

MITRE ATT&CK techniques

Below listed techniques are subset of MITRE ATT&CK list..
Tactic Technique ID Description
Initial Access Phishing: Spear-phishing Link T1566.002 Used to send spear-phishing emails with a malicious attachment in an attempt to gain access to
victim systems
Execution Command and Scripting Interpreter: Windows Command Shell T1059.003 Used to leverage cmd to execute various commands and payloads.
Execution Command and Scripting Interpreter: JavaScript T1059.007 Used to execute various commands and payloads.
Execution User Execution: Malicious Link T1204.001 An adversary may rely upon a user clicking a malicious link in order to gain execution.
Execution User Execution: Malicious File T1204.002 An adversary may rely upon a user opening a malicious file in order to gain execution.
Defense Evasion Deobfuscate/Decode Files or Information T1140 Used Obfuscated Files or Information to hide artifacts of an intrusion from analysis
Defense Evasion Hide Artifacts: Hidden Files and Directories T1564.001 Set files and directories to be hidden to evade detection mechanisms.
Defense Evasion Hijack Execution Flow: DLL Search Order Hijacking T1574.001 Adversaries may execute their own malicious payloads by hijacking the search
order used to load DLLs.
Defense Evasion Indirect Command Execution T1202 Used to abuse utilities that allow for command execution to bypass security restrictions that limit the
use of command-line interpreters.
Defense Evasion Masquerading: Double File Extension T1036.007 Used to abuse a double extension in the filename as a means of masquerading the true file
type.
Defense Evasion Obfuscated Files or Information: Software Packing T1027.002 Adversaries may perform software packing or virtual machine software
protection to conceal their code.
Defense Evasion Obfuscated Files or Information: Embedded Payloads T1027.009 Adversaries may embed payloads within other files to conceal malicious
content from defenses.
Defense Evasion Obfuscated Files or Information: LNK Icon Smuggling T1027.012 Adversaries may smuggle commands to download malicious payloads past
content filters by hiding them within otherwise seemingly benign windows shortcut files.
Discovery File and Directory Discovery T1083 Adversaries may enumerate files and directories.
Command and Control Data Encoding T1132 Adversaries may encode data to make the content of command and control traffic more difficult to detect.
Command and Control Data Obfuscation T1001 Adversaries may obfuscate command and control traffic to make it more difficult to detect.
Command and Control Encrypted Channel T1573 Adversaries may employ a known encryption algorithm to conceal command and control traffic.
Exfiltration Exfiltration Over C2 Channel T1041 Adversaries may steal data by exfiltrating it over an existing command and control channel.

The final payload, Cobalt Stike, might use additional techniques listed on the MITRE website.

Indicators of Compromise (IOCs)

The indicators of compromise for this entry can be found here.
We'd like to thank Trend's Ian Kenefick and Cyris Tseng for additional intelligence.
Tags
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections
======================================================================
[7z archives]
6306b20b4b3fc089a7fd0e0b15ea52da879da95463d247d4f0a698207eda2718
998c18cef6f79bab58b78b390a518c3a7c8e48da37b0953e72cbe04c1287d85d
bc0697f074bcd9d26eb3fc65b1d305661c9c9d32ef0afe83fac4083d04fe38b4

[LNK files]
e1b3bdde52fdec917aaa79f8fb1e01186447def36594339bac316a13d84ee667
2fa270cf83b341bc469b0d4430d2b5c3e95109b4b47f4f99c9e878aeaff8ec33
b7afa2662f99edcda4be8539fcc6149176f3cb241a724932cadda4088ca695ea
8a3bb648ecdffe4e6b0dcdd988c3f28eeb5dcb9e60e84fc4b7f5db947d77ebb8

[JS files]
32dda71e75546bed9c3032a139fb1ef8d1b05e35f26bccb568cebbae76db7f01
5a99e609bb4d3085ce0f82b23c5ce597ebf1401156d1f002a850293f8f8fac49
434517ef2e12af66ef97b740e4caf9b07a73f1321bf013b6ee6dd0d180804409
22b2d9c5d3aa575283bc0afc60df5fb8720c384bd7040ca6e4e42491b5fefcde

[Cabinet archives]
f32415fab8cc5ce811088b85475d0691815e6ac3ff9a65c1f6a134fa25f05b4f
2fe53a6d753eb0e288b0e514b5668ed13749227da65cd346c144c0cf8e438974
a19b88046b9ecd462037c7eef4cda1407664a1010ee0c8ef2b2fc907a129f6b7
119d6dbe182a8f4c060ae270a3606a72c7042af01de95f65936ff86774873ee7

[Cobalt Strike]
fb6b0ff2da14b6447b21f0fc4ae73724667c8f6d296d707f18a28633b4e59ed0
e075e35f74df484366f5a1497ebeb7262c16e6dad0ed6eadd18c11b0a512c7a0

[Decoy files]
156eec85df18e7ff992a5bf35c97938557ac506c2306a8cb6633602d8a6568ed
aa880c609f5cbac2b45977359d1fd87f8292bc23e262c7a71530ae28948bdb49
59e8f42f8cd6f5bcbe5398d393314161e565adb6fb9620ddb2526798f3c34354

[C&Cs servers]
upserver.updateservice.store
www.cybereason.xyz
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
* May 16 - [[Palo Alto Networks] Payload Trends in Malicious OneNote Samples](https://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples/) | [:closed_book:](../../blob/master/2024/2024.05.16_Payload_Trends_in_Malicious_OneNote_Samples)
* Mar 07 - [[ESET] Evasive Panda leverages Monlam Festival to target Tibetans](https://www.welivesecurity.com/en/eset-research/evasive-panda-leverages-monlam-festival-target-tibetans/) | [:closed_book:](../../blob/master/2024/2024.03.07_Evasive_Panda)
* Feb 27 - [[Mandiant] When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors](https://www.mandiant.com/resources/blog/suspected-iranian-unc1549-targets-israel-middle-east) | [:closed_book:](../../blob/master/2024/2024.02.27.UNC1549)
* Feb 26 - [[Trend Micro] Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections](https://www.trendmicro.com/en_us/research/24/b/earth-lusca-uses-geopolitical-lure-to-target-taiwan.html) | [:closed_book:](../../blob/master/2024/2024.02.26.Earth_Lusca_Uses_Geopolitical_Lure_to_Target_Taiwan_Before_Elections)
* Feb 23 - [[Sophos] ConnectWise ScreenConnect attacks deliver malware](https://news.sophos.com/en-us/2024/02/23/connectwise-screenconnect-attacks-deliver-malware/) | [:closed_book:](../../blob/master/2024/2024.02.23.ConnectWise_Malware)
* Feb 23 - [[Palo Alto Networks] Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns](https://unit42.paloaltonetworks.com/i-soon-data-leaks/) | [:closed_book:](../../blob/master/2024/2024.02.23.Data_From_Chinese_Security_Services_Company_i-Soon_Linked_to_Previous)
* Feb 16 - [[---] inside I-Soon APT(Earth Lusca) operation center](https://github.com/I-S00N/I-S00N) | [:closed_book:](../../blob/master/2024/2024.02.16_I-Soon_Earth_Lusca)
Expand Down

0 comments on commit b534fde

Please sign in to comment.