Introduction
Recently, welivesecurity published a post introducing CloudScout
by Evasive Panda - a post-exploitation toolset designed to exfiltrate data from various cloud services using stolen web cookies from different browsers. This revelation piqued my interest in understanding how .NET
binaries (managed code) can be dynamically loaded and executed from unmanaged C/C++ code. Such techniques are not only used in malware operations but also have legitimate applications in software development, such as plugin architectures and hooking mechanisms.
In this blogpost, we’ll delve into the mechanics of hosting the Common Language Runtime (CLR) within unmanaged applications, exploring the necessary COM interfaces and methods. We’ll then look at the malware sample, understand its approach, and provide comprehensive code examples to demonstrate how managed code can be seamlessly integrated into unmanaged environments.
Understanding Managed vs. Unmanaged Code
Managed Code
Managed code is executed by the Common Runtime Library (CLR) in the .NET framework. Languages like C#, VB.NET, and F# compile into Intermediate Languages (IL), which the CLR Just-In-Time (JIT) compiles into native code at runtime.
Managed code benefits from features like:
- Garbage Collection which is an automatic memory management.
- Type Safety which ensures type integrity, reducing runtime error.
- Exception Handling making use of structured exception management.
Unmanaged Code
Unmanaged code is executed directly by the operating system. Languages like C and C++ compile into machine code specific to target architecture.
Unmanaged code requires:
- Manual memory management where developers are responsible for allocating and freeing memory
- Attention to potential type-related errors
Why Integrate Managed and Unmanaged Code?
Integrating managed code into unmanaged applications allows developers to leverage the rich ecosystem of .NET libraries while maintaining performance-critical components in C/C++. This fusion is beneficial in scenarios like:
- Plugin Architecture where developers deal with dynamic loading of managed plugins into an unmanaged host.
- Hooking mechanism which deals with injecting managed code into unmanaged processes for extended functionality.
- Malware Operations which allows threat actor to execute malicious managed payloads from unmanaged stubs.
Key COM Objects and Interfaces for CLR Hosting
Hosting the CLR within an unmanaged application involves interacting with several COM interfaces provided by the .NET framework. Understanding these interfaces is crucial for effectively managing the CLR lifecycle and executing managed code.
ICLRMetaHost
The purpose for ICLRMetaHost
is to provide information about the installed CLR versions on a system. It allows the host to enumerate and select the desired CLR version for execution.
Key Method:
GetRuntime
retrieves theICLRRuntimInfo
interface for a specified CLR version.
Sample Usage:
ICLRMetaHost* pMetaHost = nullptr;
HRESULT hr = CLRCreateInstance(CLSID_CLRMetaHost, IID_PPV_ARGS(&pMetaHost));
if (SUCCEEDED(hr) && pMetaHost) {
// Successfully created MetaHost instance
}
References
- ICLRMetaHost Interface - .NET Framework | Microsoft Learn
- reactos/dll/win32/mscoree/metahost.c at master · reactos/reactos · GitHub
ICLRRuntimeInfo
The purpose for ICLRRuntimeInfo
is to provide information about a specific CLR version, including its loadability and access to runtime interfaces.
Key Methods:
IsLoadable
checks if CLR can be loaded into the process.GetInterface
retrieves theICLRRuntimeHost
interface for runtime management.
Sample Usage
ICLRRuntimeInfo* pRuntimeInfo = nullptr;
hr = pMetaHost->GetRuntime(L"v4.0.30319", IID_PPV_ARGS(&pRuntimeInfo));
if (SUCCEEDED(hr) && pRuntimeInfo) {
// Successfully retrieved RuntimeInfo
}
References
- ICLRRuntimeInfo Interface - .NET Framework | Microsoft Learn
- deepin-wine-ubuntu/deepin-libwine-dev_2.18-12_i386/usr/include/deepin-wine/windows/metahost.h at master · wszqkzqk/deepin-wine-ubuntu · GitHub
ICLRRuntimeHost
The purpose for ICLRRuntimeHost
is to manage the CLR’s lifecycle within the host process. It allows starting and stopping the CLR, accessing application domains, and executing managed methods.
Key Methods:
Start
which initializes and start the CLR.ExecuteInDefaultAppDomain
which executes a specified managed method within the defaultAppDomain
.
Sample Usage
ICLRRuntimeHost* pRuntimeHost = nullptr;
hr = pRuntimeInfo->GetInterface(CLSID_CLRRuntimeHost, IID_PPV_ARGS(&pRuntimeHost));
if (SUCCEEDED(hr) && pRuntimeHost) {
hr = pRuntimeHost->Start();
if (SUCCEEDED(hr)) {
DWORD result = 0;
hr = pRuntimeHost->ExecuteInDefaultAppDomain(
L"path\\to\\MyManagedCode.dll",
L"HAHAHA.ManagedClass",
L"callme",
L"Hello from C++!",
&result
);
// Handle result
}
}
References
- ICLRRuntimeHost Interface - .NET Framework | Microsoft Learn
- deepin-wine-ubuntu/deepin-libwine-dev_2.18-12_i386/usr/include/deepin-wine/windows/metahost.h at master · wszqkzqk/deepin-wine-ubuntu · GitHub
Real-World Use Case: CloudScout Malware
Analyzed Sample Overview
In analyzing the CloudScout
malware, specifically the gmck.dll
component with SHA256 729AEE2C684B05484719199FF2250217B7ACE97671416E6949C496688A777A6F
, we observe that it drops a .NET binary named msvc_4.dll
(also referred to as CGM
) before executing it. This behavior aligns with the technique of dynamically loading and executing managed code from an unmanaged stub.
Malware | SHA256 | Remarks |
---|---|---|
gmck.dll | 729AEE2C684B05484719199FF2250217B7ACE97671416E6949C496688A777A6F | This drops .NET Binary msvc_4.dll AKA CGM before running it |
Sample Behavior:
- Drop Managed Binary
- The unmanaged
gmck.dll
writes themsvc_4.dll
to disk
- The unmanaged
- Determine CLR Version based on Windows version.
- It decides which method the sample is going to use for hosting the CLR.
- Execute Managed Code by utilizing either
CLRCreateInstance
orCorBindToRuntime
- Invoke Managed Method by calling
CGM.Program.ModuleStart
method within the managed assembly, passing necessary arguments. - Steal Cookies from different types of browsers.
Decompilation Analysis
To gain deeper insights into the malware’s operation, let’s examine the decompiled ModuleStart
function. This function orchestrates the loading and execution of the manage .NET
binary based on the system’s CLR version.
int ModuleStart()
{
// Variable declarations and initializations
Sleep(0x2BF20u); // Initial sleep to evade quick analysis
v31 = 7;
v30 = 0;
LOWORD(Block) = 0;
mw_query_memory_sub_1003E030();
windows_version_identifier = mw_Check_Windows_version_sub_1003DE20(); // Retrieves Windows version
mw_NVIDLA_path_creation_sub_1002B190(Src); // Creates necessary paths
mw_drop_gmck_msvc_4_sub_1002B2D0(Src); // Drops the managed DLL (msvc_4.dll aka CGM)
// Decision to load CLR based on Windows version
if ( windows_version_identifier < 0x60002 )
mw_CorBindToRuntimeEx_sub_1002B650(Src); // Uses CorBindToRuntimeEx for older versions
else
mw_CLRCreateInstance_sub_1002B580(Src); // Uses CLRCreateInstance for newer versions
// Extended sleep post-CLR loading
Sleep(0xEA60u);
if ( m_CreatePathForMalware_sub_1001B6F0() )
{
CreateThread(0, 0, StartAddress, 0, 0, 0); // Spawns a new thread to execute the payload
while (1)
{
// This includes handling different browsers like Chrome, Edge, and Firefox
}
}
if ( v31 >= 8 )
free_1(Block);
return 0;
}
Hosting CLR in Unmanaged C/C++ Applications
To execute managed .NET
code from an unmanaged C/C++ application, the malware leverages COM interfaces to host the CLR. Depending on the targeted .NET Framework
version, it uses different methods: CLRCreateInstance
for .NET 4.0+
and CorBindToRuntime
for earlier versions.
Method 1 : Using `CLRCreateInstance
Applicable for: .NET Framework 4.0 and above.
CLRCreateInstance` initializes and retrieves runtime interfaces necessary for hosting the CLR.
The following shows the function prototype:
HRESULT CLRCreateInstance(
REFCLSID clsid,
REFIID riid,
LPVOID *ppInterface
);
Sample Functionality Flow:
- Initialize COM library to prepare application for COM interactions
hr = CoInitializeEx(NULL, COINIT_MULTITHREADED);
- Create CLR
MetaHost
Instance to access information about the installed CLR version
hr = CLRCreateInstance(CLSID_CLRMetaHost, IID_PPV_ARGS(&pMetaHost));
- Retrieve the Runtime Information about the desired CLR version
hr = pMetaHost->GetRuntime(L"v4.0.30319", IID_PPV_ARGS(&pRuntimeInfo));
- Check if CLR can be loaded without conflicts
hr = pRuntimeInfo->IsLoadable(&isLoadable);
- Obtain the
ICLRRuntimeHost
interface to start and manage the CLR
hr = pRuntimeInfo->GetInterface(CLSID_CLRRuntimeHost, IID_PPV_ARGS(&pRuntimeHost));
- Start the CLR
hr = pRuntimeHost->Start();
- Execute the manage code by calling specific method within the managed assembly.
hr = pRuntimeHost->ExecuteInDefaultAppDomain(
L"path\\to\\MyManagedCode.dll",
L"HAHAHA.ManagedClass",
L"callme",
L"Hello from C++!",
&result
);
- Clean up by releasing interfaces and uninitlialize COM
pRuntimeHost->Stop();
pRuntimeHost->Release();
pRuntimeInfo->Release();
pMetaHost->Release();
CoUninitialize();
Method 2 : Using CorBindToRuntime
Applicable for: .NET Framework 2.0, 3.0, and 3.5.
CorBindToRuntime` binds the CLR to the host process, allowing the execution of managed code.
Function prototype is as follows:
HRESULT CorBindToRuntimeEx(
LPCWSTR pwzVersion,
LPCWSTR pwzFlavor,
DWORD dwStartupFlags,
REFCLSID rclsid,
REFIID riid,
LPVOID *ppv
);
Sample Functionality Flow:
- Initialize the COM library
hr = CoInitializeEx(NULL, COINIT_MULTITHREADED);
- Bind to CLR runtime which associates the specified CLR version with the process.
hr = CorBindToRuntimeEx(
L"v2.0.50727",
L"wks",
0,
CLSID_CorRuntimeHost,
IID_ICorRuntimeHost,
(void**)&pCorRuntimeHost
);
- Start the CLR
hr = pCorRuntimeHost->Start();
- Execute Managed Code by calling specific method within the managed assembly.
hr = pCorRuntimeHost->ExecuteInDefaultAppDomain(
L"path\\to\\MyManagedCode.dll",
L"HAHAHA.ManagedClass",
L"callme",
L"NOTICE MEEEE",
&result
);
- Clean up by releasing interfaces and uninitialize COM
pCorRuntimeHost->Stop();
pCorRuntimeHost->Release();
CoUninitialize();
Note: In the analyzed malware sample, the choice between CLRCreateInstance
and CorBindToRuntime
is based on the detected Windows version, ensuring compatibility with the installed .NET Framework
.
Detailed Code Example
To solidify the understanding on how managed code is executed from unmanaged applications, let’s examine the following code example for both hosting methods.
C# Managed Code Sample
Before executing managed code from C++, we need a .NET
assembly that exposes a method to be invoked. I have compiled the following code as a library exposing the callme
function.
// HAHAHA/ManagedClass.cs
using System;
namespace HAHAHA
{
public class ManagedClass
{
public static int callme(string argument)
{
Console.WriteLine("Hello from C# method! Argument: " + argument);
return 42;
}
}
}
C++ Hosting Code for Method 1 : Using ICLRCreateInstance
// HostCLR_Method1.cpp
#include <Windows.h>
#include <metahost.h>
#include <comdef.h>
#include <iostream>
#include <string>
#pragma comment(lib, "mscoree.lib") // Link against mscoree.lib
// Helper function to convert HRESULT to readable string
std::wstring GetHRMessage(HRESULT hr) {
_com_error err(hr);
return std::wstring(err.ErrorMessage());
}
bool HostCLRUsingMetaHost() {
HRESULT hr;
ICLRMetaHost* pMetaHost = nullptr;
ICLRRuntimeInfo* pRuntimeInfo = nullptr;
ICLRRuntimeHost* pRuntimeHost = nullptr;
// Initialize COM
hr = CoInitializeEx(NULL, COINIT_MULTITHREADED);
if (FAILED(hr)) {
std::wcerr << L"COM Initialization Failed: 0x" << std::hex << hr
<< L" - " << GetHRMessage(hr) << std::endl;
return -1;
}
else {
std::wcout << L"Successfully initialized COM library." << std::endl;
}
// Create CLR MetaHost
hr = CLRCreateInstance(CLSID_CLRMetaHost, IID_PPV_ARGS(&pMetaHost));
if (FAILED(hr) || !pMetaHost) {
std::wcerr << L"Failed to create CLR MetaHost instance. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
CoUninitialize();
return -2;
}
else {
std::wcout << L"Created CLR MetaHost instance successfully." << std::endl;
}
// Get the ICLRRuntimeInfo for CLR version 4.0.30319
std::wcout << L"Retrieving CLR runtime information for v4.0.30319..." << std::endl;
hr = pMetaHost->GetRuntime(
L"v4.0.30319", // CLR version to load
IID_PPV_ARGS(&pRuntimeInfo) // Receive ICLRRuntimeInfo
);
if (FAILED(hr) || !pRuntimeInfo) {
std::wcerr << L"Failed to retrieve CLR runtime information. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
pMetaHost->Release();
CoUninitialize();
return -3;
}
else {
std::wcout << L"Retrieved CLR runtime information successfully." << std::endl;
}
// Check if the CLR is loadable
BOOL isLoadable = FALSE;
std::wcout << L"Checking if CLR runtime is loadable..." << std::endl;
hr = pRuntimeInfo->IsLoadable(&isLoadable);
if (FAILED(hr) || !isLoadable) {
std::wcerr << L"CLR runtime is not loadable. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
pRuntimeInfo->Release();
pMetaHost->Release();
CoUninitialize();
return -4;
}
else {
std::wcout << L"CLR runtime is loadable." << std::endl;
}
// Get the ICLRRuntimeHost interface
std::wcout << L"Obtaining ICLRRuntimeHost interface..." << std::endl;
hr = pRuntimeInfo->GetInterface(
CLSID_CLRRuntimeHost, // CLSID of the CLR runtime host
IID_PPV_ARGS(&pRuntimeHost) // Receive ICLRRuntimeHost
);
if (FAILED(hr) || !pRuntimeHost) {
std::wcerr << L"Failed to obtain ICLRRuntimeHost interface. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
pRuntimeInfo->Release();
pMetaHost->Release();
CoUninitialize();
return -5;
}
else {
std::wcout << L"Obtained ICLRRuntimeHost interface successfully." << std::endl;
// Start the CLR
std::wcout << L"Starting the CLR..." << std::endl;
hr = pRuntimeHost->Start();
}
if (FAILED(hr)) {
std::wcerr << L"Failed to start the CLR. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
pRuntimeHost->Release();
pRuntimeInfo->Release();
pMetaHost->Release();
CoUninitialize();
return -6;
}
else {
std::wcout << L"CLR started successfully." << std::endl;
}
// Executing the managed function from the DLL
DWORD result = 0;
std::wcout << L"Executing managed method 'HAHAHA.ManagedClass.callme'..." << std::endl;
hr = pRuntimeHost->ExecuteInDefaultAppDomain(
L"R:\\MAT\\Visual Studio Projects\\learn_dnlib_1\\learn_dnlib_1\\MyManagedCode.dll", // Path to the assembly
L"HAHAHA.ManagedClass", // Fully qualified class name
L"callme", // Method name
L"NOTICE MEEEE", // Argument
&result // Result
);
if (FAILED(hr)) {
std::wcerr << L"Failed to execute managed method in default AppDomain. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
}
else {
std::wcout << L"Successfully executed managed method in default AppDomain." << std::endl;
std::wcout << L"The result from the program is: " << result << std::endl;
}
// Release COM interfaces
if (pRuntimeHost) {
pRuntimeHost->Stop();
pRuntimeHost->Release();
}
if (pRuntimeInfo) pRuntimeInfo->Release();
if (pMetaHost) pMetaHost->Release();
// Uninitialize COM
CoUninitialize();
return 0;
}
C++ Hosting Code for Method 2 : Using CorBindToRuntime
This method should be used for .NET Framework version 2.0, 3.0 or 3.5. To test this out on a Windows 10 machine, I have download Microsoft .NET Framework 3.5 from Official Microsoft Download Center.
bool HostCLRUsingRuntimeHost() {
HRESULT hr;
ICLRRuntimeHost* pCorRunTimeHost;
hr = CoInitializeEx(NULL, COINIT_MULTITHREADED);
if (FAILED(hr)) {
std::wcerr << L"COM Initialization Failed: 0x" << std::hex << hr
<< L" - " << GetHRMessage(hr) << std::endl;
return -1;
}
else {
std::wcout << L"Successfully initialized COM library." << std::endl;
}
hr = CorBindToRuntimeEx(
L"v2.0.50727", // CLR Version
L"wks", // Workstation Build
0, // Startup Flag
CLSID_CorRuntimeHost, // CLSID
IID_ICorRuntimeHost, // IID
(PVOID*)&pCorRunTimeHost //Pointer to receive the interface
);
if (FAILED(hr) || !pCorRunTimeHost) {
if (pCorRunTimeHost) {
hr = pCorRunTimeHost->Start();
if (FAILED(hr)) {
std::wcerr << L"Failed to start CLR RuntimeHost. HRESULT: 0x" << std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
}
}
else {
std::wcerr << L"pCorRunTimeHost is null." << std::endl;
}
std::wcerr << L"Failed to create CLR RuntimeHost instance. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
CoUninitialize();
return -2;
}
else {
std::wcout << L"Created CLR RuntimeHost instance successfully." << std::endl;
}
if (FAILED(hr)) {
std::wcerr << L"Failed to start the CLR. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
pCorRunTimeHost->Release();
CoUninitialize();
return -6;
}
else {
std::wcout << L"CLR started successfully." << std::endl;
}
// Executing the managed function from the DLL
DWORD result = 0;
std::wcout << L"Executing managed method 'HAHAHA.ManagedClass.callme'..." << std::endl;
hr = pCorRunTimeHost->ExecuteInDefaultAppDomain(
L"R:\\MAT\\Visual Studio Projects\\learn_dnlib_1\\learn_dnlib_1\\MyManagedCode.dll", // Path to the assembly
L"HAHAHA.ManagedClass", // Fully qualified class name
L"callme", // Method name
L"NOTICE MEEEE", // Argument
&result // Result
);
if (FAILED(hr)) {
std::wcerr << L"Failed to execute managed method in default AppDomain. HRESULT: 0x"
<< std::hex << hr << L" - " << GetHRMessage(hr) << std::endl;
}
else {
std::wcout << L"Successfully executed managed method in default AppDomain." << std::endl;
std::wcout << L"The result from the program is: " << result << std::endl;
}
// Release COM interfaces
if (pCorRunTimeHost) {
pCorRunTimeHost->Stop(); // stop hosting the CLR
pCorRunTimeHost->Release(); //release if data is still present
}
// Uninitialize COM
CoUninitialize();
return true;
}
Full Code Listing
The full code can be found from the Github
link that was associated with this blogpost.
GMCK.dll Rough Outline
mw_NVIDLA_path_creation_sub_1002B190
Previously expanded environment variable : %ProgramData%
from sub_1003E130,
- Creates the
C:\\ProgramData\\NVIDlA\\gmck
directory if it does not exist.- Interesting to note is that NVIDlA is actually spelt as
(N)ovember (V)ictor (I)ndia (D)elta (L)IMA (A)lfa
- Interesting to note is that NVIDlA is actually spelt as
2. Creates the
C:\\ProgramData\\NVIDlA\\gmck\\TEMP
directory if it does not exist.
mw_drop_gmck_msvc_4_sub_1002B2D0
- Create the filename
C:\\ProgramData\\NVIDlA\\gmck\\msvc_4.dll
- Passed this filename to
mw_drop_GMCK_sub_1002B3D0
mw_drop_GMCK_sub_1002B3D0
contains the decryption and file dropping logic
mw_drop_GMCK_sub_1002B3D0
- It would write
0x3c1000
bytes of encrypted bytes into buffer - It stores the hardcoded RC4 key
8def870f31cf390c0cf2
- It decrypts the encrypted
.NET
malware with the key - Write decrypted content to
C:\\ProgramData\\NVIDlA\\gmck\\msvc_4.dll
Decryption
The encrypted_buffer.bin
contains encrypted buffer that was extracted from IDA. The following was used to extract and decrypt the encrypted buffer. The decrypted buffer is the content of the CGM
which is a .NET
module.
Encrypted Buffer Extraction
with open("ENCRYPTED_MSVC_4.bin","wb") as f:
f.write(get_bytes(0x10130490, 0x3C1000))
Decrypting with Malduck
from malduck import rc4
# Decryption key as bytes
key = b'8def870f31cf390c0cf2'
with open('ENCRYPTED_MSVC_4.bin', 'rb') as file:
encrypted_buffer = unhexlify(file.read())
# Decrypt the buffer using RC4
decrypted_data = rc4(key, encrypted_buffer)
# Save the decrypted data
with open('DECRYPTED_MSVC_4.bin', 'wb') as file:
file.write(decrypted_data)
mw_CorCreateInstance_sub_1002B580
This is what we have covered previously [[#c-hosting-code-for-method-1-using-iclrcreateinstance|C++ Hosting Code for Method 1 Using ICLRCreateInstance
]]
BOOL __thiscall mw_CorCreateInstance_sub_1002B580(void *this)
{
int pRuntimeInfo; // [esp+4h] [ebp-14h] BYREF
int MetaHostObj; // [esp+8h] [ebp-10h] BYREF
int v5; // [esp+Ch] [ebp-Ch] BYREF
int v6; // [esp+10h] [ebp-8h] BYREF
MetaHostObj = 0;
v5 = 0;
pRuntimeInfo = 0;
if ( CLRCreateInstance(&clsid, &REFIID, &MetaHostObj) < 0
|| (*(*MetaHostObj + 12))(MetaHostObj, L"v4.0.30319", &unk_104F65FC, &pRuntimeInfo) < 0
|| (*(*pRuntimeInfo + 36))(pRuntimeInfo, &CLSID_CorRuntimeHost, &IID_ICorRuntimeHost, &v5) < 0
|| (*(*v5 + 12))(v5) < 0 )
{
return 0;
}
v6 = 0;
return (*(*v5 + 44))(v5, this, L"CGM.Program", L"ModuleStart", L" ", &v6) >= 0;
}
We can see the ModuleStart
from CGM.Program
without any parameters. The following shows the screenshot for the actual function that it would invoke from the unmanaged application.
mw_CorBindToRuntimeEx_sub_1002B650
This is also what was previously covered in Method 2 Using `CorBindToRuntime
BOOL __thiscall mw_CorBindToRuntimeEx_sub_1002B650(void *dll_path)
{
void *pCorRunTimeHost; // [esp+4h] [ebp-Ch] BYREF
int v4; // [esp+8h] [ebp-8h] BYREF
pCorRunTimeHost = 0;
if ( CorBindToRuntimeEx(L"v2.0.50727", L"wks", 0, &CLSID_CorRuntimeHost, &IID_ICorRuntimeHost, &pCorRunTimeHost) < 0
|| (*(*pCorRunTimeHost + 0xC))(pCorRunTimeHost) < 0 )
{
return 0;
}
v4 = 0;
return (*(*pCorRunTimeHost + 44))(pCorRunTimeHost, dll_path, L"CGM.Program", L"ModuleStart", L" ", &v4) >= 0;
}
CreatePathForMalware_sub_1001B6F0
This function stores some name of what look like configurations file names.
- Create
Gmck
directory at the same directory as the current running malware if it does not exist. - Store
<sameDir>\\Gmck.nom.cfg
string - Store
<sameDir\\Gmck.stp.cfg
string - Based on Windows Version:
< 0x60001
C:\\Documents and Settings\\All Users\\Application Data\\Microsoft\\PStatus\\Gmck.nom
C:\\Documents and Settings\\All Users\\Application Data\\Microsoft\\PStatus\\Gmck.stp
>= 0x60001
C:\\Users\\Public\\AppData\\Local\\Windows\\ODBC\\PStatus\\Gmck.nom
C:\\Users\\Public\\AppData\\Local\\Windows\\ODBC\\PStatus\\Gmck.stp
- On my Windows 10 machine, I have the following directory created.
- Find all the files relevant to Google Chrome
C:\Users\user\AppData\Local\Google\Chrome\User Data\*.*
C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates\Cookies
- If tit exists, delete it
StartAddress (Separate Thread)
mw_delete_files_sub_1001B990
for every 300000 ms or 300 s or 5 mins- Delete
<sameDir>\\Gmck.nom.cfg
if exists - Delete
<sameDir>\\Gmck.stp.cfg
if exists - Delete
C:\\users\\public\\appdata\\local\\windows\\odbc\\PStatus\\Gmck.nom
if exists - Delete
C:\\users\\public\\appdata\\local\\windows\\odbc\\PStatus\\Gmck.stp
if exists
- Delete
Cookies Log Files
These are some host-based IOCs:
C:/ProgramData/NVIDlA/gmck/ff_cke<YYYYMMDD_HHMMSS>.dat
C:/ProgramData/NVIDlA/gmck/ff_cke_cfg.dat
C:/ProgramData/NVIDlA/gmck/im_cke_<YYYYMMDD_HHMMSS>.dat
C:/ProgramData/NVIDlA/gmck/im_cke_cfg.dat
C:/ProgramData/NVIDlA/gmck/cm_cke_cfg_<YYYYMMDD_HHMMSS>.dat
C:/ProgramData/NVIDlA/gmck/cm_cke_cfg_<YYYYMMDD_HHMMSS>1.dat
…/TEMP/eg_cke_%s.dat
…/eg_cke_cfg_%s1.dat
Sample Config files
Cookies Stealing Locations
C:/Users/user/AppData/Local/Google/Chrome/User Data
C:/Users/user/AppData/Local/Google/Chrome/User Data/<filename>/Cookies
C:/Users/user/AppData/Local/Google/Chrome/User Data/Local State
.../Network/Cookies
/Microsoft/Edge/User Data/%s/Cookies
/Microsoft/Edge/User Data/Local State
After cookies are stolen, they are decrypted before being parsed.
Decryption of Cookies
Data obtained from here may be decrypted via CryptUnprotectData
.
Signs of Cookie data were also manipulated and stolen here. It is most likely that stolen cookies data from chrome were also stored within configuration files as well after being parsed.
This stealing happens every 3600000ms
which is every hour and stored in configuration files which would be used in the dropped and executed .NET
binary.
Method for Cookie Stealing No Longer Effective
It should be noted that this method is not effective against the new App Bound Encryption Feature in starting from Chrome 127 Google Online Security Blog: Improving the security of Chrome cookies on Windows which was designed to make it harder and to prevent threat actor from stealing cookies the way this sample did.
Conclusion
Integration of managed .NET
binaries within unmanaged C/C++ applications presents a powerful mechanism for both legitimate software development and malicious activities. Through the analysis of the sample, we have uncovered how threat actors adeptly utilizes COM interfaces like ICLRMetaHost
, ICLRRuntimeInfo
, and ICLRRuntimeHost
to host the CLR and execute managed code dynamically.
As per the analyzed sample, we see that it was able to select between methods based on system’s CLR version (guessed). This dual-method approach ensures compatibility across wide range of Windows versions and .NET
Framework installations.
Some strategies for development could be to create a .NET Plugin Loaders for enhanced modularity and stealth. Threat actor could design malware that is highly modular. Each plugin, be it for data exfiltration, system reconnaissance, or persistence, can be developed, deployed, and updated independently. This allows for rapid adaptation to new environments and targets without overhauling the entire malware framework.