Thursday, January 23, 2025
HomeCyber AttackLazarus APT Group Hijack Windows IIS Servers to Distribute Malware

Lazarus APT Group Hijack Windows IIS Servers to Distribute Malware

Published on

SIEM as a Service

Follow Us on Google News

Threat actors always search for vulnerable devices and networks to gain illicit access and perform malicious activities to accomplish their goals.

The APT group, Lazarus, as an initial breach path actively targeting the Microsoft Internet Information Services (IIS) servers.

Cybersecurity researchers at AhnLab Security Emergency Response Center (ASEC) recently confirmed that operators of the Lazarus group targeted the vulnerable Windows servers to use them as a malicious code distribution server.

Lazarus group employs watering hole attacks, manipulating domestic websites, and exploiting INISAFE CrossWeb EX V6 vulnerabilities for malware distribution.

Despite the patched INITECH vulnerability, recent exploits persist, leveraging compromised IIS servers for distribution of the malware.

Lazarus’ Attacking IIS server

Lazarus’ attack on the IIS server was highlighted in May 2023, revealing exploitation of insecure web servers and attempted lateral movement via RDP.

Attackers exploit vulnerable web servers, installing web shells or executing malicious commands, leveraging matching vulnerabilities for unauthorized actions that are performed by w3wp.exe, an IIS web server process.

Malicious code generated by the IIS web server (Source – AhnLab)

While the IIS web server process, w3wp(.)exe spawns usopriv.exe, a Themida-packed JuicyPotato malware responsible for privilege escalation, one among multiple Potato-based malicious codes.

JuicyPotato (Source – AhnLab)

Attacker-controlled web shells or dictionary attacks lack sufficient privileges to execute desired malicious actions within w3wp.exe, and similar limitations apply to the MS-SQL server’s sqlservr.exe process.

However, threat actors use privilege escalation malware often to overcome this obstacle. Here below, we have mentioned all the commands that are executed by the threat actors using JuicyPotato:-

%SystemRoot%\system32\cmd.exe /c whoami > c:\programdata
%SystemRoot%\system32\cmd.exe /c whoami > c:\programdata
%SystemRoot%\system32\cmd.exe /c whoami > c:\programdata\nueio.txt
%SystemRoot%\system32\cmd.exe /c rundll32 c:\programdata\usoshered.dat ,usoprivfunc 4729858204985024133
%SystemRoot%\system32\cmd.exe /c del c:\programdata\nueio.txt
%SystemRoot%\system32\cmd.exe /c whoami > c:\users\%ASD%\desktop\ngc\test.txt

The attacker utilized JuicyPotato to execute Loader malware, employing rundll32 with a random string argument to execute the DLL-formatted payload.

Loader decodes data file name to obtain ‘{20D1BF68-64EE-489D-9229-95FEFE5F12A4}’, confirming its presence in multiple paths.

An unsecured file in the relevant path confirms Loader malware, decrypting and executing encoded data file in memory.

Name of the decrypted data file (Source – AhnLab)

Lazarus group combines Loader malware with encrypted data files, decoding and executing them in memory.

While specific data files remain unverified, past cases indicate the final executed malware is typically a downloader or backdoor.

The attacker exploited the INISAFE vulnerability to install “SCSKAppLink.dll” as additional malicious code, with the IIS web server serving as the download source. 

INISAFE vulnerability (Source – AhnLab)

Though it’s not confirmed, “SCSKAppLink.dll” appears similar to Lazarus Attack Group’s previous malicious code exploiting the INITECH process, functioning as a downloader, and enabling remote control through the installation of specified malware.

Lazarus is one of the highly sophisticated APT groups that use several types of stealthy attack vectors.

Security analysts urged users to remain vigilant and deploy an up-to-date patch management system.

IOC

MD5

– 280152dfeb6d3123789138c0a396f30d : JuicyPotato (usopriv.exe)
– d0572a2dd4da042f1c64b542e24549d9 : Loader (usoshered.dat)
Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

Microsoft Unveils New Identity Secure Score Recommendations in General Availability

Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in...