summary
On July 23, 2024, CrowdStrike Intelligence identified the crowdstrike-office365(.)com phishing domain, which impersonates CrowdStrike and delivers malicious ZIP and RAR files containing a Microsoft Installer (MSI) loader. The loader ultimately executes Lumma Stealer loaded with CypherIt.
The domain was registered on July 23, 2024, days after July 19, 2024, when an issue was identified in a single content update for CrowdStrike's Falcon Sensor – which affected Windows operating systems – and a fix was published.
The campaign is likely related to the Lumma Stealer distribution campaign in June 2024, where a threat actor leveraged advanced social engineering techniques, such as using spam floods and vishing, to deliver malicious binaries.
details
Phishing field
On July 23, 2024, crowdstrike-office365(.)com submitted a ZIP file (SHA256 hash:
50f9c384443a40d15a6e74960f1ba75dcf741eabdb5713bd2eba453a6aad81e5
) which contains the Microsoft Installer (MSI) file WidowsSystem-update.msi (SHA256 hash:
3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7
), and it is loaded.
As of this writing, the domain does not appear to have a landing page and reveals an open directory containing URLs for hosting malicious ZIP and RAR archives (Figure 1).
MSI Loader
The MSI loader displays a mock installation (Figure 2). Upon execution, the MSI extracts a self-extracting RAR (SFX) file, plenrco.exe (SHA256 hash:) and executes it.
c3e50ca693f88678d1a6e05c870f605d18ad2ce5cfec6064b7b2fe81716d40b0
), using the command line plenrco.exe -pqwerty2023 -s1. This extracts another RAR SFX archive file stored in the PE overlay plenrco.exe. The RAR archive contains a Nullsoft Scriptable Install System (NSIS) installer with the file name SymposiumTaiwan.exe (SHA256 hash:
c1e27b2e7db4fba9f011317ff86b0d638fe720b945e933b286bb3cf6cdb60b6f
).
NSIS file
The NSIS SymposiumTaiwan.exe installer contains parts of the legitimate AutoIt executable file (SHA256 hash: 865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4) and the assembled AutoIt text (SHA256 hash: 66ad1c04ebb970f2494f2f30b45d6a83c2f3a2bb663565899f57bb5422851518).
NSIS also contains a batch script loader called Open.cmd (SHA256 hash: 6217436a326d1abcd78a838d60ab5de1fee8a62cda9f0d49116f9c36dc29d6fa), which includes useless code to hide its actual functionality. When executed, Open.cmd lists processes associated with security products by calling the Windows command task list. If a process is detected, the malware deletes itself and terminates its operation.
The batch script then links the above parts (previously dropped to %TMP%) into two files: Dicks.pif (an AutoIt executable) and k (an AutoIt compiled script), both written to the %TMP%\558563 path. Finally, the batch script runs the AutoIt executable, passing the compiled script as an argument.
CypherIt's AutoIt script
The AutoIt decrypted script (SHA256 hash: 2856b7d3948dfb5231056e52437257757839880732849c2e2a35de3103c64768) is a CypherIt loader that is heavily obfuscated to impede static analysis. The loader implements string obfuscation (a re-implementation in Python is included in Figure 3). Obfuscation is based on subtraction using a seed, which is different for each string.
Anti-analysis
AutoIt download is terminated if one of the following tests is met:
Host name is tz or NfZtFbPfH or ELICZ; these host names are associated with antivirus (AV) emulators1 User name is test22 File C:\aaa_TouchMeNot_.txt exists; this file belongs to Windows Defender sandbox The antivirus processes avastui.exe or bdagent.exe are running
Next stage payload
The AutoIt loader contains two wrapper codes for 32-bit and 64-bit systems that implement the RC4 algorithm to decrypt the final payload, which is also hardcoded within the AutoIt loader. The AutoIt script runs one of the two wrapper codes depending on the system architecture.
The final payload is encrypted with RC4 — with key 656505 — and compressed with LZNT1, resulting in a Lumma Stealer sample (SHA256 hash: d669078a7cdcf71fb3f2c077d43f7f9c9fdbdb9af6f4d454d23a718c6286302a; build timestamp 2024-07-19 15:01:38 UTC). The build timestamp indicates that the actor likely built the sample for distribution the day after CrowdStrike's Falcon sensor single content update was identified and the fix was deployed.
Loma thief
The final payload is a Lumma Stealer executable that connects to the command and control (C2) server at iiaiyitre(.)pa at the time of analysis. Additional C2 URLs, listed in Table 1, were obtained from the malware configuration. Lumma Stealer is an information stealer that collects information from browsers, including credentials, cookies, autofill data, and browser extension data.
The same C2 domain identified in this activity was observed in a recent large-scale opportunistic spam and vishing campaign in June 2024; in that campaign, the threat actor sent multiple spam emails and made follow-up phone calls posing as a “help desk” agent via Microsoft Teams. Based on the shared infrastructure across the campaigns and the apparent targeting of enterprise networks, CrowdStrike Intelligence assesses with moderate confidence that the activity is likely attributable to the same unnamed threat actor.
Recommendations
These recommendations can be implemented to help protect against the activities described in this report.
– Accept updates provided through official CrowdStrike channels only and adhere to technical guidelines from CrowdStrike support teams. – Train users to avoid executing files from untrusted sources. – Verify website certificates on the download page to ensure that the downloaded software comes from a legitimate source. – Use browser settings to enable Download Protection, which can issue warnings about potentially malicious websites or downloads. – Consider blocking AutoIt executables when they are not required in a corporate environment; executables packaged in CypherIt use AutoIt and .pif files to run payloads.
appendix
Falcon LogScale queries
This Falcon LogScale query detects the activity described in this alert.
// Indicators related to CSA-240849 (CSA-240849)
// Index Search Base (CSA-240849)
case { in (“SHA256HashData”, values = (“1e06ef09d9e487fd54dbb70784898bff5c3ee25d87f468c9c5d0dfb8948fb45c”, “280900902df7bb855b27614884b369e5e0da25ff22efacc59443a4f593ccd145”, “3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7”, “50f9c384443a40d15a6e74960f1ba75dcf741eabdb5713bd2eba453a6aad81e5”, “66ad1c04ebb970f2494f2f30b45d6a83c2f3a2bb663565899f57bb5422851518”, “6ec39c6eee15805ef3098af7ae172517a279b042fc6c323ebf1aef8f8f2b21be”, “922b1f00115dfac831078bb5e5571640e95dbd0d6d4022186e5aa4165082c6b2”, “a992cee863a4668698af92b4f9bd427d7a827996bf09824b89beff21578b49bd”, “aca54f9f5398342566e02470854aff48c53659be0c0cb83d3ce1fd05430375f8”, “b5c0610bc01cfc3dafc9c976cb00fe7240430f0d03ec5e112a0b3f153f93b49a”, “d669078a7cdcf71fb3f2c077d43f7f9c9fdbdb9af6f4d454d23a718c6286302a”, “e6b00ee585b008f110829df68c01a62d3bfac1ffe7d65298c8a4e4109b8a” 7319, “e9cd2429628e3955dd1f7c714fbaa3e3b85bfaac0bc31582cf9c5232cb8fc352”,
“bb7a19963b422ed31b0b942eeaad7388421bc270a8513337f8ec043a84a4f11c”,
“56f2aedb86d26da157b178203cec09faff26e659f6f2be916597c9dd4825d69f”)); in(“Domain Name”, values=(“callosallsaospz.shop”, “crowdstrike-office365.com”, “go.microsoft.crowdstrike-office365.com”, “iiaiyitre.pa”, “indexterityszcoxp.shop”, “lariatedzugspd.shop”, “liernessfornicsa.shop”, “outpointsozp.shop”, “shepherdlyopzc.shop”, “unseaffarignsk.shop”, “upknittsoappz.shop”, “warrantelespsz.shop”)) } | table((cid, aid, #event_simpleName, Computer Name))
Indicators of penetration (IOCs)
Description Details Hosting URL https(:)//crowdstrike-office365(.)com/go(.)microsoft.crowdstrike-office365(.)com/download.html Phishing Domain crowdstrike-office365(.)com Lumma Stealer SHA256 hash d669078a7cdcf71fb3f2c077d43f7f9c9fdbdb9af6f4d454d23a718c6286302a Lumma Stealer C2 URLs iiaiyitre(.)pa
indexterityszcoxp(.) store
Lariat Zogbad Store
Calosalsauces Store
Points of Sale (.)Store
Learnis Fornexa Store
upknittsoappz store(.)
Shepherds Store
Onsivarensk store
Store Warranty
I'm going to(.)ba
indexterityszcoxp(.) store
Lariat Zogbad Store
Calosalsauces Store
Points of Sale (.)Store
Learnis Fornexa Store
upknittsoappz store(.)
Shepherds Store
Onsivarensk store
Store Warranty
AutoIt bundled program containing Lumma Stealer(k) 66ad1c04ebb970f2494f2f30b45d6a83c2f3a2bb663565899f57bb5422851518 NSIS installer containing AutoIt Script (SymposiumTaiwan.exe) c1e27b2e7db4fba9f011317ff86b0d638fe720b945e933b286bb3cf6cdb60b6f Batch script loader in NSIS installer (Open.cmd) 6217436a326d1abcd78a838d60ab5de1fee8a62cda9f0d49116f9c36dc29d6fa Archive Self-extracting archive containing MSI files Self-extracting archive containing MSI files
(MsWindows.msi update,
Update msoffice365.msi,
Update Microsoft365.msi,
office365crowndStrike.msi,
Widows System Update (MSI)
1e06ef09d9e487fd54dbb70784898bff5c3ee25d87f468c9c5d0dfb8948fb45c
e9cd2429628e3955dd1f7c714fbaa3e3b85bfaac0bc31582cf9c5232cb8fc352
bb7a19963b422ed31b0b942eeaad7388421bc270a8513337f8ec043a84a4f11c
aca54f9f5398342566e02470854aff48c53659be0c0cb83d3ce1fd05430375f8
3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7
RAR and ZIP files contain MSI files.
(MSwindows.rar update,
Update MSwindows.rar,
msoffice365.rar update,
msoffice365update.zip,
office365crowndStrike.rar,
office365crowndStrike.zip file,
Widows System Update.zip)
6ec39c6eee15805ef3098af7ae172517a279b042fc6c323ebf1aef8f8f2b21be
922b1f00115dfac831078bb5e5571640e95dbd0d6d4022186e5aa4165082c6b2
56f2aedb86d26da157b178203cec09faff26e659f6f2be916597c9dd4825d69f
e6b00ee585b008f110829df68c01a62d3bfac1ffe7d65298c8a4e4109b8a7319
b5c0610bc01cfc3dafc9c976cb00fe7240430f0d03ec5e112a0b3f153f93b49a
280900902df7bb855b27614884b369e5e0da25ff22efacc59443a4f593ccd145
a992cee863a4668698af92b4f9bd427d7a827996bf09824b89beff21578b49bd
Table 1. Penetration Indicators
Mitre et&c
This table illustrates the MITRE ATT&CK® tactics and techniques described in this report.
Tactic Technique Initial Access Observable T1566 – Phishing The malicious MSI is distributed via a phishing domain Execution T1059.003 – Command and Script Interpreter: Windows Command Shell The NSIS installer contains a batch script that deletes the malware if security products are detected T1204 – User Execution The user is prompted to install the malicious executable, which is disguised as an MSI file Defense Evasion T1027.002 – Obfuscated Files or Information: Software Packages Lumma Stealer is packaged using CipherIT Exfiltration T1041 – Exfiltration Over C2 Channel Lumma Stealer sends all extracted data to its C2 server
Table 2. MITRE ATT&CK Mapping
1 https(:)//www(.)usenix(.)org/system/files/conference/woot16/woot16-paper-blackthorne_update(.)pdf
Additional Resources
Read other blog posts from CrowdStrike Intelligence regarding the Falcon content issue: