
As soon as behind the captive website, the page starts the Windows Test Connectivity Status Indicator, a genuine service that figures out whether a gadget has Internet gain access to by sending out an HTTP GET demand to hxxp:// www.msftconnecttest[.]com/redirect. That website, in turn, reroutes the internet browser to msn[.]com. As Thursday’s post described:
As soon as the system opens the web browser window to this address, the system is rerouted to a different actor-controlled domain that most likely display screens a certificate recognition mistake which triggers the target to download and carry out ApolloShadow. Following execution, ApolloShadow look for the advantage level of the ProcessToken and if the gadget is not working on default administrative settings, then the malware shows the user gain access to control (UAC) pop-up window to trigger the user to set up certificates with the file name CertificateDB.exe, which masquerades as a Kaspersky installer to set up root certificates and enable the star to acquire raised advantages in the system.
The following diagram shows the infection chain:
Credit: Microsoft
ApolloShadow conjures up the GetTokenInformationType
API to examine if it has enough system rights to set up the root certificate. If not, the malware utilizes an advanced procedure that spoofs a page at hxxp:// timestamp.digicert[.]com/registered, which in turn sends out the system a second-stage payload in the kind of a VBScript.
As soon as deciphered, ApolloShadow relaunches itself and provides the user with a User Access Control window looking for to raise its system gain access to. (Microsoft offered a lot more technical information about the strategy in Thursday’s post.)
Credit: Microsoft
If ApolloShadow currently has enough system rights, the malware sets up all networks the host links to as personal.
“This causes a number of modifications consisting of permitting the host gadget to end up being visible and peaceful firewall software guidelines to make it possible for file sharing,” Microsoft discussed. “While we did not see any direct efforts for lateral motion, the primary factor for these adjustments is most likely to minimize the problem of lateral motion on the network.” (The Microsoft post likewise supplied technical information about this method.)
Microsoft stated the capability to trigger contaminated gadgets to rely on harmful websites permits the risk star to preserve determination, most likely for usage in intelligence collection.
The business is encouraging all clients running in Moscow, especially delicate companies, to tunnel their traffic through encrypted tunnels that link to a relied on ISP.
Learn more
As an Amazon Associate I earn from qualifying purchases.