TrojanSpy.Win64.GARYSTEAL.A

 Analysis by: Francesca Villasanta

 ALIASES:

UDS:Trojan.Win64.Agent.a (KASPERSKY); Trojan:Win64/GaryStealer.A!MTB (MICROSOFT)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan Spy

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Downloaded from the Internet, Dropped by other malware


This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

It connects to certain websites to send and receive information.

  TECHNICAL DETAILS

File Size:

14,620,672 bytes

File Type:

EXE

Memory Resident:

No

Initial Samples Received Date:

21 Dec 2023

Payload:

Collects system information, Connects to URLs/IPs, Steals information

Arrival Details

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan Spy displays the following fake error messages:


Backdoor Routine

This Trojan Spy executes the following commands from a remote malicious user:

  • Create startup persistence
  • Perform stealer capabilities
  • Execute arbitrary commands
  • Display alert messages
  • Retrieve running processes
  • Execute files on disk or in memory
  • Access and write to the clipboard
  • Perform a random task
  • Download and execute additional payloads
  • Terminate itself
  • Delete itself

It connects to the following URL(s) to send and receive commands from a remote malicious user:

  • {BLOCKED}.ngrok.io:18560

Information Theft

This Trojan Spy gathers the following data:

  • Host information
  • Access privilege level
  • OS information
  • Network information
  • Browser data
  • Cryptocurrency wallet data

Other Details

This Trojan Spy connects to the following website to send and receive information:

  • {BLOCKED}.ngrok.io:18560

It does the following:

  • It sends an HTTP GET request to the following URL as a build validator:
    • http://{BLOCKED}grok.io:18560/api/v1/bulla/?id=cln0hnnun0000rxwn99y3ueza&data={Encrypted Unix Time}
  • It checks if the following virtual machine- or sandbox-related MAC addresses are present in the affected system:
    • 00:1C:42
    • 08:00:27
    • 00:05:69
    • 00:0C:29
    • 00:1C:14
    • 00:50:56
    • 00:16:E3
  • It performs random tasks once it detects virtual machine- or sandbox-related indicators are present in the affected machine:
    • Send a ping to google.com:80
    • Create a config file: %User Profile%\config.ini
    • List files found on the %User Profile% directory
    • List local IP addresses
    • Send an HTTP GET request to https://www.web3api.com
    • Print a random number
    • Create a randomly named folder: %User Profile%\{Random Characters}.txt
    • Print a random string

It checks if the following virtual machine- or sandbox-related registry keys are present in the affected system:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Hyper-V

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
VirtualMachine

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Virtual Machine\Guest\Parameters

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmicheartbeat

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmicvss

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmicshutdown

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmicexchange

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\PCI\VEN_1AB8*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\PCI\VEN_80EE*

HKEY_LOCAL_MACHINE\HARDWARE\ACPI\
DSDT\VBOX__

HKEY_LOCAL_MACHINE\HARDWARE\ACPI\
FADT\VBOX__

HKEY_LOCAL_MACHINE\HARDWARE\ACPI\
RSDT\VBOX__

HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\
VirtualBox Guest Additions

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VBoxGuest

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VBoxMouse

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VBoxService

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VBoxSF

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VBoxVideo

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\PCI\VEN_5333*

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vpcbus

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vpc-s3

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vpcuhub

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\msvmmouf

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\PCI\VEN_15AD*

HKEY_CURRENT_USER\SOFTWARE\VMware, Inc.\
VMware Tools

HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\
VMware Tools

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmdebug

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmmouse

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VMTools

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\VMMEMCTL

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmware

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmci

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\vmx86

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\IDE\CdRomNECVMWar_VMware_IDE_CD*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\IDE\CdRomNECVMWar_VMware_SATA_CD*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\IDE\DiskVMware_Virtual_IDE_Hard_Drive*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Enum\IDE\DiskVMware_Virtual_SATA_Hard_Drive*

HKEY_LOCAL_MACHINE\HARDWARE\ACPI\
DSDT\xen

HKEY_LOCAL_MACHINE\HARDWARE\ACPI\
FADT\xen

HKEY_LOCAL_MACHINE\HARDWARE\ACPI\
RSDT\xen

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\xenevtchn

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\xennet

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\xennet6

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\xensvc

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\xenvdb

It checks if the following virtual machine- or sandbox-related registry entries are present in the affected system:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion
ProductID = 76487-337-8429955-22614

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion
ProductID = 76487-337-8429955-22614

HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\
Scsi\Scsi Port 0\Scsi Bus 0\
Target Id 0\Logical Unit Id 0
Identifier = QEMU

HKEY_LOCAL_MACHINE\HARDWARE\Description\
System
SystemBiosVersion = QEMU

HKEY_LOCAL_MACHINE\HARDWARE\Description\
System
VideoBiosVersion = QEMU

HKEY_LOCAL_MACHINE\HARDWARE\Description\
System\BIOS
SystemManufacturer = VBOX

HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\
Scsi\Scsi Port 0\Scsi Bus 0\
Target Id 0\Logical Unit Id 0
Identifier = VBOX

HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\
Scsi\Scsi Port 1\Scsi Bus 0\
Target Id 0\Logical Unit Id 0
Identifier = VBOX

HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\
Scsi\Scsi Port 2\Scsi Bus 0\
Target Id 0\Logical Unit Id 0
Identifier = VBOX

HKEY_LOCAL_MACHINE\HARDWARE\Description\
System
SystemBiosVersion = VBOX

HKEY_LOCAL_MACHINE\HARDWARE\Description\
System
VideoBiosVersion = VIRTUALBOX

HKEY_LOCAL_MACHINE\HARDWARE\Description\
System\BIOS
SystemProductName = VIRTUAL

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\Disk\Enum
DeviceDesc = VBOX

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\Disk\Enum
FriendlyName = VBOX

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\
Services\Disk\Enum
DeviceDesc = VBOX

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\
Services\Disk\Enum
FriendlyName = VBOX

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\
Services\Disk\Enum
DeviceDesc = VBOX

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\
Services\Disk\Enum
FriendlyName = VBOX

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Control\SystemInformation
SystemProductName = VIRTUAL

It checks if the following virtual machine or sandbox related folder(s) or file(s) is present in the affected system:

  • %System Root%\take_screenshot.ps1
  • %System Root%\loaddll.exe
  • %System Root%\symbols\aagmmc.pdb
  • %System%\drivers\prleth.sys
  • %System%\drivers\prlfs.sys
  • %System%\drivers\prlmouse.sys
  • %System%\drivers\prlvideo.sys
  • %System%\drivers\prltime.sys
  • %System%\drivers\prl_pv32.sys
  • %System%\drivers\prl_paravirt_32.sys
  • %System%\drivers\VBoxMouse.sys
  • %System%\drivers\VBoxGuest.sys
  • %System%\drivers\VBoxSF.sys
  • %System%\drivers\VBoxVideo.sys
  • %System%\vboxdisp.dll
  • %System%\vboxhook.dll
  • %System%\vboxmrxnp.dll
  • %System%\vboxogl.dll
  • %System%\vboxoglarrayspu.dll
  • %System%\vboxoglcrutil.dll
  • %System%\vboxoglerrorspu.dll
  • %System%\vboxoglfeedbackspu.dll
  • %System%\vboxoglpackspu.dll
  • %System%\vboxoglpassthroughspu.dll
  • %System%\vboxservice.exe
  • %System%\vboxtray.exe
  • %System%\VBoxControl.exe
  • %System%\drivers\vmmouse.sys
  • %System%\drivers\vmnet.sys
  • %System%\drivers\vmxnet.sys
  • %System%\drivers\vmhgfs.sys
  • %System%\drivers\vmx86.sys
  • %System%\drivers\hgfs.sys
  • %System%\drivers\vmsrvc.sys
  • %System%\drivers\vpc-s3.sys

(Note: %System Root% is the Windows root folder, where it usually is C:\ on all Windows operating system versions.. %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)

  SOLUTION

Minimum Scan Engine:

9.800

FIRST VSAPI PATTERN FILE:

18.944.03

FIRST VSAPI PATTERN DATE:

16 Jan 2024

VSAPI OPR PATTERN File:

18.945.00

VSAPI OPR PATTERN Date:

17 Jan 2024

Step 1

Trend Micro Predictive Machine Learning detects and blocks malware at the first sign of its existence, before it executes on your system. When enabled, your Trend Micro product detects this malware under the following machine learning name:

     Troj.Win32.TRX.XXPE50FFF076

Step 2

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 3

Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.

Step 4

Search and delete files detected as TrojanSpy.Win64.GARYSTEAL.A

[ Learn More ]
Please make sure you check the Search Hidden Files and Folders checkbox in the More advanced options option to include all hidden folders in the search result.
  • %User Profile%\config.ini

Step 5

Search and delete these folders

[ Learn More ]
Please make sure you check the Search Hidden Files and Folders checkbox in the "More advanced options" option to include all hidden folders in the search result.
  • %User Profile%\{Random Characters}.txt

Step 6

Scan your computer with your Trend Micro product to delete files detected as TrojanSpy.Win64.GARYSTEAL.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.