{"id":11686,"date":"2018-03-07T14:00:34","date_gmt":"2018-03-07T22:00:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/07\/news-5456\/"},"modified":"2018-03-07T14:00:34","modified_gmt":"2018-03-07T22:00:34","slug":"news-5456","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/03\/07\/news-5456\/","title":{"rendered":"Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign"},"content":{"rendered":"<p><strong>Credit to Author: Windows Defender Research| Date: Wed, 07 Mar 2018 21:58:45 +0000<\/strong><\/p>\n<p>Just before noon on March 6 (PST), Windows Defender AV blocked more than 80,000 instances of several sophisticated trojans that exhibited advanced cross-process injection techniques, persistence mechanisms, and evasion methods. Behavior-based signals coupled with cloud-powered machine learning models uncovered this new wave of infection attempts. The trojans, which are new variants of Dofoil (also known as Smoke Loader), carry a coin miner payload. Within the next 12 hours, more than 400,000 instances were recorded, 73% of which were in Russia. Turkey accounted for 18% and Ukraine 4% of the global encounters.<\/p>\n<p>&#10;<\/p>\n<figure id=\"attachment_80540\" style=\"max-width: 976px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80540 size-full\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/dofoil.png\" alt=\"Figure 1: Windows Defender ATP machine timeline view with Windows Defender Exploit Guard event\" width=\"976\" height=\"580\" \/><figcaption class=\"wp-caption-text\"><em>Figure 1: Geographic distribution of the Dofoil attack components<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<p>Windows Defender AV initially flagged the attacks unusual persistence mechanism through behavior monitoring, which immediately sent this behavior-based signal to our cloud protect system.<\/p>\n<p>&#10;<\/p>\n<ol>&#10;<\/p>\n<li>Within milliseconds, multiple metadata-based machine learning models in the cloud started blocking these threats at first sight.<\/li>\n<p>&#10;<\/p>\n<li>Seconds later, our sample-based and our detonation-based machine learning models also verified the malicious classification. Within minutes, detonation-based models chimed in and added additional confirmation.<\/li>\n<p>&#10;<\/p>\n<li>Within minutes, an anomaly detection alert notified us about a new potential outbreak.<\/li>\n<p>&#10;<\/p>\n<li>After analysis, our response team updated the classification name of this new surge of threats to the proper malware families. People affected by these infection attempts early in the campaign would have seen blocks under machine learning names like Fuery, Fuerboos, Cloxer, or Azden. Later blocks show as the proper family names, Dofoil or Coinminer.<\/li>\n<p>&#10;<\/ol>\n<p>&#10;<\/p>\n<p>Windows 10, Windows 8.1, and Windows 7 users running Windows Defender and Windows Security Essentials are all protected from this latest outbreak.<\/p>\n<p>&#10;<\/p>\n<figure id=\"attachment_80552\" style=\"max-width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80552 size-full\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/dofoil-ml.png\" alt=\"Figure 2. Layered machine learning defenses in Windows Defender AV\" width=\"850\" height=\"430\" \/><figcaption class=\"wp-caption-text\"><em>Figure 2. Layered machine learning defenses in Windows Defender AV<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<p>Artificial intelligence and behavior-based detection in Windows Defender AV has become one of the mainstays of our defense system. The AI-based pre-emptive protection provided against this attack is similar to how layered machine learning defenses stopped an <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/02\/14\/how-artificial-intelligence-stopped-an-emotet-outbreak\/\">Emotet outbreak<\/a> last month.<\/p>\n<p>&#10;<\/p>\n<h2>Code injection and coin mining<\/h2>\n<p>&#10;<\/p>\n<p>Dofoil is the latest malware family to incorporate coin miners in attacks. Because the value of Bitcoin and other cryptocurrencies continues to grow, malware operators see the opportunity to include coin mining components in their attacks. For example, exploit kits are now delivering coin miners instead of ransomware. Scammers are adding coin mining scripts in tech support scam websites. And certain banking trojan families added coin mining behavior.<\/p>\n<p>&#10;<\/p>\n<p>The Dofoil campaign we detected on March 6 started with a trojan that <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/07\/12\/detecting-stealthier-cross-process-injection-techniques-with-windows-defender-atp-process-hollowing-and-atom-bombing\/\">process hollowing <\/a> on <em>explorer.exe.<\/em> Process hollowing is a code injection technique that involves spawning a new instance of legitimate process (in this case <em>c:windowssyswow64explorer.exe<\/em>) and then replacing the legitimate code with malware.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80681 size-large\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/1-process-hollowing-5aa05c09f3fe0-1024x531.png\" alt=\"\" width=\"1024\" height=\"531\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 3. Windows Defender ATP detection for process hollowing (SHA-256: d191ee5b20ec95fe65d6708cbb01a6ce72374b309c9bfb7462206a0c7e039f4d, detected by Windows Defender AV<\/em> <i><span style=\"font-family: Segoe UI\">a<\/span><\/i><i>s <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=TrojanDownloader:Win32\/Dofoil.AB\">TrojanDownloader:Win32\/Dofoil.A<\/a><\/i>)<\/p>\n<p>&#10;<\/p>\n<p>The hollowed explorer.exe process then spins up a second malicious instance, which drops and runs a coin mining malware masquerading as a legitimate Windows binary, wuauclt.exe.<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80684 size-large\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/2-coin-mining-5aa05cb75752d-1024x553.png\" alt=\"\" width=\"1024\" height=\"553\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 4. Windows Defender ATP detection for coin mining malware (SHA-256: 2b83c69cf32c5f8f43ec2895ec9ac730bf73e1b2f37e44a3cf8ce814fb51f120, detected by Windows Defender AV<\/em> <i><span style=\"font-family: Segoe UI\">as <\/span><\/i><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:Win32\/CoinMiner.D\"><i>Trojan:Win32\/CoinMiner.D<\/i><\/a>)<\/p>\n<p>&#10;<\/p>\n<p>Even though it uses the name of a legitimate Windows binary, its running from the wrong location. The command line is anomalous compared to the legitimate binary. Additionally, the network traffic from this binary is suspicious.<\/p>\n<p>&#10;<\/p>\n<figure id=\"attachment_80573\" style=\"max-width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80573 size-large\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/3-IP-comms-1024x345.png\" alt=\"Windows Defender ATP alert process tree showing anomalous IP communications\" width=\"1024\" height=\"345\" \/><figcaption class=\"wp-caption-text\"><em>Figure 5. Windows Defender ATP alert process tree showing anomalous IP communications<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<figure id=\"attachment_80576\" style=\"max-width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80576 size-large\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/dofoil-suspicious-network-activity-1024x273.png\" alt=\"Windows Defender ATP showing suspicious network activity \" width=\"1024\" height=\"273\" \/><figcaption class=\"wp-caption-text\"><em>Figure 6. Windows Defender ATP showing suspicious network activity<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<figure id=\"attachment_80669\" style=\"max-width: 803px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80669 size-full\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/Figure-7.png\" alt=\"Windows Defender ATP alert process tree\" width=\"803\" height=\"470\" \/><figcaption class=\"wp-caption-text\"><em>Figure 7. Windows Defender ATP alert process tree<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<p>Unlike many coin mining malware that are trojanized versions of legitimate coin miners, the Dofoil component is a bespoke miner. Based on its code, it supports NiceHash, which means it can mine different cryptocurrencies. The samples we analyzed mined Electroneum coins.<\/p>\n<p>&#10;<\/p>\n<h2>Persistence<\/h2>\n<p>&#10;<\/p>\n<p>For coin miner malware, persistence is key. These types of malware employ various techniques to stay undetected for long periods of time in order to mine coins using stolen computer resources.<\/p>\n<p>&#10;<\/p>\n<p>To stay hidden, Dofoil modifies the registry. The hollowed <em>explorer.exe<\/em> process creates a copy of the original malware in the Roaming AppData folder and renames it to <em>ditereah.exe<\/em>. <span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">It then <\/span><\/span><span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">replaces the OneDrive entry in the <\/span><\/span><span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">registry<\/span><\/span> <span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">Run key<\/span><\/span><span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">,<\/span><\/span> <span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">point<\/span><\/span><span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">ing<\/span><\/span><span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">to the newly created malware cop<\/span><\/span><span class=\"TextRun SCXW93081316\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW93081316\">y.<\/span><\/span> <a href=\"https:\/\/microsoft.sharepoint.com\/teams\/osg_core_dcp\/cpub\/partner\/antimalware\/Shared%20Documents\/Blogs\/RS4\/Githrizai%20outbreak\/Githrizai%20blog%20draft.docx#_msoanchor_2\"><\/a><\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-80585 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/3-persistence-1-1024x341.png\" alt=\"\" width=\"1024\" height=\"341\" \/><\/p>\n<p>&#10;<\/p>\n<figure id=\"attachment_80588\" style=\"max-width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80588 size-large\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/5-persistence-one-drive-1024x407.png\" alt=\"Windows Defender ATP alert process tree showing creation of new malware process \" width=\"1024\" height=\"407\" \/><figcaption class=\"wp-caption-text\"><em>Figure 8. Windows Defender ATP alert process tree showing creation of new malware process (SHA-256: d191ee5b20ec95fe65d6708cbb01a6ce72374b309c9bfb7462206a0c7e039f4d) and registry modification<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<h2>Command and communication<\/h2>\n<p>&#10;<\/p>\n<p>Dofoil is an enduring family of trojan downloaders. These connect to command and control (C&amp;C) servers to listen for commands to download and install malware. In the March 6 campaign, Dofoils C&amp;C communication involves the use of the decentralized <a href=\"https:\/\/www.namecoin.org\/\">Namecoin<\/a> network infrastructure.<\/p>\n<p>&#10;<\/p>\n<p>The hollowed <em>explorer.exe<\/em> process writes and runs another binary, <em>D1C6.tmp.exe<\/em> (<em>SHA256: 5f3efdc65551edb0122ab2c40738c48b677b1058f7dfcdb86b05af42a2d8299c<\/em>) into the <em>Temp<\/em> folder. <em>D1C6.tmp.exe<\/em> then drops and executes a copy of itself named <em>lyk.exe<\/em>. Once running,<em> lyk.exe<\/em> connects to IP addresses that act as DNS proxy servers for the Namecoin network. It then attempts to connect to the C&amp;C server <em>vinik.bit<\/em> inside the NameCoin infrastructure. The C&amp;C server commands the malware to connect or disconnect to an IP address; download a file from a certain URL and execute or terminate the specific file; or sleep for a period of time.<\/p>\n<p>&#10;<\/p>\n<p>&nbsp;<\/p>\n<p>&#10;<\/p>\n<figure id=\"attachment_80594\" style=\"max-width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80594 size-large\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/dofoil-explorer-1024x338.png\" alt=\" Windows Defender ATP alert process tree showing creation of the temporary file, D1C6.tmp.exe\" width=\"1024\" height=\"338\" \/><figcaption class=\"wp-caption-text\"><em>Figure 9. Windows Defender ATP alert process tree showing creation of the temporary file, D1C6.tmp.exe (SHA256: 5f3efdc65551edb0122ab2c40738c48b677b1058f7dfcdb86b05af42a2d8299c)<\/em><\/figcaption><\/figure>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80597 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/dofoil-d1c6.png\" alt=\"\" width=\"738\" height=\"324\" \/><\/p>\n<p>&#10;<\/p>\n<h2>Stay protected with Windows 10<\/h2>\n<p>&#10;<\/p>\n<p>With the rise in valuation of cryptocurrencies, cybercriminal groups are launching more and more attacks to infiltrate networks and quietly mine for coins.<\/p>\n<p>&#10;<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/windows-defender-antivirus-in-windows-10?ocid=cx-blog-mmpc\">Windows Defender AV<\/a>s layered approach to security, which uses behavior-based detection algorithms, generics, and heuristics, as well as machine learning models in both the client and the cloud, provides real-time protection against new threats and outbreaks.<\/p>\n<p>&#10;<\/p>\n<p>As demonstrated, Windows Defender Advanced Threat Protection (<a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a>) flags malicious behaviors related to installation, code injection, persistence mechanisms, and coin mining activities. Security operations can use the rich detection libraries in Windows Defender ATP to detect and respond to anomalous activities in the network. Windows Defender ATP also integrates protections from Windows Defender AV, Windows Defender Exploit Guard, and Windows Defender Application Guard, providing a seamless security management experience.<\/p>\n<p>&#10;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-10-s?ocid=cx-blog-mmpc\">Windows 10 S<\/a>, a special configuration of Windows 10, helps protect against coin miners and other threats. Windows 10 S works exclusively with apps from the Microsoft Store and uses Microsoft Edge as the default browser, providing Microsoft verified security.<\/p>\n<p>&#10;<\/p>\n<p>In enterprise environments, Windows Defender Exploit Guard reduces the attack surface for coin miners and other threats. In the March 6 outbreak, the Network protection feature in <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/10\/23\/windows-defender-exploit-guard-reduce-the-attack-surface-against-next-generation-malware\/\">Windows Defender Exploit Guard<\/a> can block connections to C&amp;C servers and other malicious IPs using reputation from Windows Defender SmartScreen.<\/p>\n<p>&#10;<\/p>\n<p><em>Windows Defender Research<\/em><\/p>\n<p>&#10;<\/p>\n<p>&nbsp;<\/p>\n<p>&#10;<\/p>\n<p>&nbsp;<\/p>\n<p>&#10;<\/p>\n<hr \/>\n<p>&#10;<\/p>\n<h4><strong>Talk to us<\/strong><\/h4>\n<p>&#10;<\/p>\n<p>Questions, concerns, or insights on this story? Join discussions at the <a target=\"_blank\" href=\"https:\/\/answers.microsoft.com\/en-us\/protect\" rel=\"noopener\">Microsoft community<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>&#10;<\/p>\n<p>Follow us on Twitter <a target=\"_blank\" href=\"https:\/\/twitter.com\/WDSecurity\" rel=\"noopener\">@WDSecurity<\/a> and Facebook <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/MsftWDSI\/\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>&#10;<br \/><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/07\/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Windows Defender Research| Date: Wed, 07 Mar 2018 21:58:45 +0000<\/strong><\/p>\n<p>Just before noon on March 6 (PST), Windows Defender AV blocked more than 80,000 instances of several sophisticated trojans that exhibited advanced cross-process injection techniques, persistence mechanisms, and evasion methods. Behavior-based signals coupled with cloud-powered machine learning models uncovered this new wave of infection attempts. The trojans, which are new variants of Dofoil (also known <\/p>\n<p><a class=\"read-more\" title=\"Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign\" aria-label=\"Read more about Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/07\/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign\/\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-11686","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11686"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11686\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11686"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}