{"id":19466,"date":"2022-06-29T03:10:22","date_gmt":"2022-06-29T11:10:22","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/29\/news-13199\/"},"modified":"2022-06-29T03:10:22","modified_gmt":"2022-06-29T11:10:22","slug":"news-13199","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/29\/news-13199\/","title":{"rendered":"Forced Chrome extensions get removed, keep reappearing"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 29 Jun 2022 10:38:18 +0000<\/strong><\/p>\n<p>In the continued saga of annoying search extensions we have a new end-of-level boss.<\/p>\n<p>Victims have been reporting browser extensions that were removed by Malwarebytes, but \u201cmagically\u201d came back later. Since the victims also complained about the message saying their browser was &#8220;managed&#8221;, we had a pretty good idea where to look.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"57905\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/attachment\/forcedextension\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/forcedextension.png\" data-orig-size=\"442,210\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"forcedextension\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/forcedextension-300x143.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/forcedextension.png\" width=\"442\" height=\"210\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/forcedextension.png\" alt=\"custom search bar\" class=\"wp-image-57905\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/forcedextension.png 442w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/forcedextension-300x143.png 300w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><figcaption><em>custom search bar<\/em> is <em>one of the forced extensions<\/em><\/figcaption><\/figure>\n<\/div>\n<h2>Search extensions<\/h2>\n<p>The culprits turned out to be search extensions. Which is <a href=\"https:\/\/blog.malwarebytes.com\/adware\/2020\/12\/searchdimension-search-hijackers\/\">often<\/a> the case when we spot potentially unwanted programs (PUPs) that use malware tactics to get installed and gain persistence.<\/p>\n<p>The search hijackers \u201c<a href=\"https:\/\/blog.malwarebytes.com\/detections\/pup-optional-activesearchbar\/\">active search bar<\/a>\u201d and \u201c<a href=\"https:\/\/blog.malwarebytes.com\/detections\/pup-optional-customsearchbar\/\">custom search bar<\/a>\u201d were both available in the Chrome web store at the time of writing even though we reported them days ago.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"57906\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/attachment\/webstore-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore.png\" data-orig-size=\"1204,708\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"webstore\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore-300x176.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore-600x353.png\" loading=\"lazy\" width=\"600\" height=\"353\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore-600x353.png\" alt=\"active search bar in the Chrome Webstore\" class=\"wp-image-57906\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore-600x353.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore-300x176.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/webstore.png 1204w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption><em>active search bar is also available in the webstore<\/em><\/figcaption><\/figure>\n<\/div>\n<h2>PowerShell<\/h2>\n<p>It took some digging to find the origin, since all we had were the extensions. And when the extensions were installed directly from the webstore, nothing happened out of the ordinary. However, some hunting on VirusTotal soon led me to a few recently uploaded <a href=\"https:\/\/www.malwarebytes.com\/glossary\/powershell\">PowerShell<\/a> scripts that included the string \u201cExtensionInstallForcelist.\u201d I looked for that string because we know from <a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/06\/search-hijackers-change-chrome-policy-to-remote-administration\/\">the past<\/a> that these registry policies account for the \u201cYour browser is managed\u201d warnings.<\/p>\n<p><code>$CPath = \"HKLM:SOFTWA<\/code>REPoliciesGoogleChrome<code>ExtensionInstallForcelist\";<\/code><\/p>\n<p><code>$EPath = \"HKLM:SOFTWAREPoliciesMicrosoftEdgeExtensionInstallForcelist\";<\/code><\/p>\n<p>The description in the Chromium documentation about the ExtensionInstallForcelist states:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cSpecifies a list of apps and extensions that are installed silently, without user interaction, and which cannot be uninstalled nor disabled by the user.\u201d<\/p>\n<\/blockquote>\n<p>And to confirm this finding, the victims that provided logs all had one of these PowerShell script listed in their <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/03\/scheduled-tasks\/\">Scheduled Tasks<\/a>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"57907\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/attachment\/warning3-49\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3.png\" data-orig-size=\"773,212\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"warning3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3-300x82.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3-600x165.png\" loading=\"lazy\" width=\"600\" height=\"165\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3-600x165.png\" alt=\"Scheduled Task with an Action pointing to the PowerShell script\" class=\"wp-image-57907\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3-600x165.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3-300x82.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3-767x212.png 767w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/warning3.png 773w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption><em>The Scheduled Task triggers the PowerShell script<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The Scheduled Task was set to run every four hours, which explained why the extensions kept coming back.<\/p>\n<h2>Installer<\/h2>\n<p>But Scheduled Tasks don\u2019t install themselves either and dropping PowerShell scripts in the System32 folder requires Administrator privileges, so we needed to dig a little further to find an installer.<\/p>\n<p>The domain wincloudservice.com was used as a download location in all the PowerShell scripts so we used that domain as a search parameter in our next stage of VirusTotal hunting. This search eventually returned three installers. What they had in common at first glance was that the filenames all ended with &#8220;_x64LTS.exe&#8221; and that they were all signed by \u201cTommy Tech LTD.&#8221;<\/p>\n<p>Upon further inspection we noticed that the installers all asked for Administrator privileges twice. The first part installs something that is called \u201cSetup\u201d and the second part installs an application that aligns with the name of the installer. So, it appears that the original installer files were \u201cpatched\u201d to add the installer for our browser hijacker. It stands to reason that these installers are offered for download somewhere by the threat actors.<\/p>\n<p>The EULA points to tommytechil.com which is unreachable. I was unable to find an installer that actually dropped an extension in Edge, but the \u201cYour browser is managed by your organization\u201d setting does get enforced.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" data-attachment-id=\"57908\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/attachment\/edge_managed\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/edge_managed.png\" data-orig-size=\"304,40\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"edge_managed\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/edge_managed-300x39.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/edge_managed.png\" loading=\"lazy\" width=\"304\" height=\"40\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/edge_managed.png\" alt=\"Edge telling the user &quot;Your browser is managed by your organization&quot;\" class=\"wp-image-57908\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/edge_managed.png 304w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/edge_managed-300x39.png 300w\" sizes=\"auto, (max-width: 304px) 100vw, 304px\" \/><figcaption><em>Edge managed by your organization<\/em><\/figcaption><\/figure>\n<\/div>\n<h2>Javascripts<\/h2>\n<p>Malwarebytes customers were protected against these extensions as Malwarebytes\u2019 web protection module blocked the domain <a href=\"https:\/\/blog.malwarebytes.com\/detections\/wincloudservice-com\/\">wincloudservice[.]com<\/a>. On inspection, this domain hosted several javascripts including heavily obfuscated files called crypto.js and crypto-js.min.js. <\/p>\n<h2>Detection and removal<\/h2>\n<p>Malwarebytes detects these browser hijackers as PUP.Optional.ActiveSearchBar and PUP.Optional.CustomSearchBar. Included in the removal procedure are the extension, and the Scheduled Task, which is enough to permanently get rid of the extension.<\/p>\n<p>Some Windows registry changes have been made that will take a system administrator to decide what they want to keep or not.<\/p>\n<p>The registry keys to remove the \u201cYour browser is managed\u201d are:<\/p>\n<p><code>HKEY_LOCAL_MACHINESOFTWAREPoliciesGoogleChromeExtensionInstallForceList<\/code><\/p>\n<p><code>HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftEdgeExtensionInstallForceList<\/code><\/p>\n<p>And another change made by the installer was the registry value:<\/p>\n<p><code>HKEY_LOCAL_MACHINESOFTWAREMicrosoftPowerShell1ShellIdsMicrosoft.PowerShell<\/code>\\<code>ExecutionPolicy<\/code><\/p>\n<p>The installer set that to <code>\u201cUnrestricted\u201d<\/code> which may not be your favorite setting. If you are not sure or you have never actively set that policy, the default is <code>\u201cRestricted\u201d<\/code>. Please note that in <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/06\/cybersecurity-agencies-you-dont-have-to-delete-powershell-to-secure-it\/\">some organizations PowerShell is required<\/a> to run.<\/p>\n<h2>IOCs<\/h2>\n<p><strong>Domains:<\/strong><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/detections\/activesearchbar-me\/\">activesearchbar[.]me<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/detections\/customsearchbar-me\/\">customsearchbar[.]me<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/detections\/optimizerupdate-com\/\">optimizerupdate[.]com<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/detections\/securedatacorner-com\/\">securedatacorner[.]com<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/detections\/wincloudservice-com\/\">wincloudservice[.]com<\/a><\/p>\n<p><strong>Installers:<\/strong><\/p>\n<p>4kvideodownloader_5.22.371_x64LTS.exe<\/p>\n<p>AutoClicker_x64LTS.exe<\/p>\n<p>FPSUnlocker_4.1_x64LTS.exe<\/p>\n<p><strong>PowerShell scripts:<\/strong><\/p>\n<p>PrintWorkflowService.ps1<\/p>\n<p>WindowsUpdater1.ps1<\/p>\n<p>OptimizerWindows.ps1<\/p>\n<p><strong>Extensions:<\/strong><\/p>\n<p>custom search bar nniikbbaboifhfjjkjekiamnfpkdieng<\/p>\n<p>active search bar pkofdnfadkamabkgjdjcddeopopbdjhg<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/\">Forced Chrome extensions get removed, keep reappearing<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 29 Jun 2022 10:38:18 +0000<\/strong><\/p>\n<p>Malwarebytes found a family of forced Chrome extensions that can&#8217;t be removed because of a policy change that tells users &#8220;Your browser is managed&#8221;.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/forced-chrome-extensions-keep-reappearing\/\">Forced Chrome extensions get removed, keep reappearing<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26765,26766,26767,11191,26768,26769,10494,26770,26771],"class_list":["post-19466","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-active-serach-bar","tag-custome-search-bar","tag-extensioninstallforcelist","tag-powershell","tag-scheduled-task","tag-search-extensions","tag-threat-analysis","tag-tommy-tech","tag-your-browser-is-managed"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19466"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19466\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}