Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qt5Network.dll: Sideloaded by Spoofed Acronis syncagentsrv.exe #97

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

mbabinski
Copy link

This entry attempts to describe the DLL sideloading technique laid out in this report from Cyble from December 2024: https://cyble.com/blog/threat-actor-targets-manufacturing-industry-with-malware/.

Please let me know if it looks ok or needs changes. Thanks for maintaining this interesting and helpful resource!

@mbabinski mbabinski requested a review from wietze as a code owner December 18, 2024 01:21
Copy link
Owner

@wietze wietze left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi Micah, thanks for this contribution! One question on the hash from me, otherwise looks good.

- Path: '%PROGRAMFILES%\common files\acronis\syncagent\syncagentsrv.exe'
Type: Sideloading
SHA256:
- '6f7f390b2012e7dfef9fcbd673a4a0256e2e217b11831e9a27a9d460ba57c0d2'
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this SHA correct? It does not seem to belong to an Acronis product

Copy link
Author

@mbabinski mbabinski Dec 18, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi Wietze, thanks for the review. Yeah, I was confused by this. The report mentions that Qt5Network.dll was loaded by syncagentsrv.exe, a legitimate application. But it doesn't provide the EXE hash. A quick google search reveals that this EXE name is part of an Acronis product. So I recorded the vendor of the product which the malicious zipfile was likely trying to mimic. When I looked up the zipfile which contained the EXE and DLL in VT, I can see that the syncagentsrv.exe was actually the file represented by the hash I provided in the PR: https://www.virustotal.com/gui/file/6f7f390b2012e7dfef9fcbd673a4a0256e2e217b11831e9a27a9d460ba57c0d2.

Based on what little I have found on the actual EXE used in the attack, a renamed copy of PasswordChanger.exe (Active@ Password Changer by LSoft Technologies), this would normally be located in:

  • %PROGRAMFILES%\LSoft Technologies\Active@ Password Changer\PasswordChanger.exe
  • %PROGRAMFILES%\Active Data Recovery Software\Active Password Changer\PasswordChanger.exe or possibly
  • %PROGRAMFILES%\LSoft Technologies\Active@ Data Studio\PasswordChanger.exe

Should I update the submission to be geared toward Active@ Password Changer?

Thanks again!

Created: 2024-12-17
Vendor: Acronis
ExpectedLocations:
- '%PROGRAMFILES%\Acronis\CyberProtectHomeOffice'
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One more comment: if sideloading is used, aren't qt5network and syncagentsrv.exe expected to be located in the same location?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants