In the course of doing our research, we studied older variants of , and compared them to the new ones we were encountering during the incident response.

We found that these new drivers had been obfuscated with a variety of techniques, specifically that the drivers were packed using a commercial runtime called . The packer makes it more difficult for an analyst to reverse-engineer a sample, but we don't see a lot of drivers that are packed, at all. It was kind of unusual.

In addition, the malware drivers requires the threat actor to run an executable called a loader, which simply does the mechanical work of creating Services entries in the Windows Registry, and moving the driver into the %temp% directory. The loader isn't packed.

#burntcigar #drivers #packer #vmprotect #malware

Last updated 2 years ago

This morning, my colleague Andreas and I were able to release the first of what I expect will be a series of blog posts about a supply chain compromise of 's code-signing infrastructure.

The @SophosXOps team discovered in October that a ransomware threat actor was deploying a package that was discovered by Mandiant earlier this year. They named the package - it's a signed Windows that is purpose-built to kill endpoint security and tools.

Previous BURNTCIGAR drivers had been signed with shady or known-compromised code signing certificates. These new ones were signed by Microsoft's Windows Hardware Compatibility Publisher - pretty much a gold standard for authoritative cryptographic signing of code that can run at kernel-mode under Windows.

Yeah, it's...kinda bad. We informed Microsoft, and they released an advisory this morning about it. We're now free from our NDA to publish our research.

news.sophos.com/en-us/2022/12/

#microsoft #malware #burntcigar #driver #edr

Last updated 2 years ago