May 11, 2020 By Nir Shwarts
Limor Kessem
8 min read

The Zeus Sphinx banking Trojan is financial malware that was built upon the existing and leaked codebase of the forefather of many other Trojans in this class: Zeus v2.0.8.9. Over the years, Sphinx has been in different hands, initially offered as a commodity in underground forums and then suspected to be operated by various closed gangs.

After a lengthy hiatus, this malware began stepping up attack campaigns starting in late 2019 and increased its spreading power in the first quarter of 2020 via malspam featuring coronavirus relief payment updates.

With Sphinx back in the financial cybercrime arena, IBM X-Force wrote the following technical analysis of the Sphinx Trojan’s current version, which was first released into the wild in late 2019. We will be covering the following components, shedding light on parts of the malware that were modified in this version, as other parts likely remained the same:

  • Persistence mechanism
  • Injection tactics
  • Bot configuration
  • Hidden configuration nuggets
  • Bot identification method
  • Sphinx’s naming algorithms

Let’s dive in.

Establishing Persistence

Almost any malware nowadays seeks to establish persistence on infected devices, both desktop and mobile, with the goal of surviving system reboots. Sphinx establishes persistence using a very common method: adding a Run key to the Windows Registry. This tactic has been used by Sphinx since its earliest versions, released in 2015.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

Scroll to view full table

Figure 1: Run key set for Sphinx’s executable payload

Since Sphinx’s malicious payload can come in two different formats, an executable file or a dynamic link library (DLL), it also sets the Registry Run key according to the format being installed. For the DLL format, we would see the following string type created:

Figure 2: Run key set for a Sphinx DLL

The malicious DLL’s entry point is named DllRegisterServer, which is usually an entry point for a COM module. When malware elects to use generic system names for its resources, it is done to blend in with the other benign elements in the operating system (OS).

Sphinx’s Code Injection Choice: Process Injection

Since its main function is to grab user credentials and other personal information from online banking sessions, Zeus Sphinx is designed with the ability to hook browser functions. Before gaining the ability to hook these types of functions, Sphinx has to ensure its stealthy ongoing operations on the OS. It does this by injecting malicious code into other processes first.

The tactic Sphinx uses is a process injection technique:

  1. Sphinx calls on the CreateProcessA function, which creates a new process and its primary thread. The function’s parameters are msiexec.exe for the new process name and the suspend flag applied as the process state. This is another part of the malware’s stealth mechanism, as msiexec.exe usually stands for the name of a legitimate Windows Installer process that is responsible for installation, storage and removal of programs.

Figure 3: Sphinx’s process injection

  1. It calls the WriteProcessMemory function to inject a payload into the msiexec.exe process.
  2. Next, Sphinx changes the execution point of the targeted process to start from the injected payload, using GetThreadContext and SetThreadContext functions. GetThreadContext is used to get the current extended instruction pointer of the remote process. SetThreadContext is used to set the current extended instruction pointer of the remote process.

The extended instruction pointer holds the address of the next instruction.

Figure 4: Sphinx’s process injection

Bot Configuration

The bot’s encrypted configuration is embedded within the injected executable in msiexec.exe.

What makes it rather easy to decrypt is that both the configuration and its decryption key reside near each other in a hardcoded address location. The following function decrypts the configuration using the hardcoded addresses of each component:

Figure 5: Bot configuration decryption process

Let’s take a look at the main components of a January 2020 campaign configuration. It began with noting the malware’s variant ID by using Russian language words that translate to “2020 Upgrade” (obnovlenie2020).

Next, we see the attacker’s command-and-control (C&C) server domain list. Sphinx does not use a domain generation algorithm (DGA).

These elements can help defenders better protect networks against Sphinx infections by monitoring or blocking any communications to the listed C&C servers. The RC4 key itself is an important element to those looking to analyze the malware since it is the same key that Sphinx uses to encrypt and decrypt most of its data.

Please note that the key inside the configuration is different from the key used to decrypt the configuration itself.

In the following image, we can see an example of two different Sphinx configurations.

Figure 6: Sphinx configuration excerpts from January 2020 Campaign

Taking into consideration the date they first appeared in the wild, similar C&C domains and the same RC4 key they contain, we can conclude that both configurations are related to the same campaign. On the left, a configuration fetched by an executable-type payload and on the right, one fetched by a DLL-type payload — both are from a January 2020 campaign.

Sphinx configurations are modified as campaigns are launched, changing the C&C addresses and the RC4 keys. In the following image, we can see a newer configuration fetched from an April 2020 campaign.

Figure 7: A different Sphinx configuration excerpt from an April 2020 campaign

Please note the main differences from the January 2020 configurations: a different RC4 key, a smaller and different set of C&C domains, a changed variant ID and the precise date of publish were added.

Bot Identification

Once infected by Sphinx, every device sends information home and is defined in the botnet by a bot ID to ensure control and updates through the attacker’s server. To do that, Sphinx uses an algorithm that includes the following elements from the infected device:

  • Volume C GUID
  • Computer Name
  • Windows Version
  • Windows Install Date
  • Digital Product ID

We can see the generated string when we run Sphinx dynamically as well:

Figure 8: Sphinx creating Bot ID string

After creating the bot ID, it’s encrypted with an RC4 stream cipher using the key derived from the bot’s configuration and then stored in the Registry with other binary data.

For example, a key created for storing this information:

HKCU\Software\Microsoft\bmqhcn\gwehhxf

The name of the key depends on the variant of the malware and is produced by encoding some constants.

Looking at the function’s output before the result is encrypted reveals Sphinx’s bot ID layout:

  • [VOLUME_C_GUID][COMPUTER_NAME][2EBFF1F4][0ADE2A62]
  • [VOLUME_C_GUID] – Bot’s volume C GUID
  • [COMPUTER_NAME] – Bot’s computer name
  • [2EBFF1F4] – A hash of the operating system version.
  • [0ADE2A62] – A hash of InstallDate and DigitalProductID registry values.
  • Both hashes mentioned above are computed using a Sphinx internal hash function.

Sphinx’s Naming Algorithms

Malware codes often use a naming algorithm to create different names for files and resources on each infected device. They do this to evade static detection that might search for a certain file name as an indicator of compromise (IoC).

In Sphinx’s case, one naming algorithm is used to create files and resource names and a different one is used to create a unique mutex object name.

File/Resource Name Generator

Beginning with the algorithm used to create file and resource names, to create what would appear to be random names, Sphinx uses a pseudo-random number generator (PRNG) named MT19937 (also known as the Mersenne Twister). Let’s look at how Zeus Sphinx implements this PRNG to create names for its resources.

The Sphinx naming algorithm function takes four parameters to create its names: maximum length, minimum length, output buffer pointer and a binary option to upper or not the first character. As shown in the next example, these parameters are hardcoded, which can help write more regular expressions (RegEx) for detecting such names.

Figure 9: Sphinx’s naming algorithm

Let’s look at the naming_algo function:

  • Sphinx starts the process by decoding two hardcoded strings, which amount to 25 of the 26 English language characters:
      • Aeiouy
      • bcdfghklmnpqrstvwxz
  • It uses randomization for choosing the output (name) size and loops through additional steps to build it.
  • It randomly selects one of the two initial strings.
  • It randomly chooses one character from the selected string.
  • It appends the character to what’s going to eventually compose the generated name.
  • If the name has not yet met the selected length requirement, it loops back and repeats the process.

Figure 10: Choosing between the “aeiouy” or “bcdfghklmnpqrstvwxz” strings

Mutex Name Generator

Like other malware, Sphinx generates mutex names upon execution. Mutex names are often searched by security tools and researchers as a way to gather IoCs. Therefore, it can be a better way for malware to hide on infected devices if its mutex name is harder to find. The use of a unique mutex name also helps prevent the malware from infecting the same machine twice.

In Sphinx’s case, the mutex name is always a unique string created per machine, and the algorithm used to create it is relatively complicated.

To start, Sphinx uses two system data components for building its mutex names:

  • The device’s volume C globally unique identifier (GUID)
  • The current user’s security identifier (SID)

To fetch the first value, it uses the Windows function GetVolumeNameForVolumeMountPointW.

Figure 11: Sphinx composing its unique mutex name

To fetch the second value, it uses two functions: OpenProcessToken and GetTokenInformation.

Figure 12: Sphinx composing its unique mutex name

Next, to generate a unique name, Sphinx takes the following steps:

  1. It creates a hash of the infected device’s SID value that it obtained earlier on.

Figure 13: Sphinx composing its unique mutex name

  1. It uses the GUID to encode the SID’s hash.

This function is called seven times, with varying constants being used. Then, some of the names are randomly selected to become mutex names.

Figure 14: Sphinx generates seven different mutex names on each device

Technically, there could be seven different mutex names created on each device, which Sphinx checks for to ensure that the device is not already running the malware.

  1. Next, using the key derived from the bot’s configuration, the mutex is encrypted with an RC4 cipher.

Figure 15: Sphinx encrypts mutex name

  1. To make its mutex names blend in with other system elements, it calls on the function ole32!StringFromGUID2, making the names look like GUIDs.

Below is an example of two mutex names created within msiexec.exe:

Figure 16: Examples of Sphinx mutex names generated through its process

Sphinx Is Back in Business

The Sphinx Trojan emerged in 2015, at which point its main focus was banks in North America. Over the years, different operators of this malware launched it into campaigns in other parts of the world, such as the U.K., then Brazil, then Canada and Australia. Most recently, Sphinx was implemented in infection campaigns targeting users in Japan.

While Sphinx has been an on-and-off type of operation over the years, it appears it is now on-again, with version updates and new infection campaigns that are back to targeting North American banks.

While less common in the wild than Trojans like TrickBot, for example, Sphinx’s underlying Zeus DNA has been an undying enabler of online banking fraud. Financial institutions must reckon with its return and spread to new victims amid the current pandemic.

Sphinx is just one more threat we regularly cover. To learn more about emerging threats and campaigns, please join us on X-Force Exchange. Our research team also regularly releases blogs on Security Intelligence to keep you up to date on what we see in the wild.

More from Malware

Strela Stealer: Today’s invoice is tomorrow’s phish

12 min read - As of November 2024, IBM X-Force has tracked ongoing Hive0145 campaigns delivering Strela Stealer malware to victims throughout Europe - primarily Spain, Germany and Ukraine. The phishing emails used in these campaigns are real invoice notifications, which have been stolen through previously exfiltrated email credentials. Strela Stealer is designed to extract user credentials stored in Microsoft Outlook and Mozilla Thunderbird. During the past 18 months, the group tested various techniques to enhance its operation's effectiveness. Hive0145 is likely to be…

Hive0147 serving juicy Picanha with a side of Mekotio

17 min read - IBM X-Force tracks multiple threat actors operating within the flourishing Latin American (LATAM) threat landscape. X-Force has observed Hive0147 to be one of the most active threat groups operating in the region, targeting employee inboxes at scale, with a primary focus on phishing and malware distribution. After a 3-month break, Hive0147 returned in July with even larger campaign volumes, and the debut of a new malicious downloader X-Force named "Picanha,” likely under continued development, deploying the Mekotio banking trojan. Hive0147…

Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns

13 min read - As of March 2024, X-Force is tracking multiple ongoing ITG05 phishing campaigns featuring lure documents crafted to imitate authentic documents of government and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia, and North and South America. The uncovered lures include a mixture of internal and publicly available documents, as well as possible actor-generated documents associated with finance, critical infrastructure, executive engagements, cyber security, maritime security, healthcare, business, and defense industrial production. Beginning in November 2023, X-Force observed ITG05…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today