Reversing APT Tool : SManager
Static and Dynamic Analysis of Chinese APT Backdoor

Introduction:
Recently their is the blog came in Japanese from JPCert(Japanese CERT) about the espionage Campaign held from Chinese APT. From the efforts of our fellow researcher i have the sample.
Static & Dynamic Analysis
Static Analysis(basic)
Analyzed Info. about File:
It contains File hash’s and other sort of file info when it was created and what type of Application it is.

Strings:
As from the strings shown in images below there are info. about different type of Windows Form Application functions are been implemented in this sample.

















Static Analysis: Advanced
Using Ghidra Tool i had analyzed this sample further.
entry function:


scamming_errors_of_ikernel_and_upgrade function:


another interesting function in the binary is this function fetch_sys_info which is interesting to note that it loads the MSVCRT.DLL several times as the binary executes which is necessary file to be loaded in the binary at the time of developing the code in the visual studio.

and at the end of the this entry function the call for the windows form application is been made.
Lets now take look at the Windows Form Application Functions
Here are some Windows Form functions displayed in screenshot. If you goes any of these functions there is nothing interesting there to see in there. The main function is AfxWinMain used to return itself when it is called in the entry function.

AfxFindResourceHandle function:
This is the function in which the resources of the Wnd Form App is being handled.




Other than that, there are the function in this binary which are used for automating the exploitation ,termination of communication from the Server.


reg_editor function:






payload_writer_dir_creator_for_payload function:
this function is very long and some of the reversed code lines are:






reg_edit_proxy_setup_and_file_ops function:




caller_of_communication_termination function:
in this function the communication of Windows Form App is been terminated from Command and Control Server (C2).


Dynamic Analysis(Basic)
VT detection:




Registry Key Set:


Registry Key Deleted:

Imports of .dll by this .exe:

Process and Services Activity:

Dynamic Analysis:Advanced
Running Smanager .exe on any.run we get these results


IOCs:

C2 Server:

Communicating IP’s with .exec:

Thanks for reading.
Article Link: https://medium.com/@0xthreatintel/reversing-apt-tool-smanager-971605587e9c?source=rss-a15183055fd6------2