Zapdf is another suspicious PDF converter


In this series of YAPA (Yet Another PDF Application), I continue to document newly observed suspicious PDF converter applications. The latest one is Zapdf, which can be found on zappdfapp[.]com. This site was also document on Northwave Cyber Security, and Nextron's websites, both of which host numerous IOCs for similar applications.


The above image shows the a similar style to many other observed malicious pdf, document, and zip converter applications.

Analysis:

app.any.run sandbox run shows initial telemetry traffic POST, as well as the download of an updater binary. 


Some interesting notes on this when running on a test VM. The initial application is a .NET staging application, it extracts the "benign" Zapdf.exe (also a .NET application), but not before sending some telemetry, fingerprinting the system, creating persistence, and downloading the suspicious ZapUpdater.exe

This initial .NET loader looks very similar to other YAPAs observed in the past. Slight obfuscation of chrome strings, telemetry, UID file creation, and more.





The scheduled task is interesting, it sets an execution command to "AppData\Local\Zapdf\ZapUpdater\ZapUpdater.exe", set to ruin daily if network is vailable, timeout is set for 72 hours (very interesting), and is set to retry every 10 minutes on failure. 

At this point, everything can be seen in Fiddler, however, the ZapUpdater is not seen in fiddler, this application is not .NET, it appears to be C++. Observable traffic in wireshark, and VirusTotal show traffic to livilev[.]com, specifically to /report and /authorize.

I can however rub this through x64dbg to enrich analysis. 

Mutex


Network Data 
User-Agent for this is :"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36"

Unfortunately, when getting to livilev[.]com/report I don't seem to see anything past fetcher_log. I suspect some gatekeeping that I have not gotten past, but I suspect that like other YAPAs in the past, the server side could send remote code execution through the updater (not confirmed for zapupdater). 

I want to note that fether_log is also seen with other YAPA style Updaters, notfoundsec, and PDFSkills. This is further evidence of Zapdf, primarily it's updater, being part of the same family/campaign as other malicious applications observed in the past. 




Comments

Popular posts from this blog

TamperedChef: Suspicious Recipe App is really Malware

EvilAI: Fake Online Speedtest Application

Beware of Fake 7zip Installer: upStage Proxy