Category: SOC - LetsDefend - FakeGPT Malicious Chrome Extension

FakeGPT
In this writeup, we will investigate the SOC202 - FakeGPT Malicious Chrome Extension

Alert Phase

Screenshot For The Alert
Screenshot For The Alert
  • We can take a quick look at the “Alert Trigger Reason” in the alert details and understand the root cause of the alert.
  • It appears that there is a suspicious file detected on a system named Samuel with an IP address of 172.16.17.173.
  • The Alert is triggered by the SOC202 rule for FakeGPT Malicious Chrome Extension.
  • Based on this information, it appears that the command line chrome.exe --single-argument C:\Users\LetsDefend\Download\hacfaophiklaeolhnmckojjjjbnappen.crx is attempting to open or manipulate a Chrome extension file (with the .crx extension hacfaophiklaeolhnmckojjjjbnappen.crx) using the Google Chrome browser.
  • The device action is marked as allowed, indicating that no action was taken by the device to prevent or block the execution of the file.
  • Based on the provided Trigger Reason, The browser extension named hacfaophiklaeolhnmckojjjjbnappen.crx was added, as evidenced by the provided trigger reason. The file hash corresponding to the extension is: 7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669.

In general, there are indications of potential malicious activity on the system, necessitating a thorough investigation to ascertain the full scope of the activity and to devise appropriate measures for remediation.

Detection Phase

  • As a security analyst, one of the first steps we take to verify the alert and determine whether it is a false positive or a true positive incident is to analyze the logs collected from the host by our security products.
  • The first step we can take to investigate the alert is to examine the system logs of the Samuel host under Endpoint Security to identify any unusual or suspicious activities that may be related to the reported incident.
  • This includes looking for any network connections, browser history or processes initiated around the same time as the suspicious extension installation.

📍 First Let’s Check Processes..

Processes
Processes
  • When examining the processes on the Samuel host, we have discovered that the command
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\LetsDefend\Desktop\hacfaophiklaeolhnmckojjjjbnappen.crx
    

    was executed on the machine with a Process ID (PID) of 5756 at 2023-05-29 13:01:52.137 and the parent process named ` OpenWith.exe`.


📍 Now Let’s Check The Browser History..

Browser History
Browser History
  • Based on the browser history, it is evident that the user interacted with the extension and visited various related URLs, including the Chrome Web Store pages and the settings page for the suspicious extension.
  • The user visited the Chrome Web Store page for the extension with the URL https://chrome.google.com/webstore/detail/chatgpt-for-google/hacfaophiklaeolhnmckojjjjbnappen. This indicates that the user accessed the extension’s page on the Web Store.
  • The user accessed the Chrome Extensions page, which allows managing installed extensions. This suggests that the user interacted with the extensions settings, possibly to view or modify the installed extensions.
  • The user specifically visited the Chrome Extensions page with the extension ID hacfaophiklaeolhnmckojjjjbnappen. This indicates that the user accessed the settings page for the suspicious extension.
  • The user visited the OpenAI Chat platform with URL https://chat.openai.com/, which is the legitimate website for accessing the ChatGPT-based service.
  • The user accessed the login page of the OpenAI Chat platform with URL https://chat.openai.com/auth/login. Probably for link the suspicious extension to his ChatGPT account.

📍 Finally Let’s Check The Network Connections..

Network Connections
Network Connections
  • Based on the network connections, there are lots of IP addresses that interact with the user.

Analysis Phase

VirusTotal
Not Quarantined
  • The fact that the device action was marked as allowed indicates that no immediate action was taken to quarantine or block the malware. Furthermore, the ongoing network and process activities observed subsequent to the incident also suggest that the malware remains active and has not been successfully quarantined.

VirusTotal

  • It is stated in the alert details that the file that exploits the vulnerability is hacfaophiklaeolhnmckojjjjbnappen.crx. At the same time, we have the hash information of the file. We can quickly search for the hash in Google, Threat Intelligence, and other similar sources and take a look at the results.
VirusTotal
VirusTotal Result
  • After we submit the file hash in VirusTotal, It does not detect that the file is malicious.

Lets do Deep Analysis in Browser History..

Browser History
Browser History
  • Based on the provided URL from the browser history the name of the malicious extension is Chatgpt for Google and the ID of the malicious extension is hacfaophiklaeolhnmckojjjjbnappen.
https://chrome.google.com/webstore/detail/chatgpt-for-google/hacfaophiklaeolhnmckojjjjbnappen
VirusTotal
VirusTotal Result
  • After we submit the file hash in VirusTotal,, there are total of 3 security vendors flagged this file as malicious.
VirusTotal
VirusTotal Result
  • During our investigation, attempts to access the URL associated with the malicious extension, https://chrome.google.com/webstore/detail/chatgpt-for-google/hacfaophiklaeolhnmckojjjjbnappen, resulted in an error message stating “404.
  • That’s an error. The requested URL was not found on this server. That’s all we know.” The error message indicates that the specific URL we attempted to access is not currently available on the server. This could suggest that the malicious extension has been removed from the Chrome Web Store or the URL itself is no longer valid.

Compare and analyze Chrome extensions

ChatGPT for Google
ChromeStats - ChatGPT for Google
  • According to the chrome-stats website, this extension has a high-risk impact and a very high-risk likelihood, indicating significant potential harm and a strong probability of compromising the affected system
ChatGPT for Google
ChromeStats - ChatGPT for Google
  • On 2023-03-22, the malicious extension hacfaophiklaeolhnmckojjjjbnappen was removed from the Chrome Web Store because it contained malware.
Analyze Malware
Analyze Malware
  • The findings from our analysis confirm that the suspicious Chrome extension, identified as hacfaophiklaeolhnmckojjjjbnappen, is malicious

C2 Access Verification

  • We will analyze the network-based logs collected from the Samuel Host to investigate any indications of Command and Control (C2) access. By examining the network logs, we aim to identify any suspicious connections or communication patterns that may suggest unauthorized interactions with the C2 infrastructure.

  • On Log Management tab we filter the source address to the Ip address of Samuel Host 172.16.17.173 to see the logs related of the given ip address.

Log Management
Log Management
  • By conducting a thorough analysis of these suspicious outbound network connections, we aim to determine the intent, scope, and potential impact of the observed activity.
  • This analysis will enable us to make informed decisions regarding incident response, remediation, and the implementation of necessary security measures

  • A suspicious outbound network connection was identified from the Samuel Host based on the provided Sysmon event log

The raw log of the event are as follows:

RAW LOG
RAW LOG
  • Further investigation of the domain “www.chatgptforgoogle.pro” on threat intelligence platforms, such as VirusTotal, confirms its malicious nature.
  • The findings from these platforms indicate that the URL is associated with known malicious activity and has been reported as a threat.
VirusTotal
VirusTotal Result
  • After we submit the file hash in VirusTotal,, there are total of 10 security vendors flagged this file as malicious.

  • The analysis of the C2 communication attempts associated with the suspicious extension indicates a high likelihood of malicious intent. The identified connections to chatgptforgoogle.pro, chatgptgoogle.org, and version.chatgpt4google.workers.dev highlight the need for immediate action to mitigate the threat and prevent further compromise.

C2
Accessed C2

Containment Phase

  • We found solid evidence that the Samuel device was compromised. Now, we need to isolate the device from the network in order to prevent the attacker from reaching different devices in the internal network and to break its existing connection.
Containment
Containment

Lesson Learned

  • Vigilant user awareness and caution are of utmost importance during browser extension installations.
  • Maintaining up-to-date software is essential to minimize vulnerabilities and exposure to known exploits
  • Swiftly investigate and respond to any suspicious extension installations.
  • Continuously learn from incidents to adapt and fortify security measures against emerging threats.

Remediation Actions

  • Remove the malicious extension from affected systems.
  • Isolate the compromised machine from the network to prevent the attacker from accessing other resources and systems within the organization.
  • Review and update security configurations to enhance protection against similar threats in the future.
  • Reset affected user accounts, including passwords, and enable two-factor authentication where available

Artifacts

Artifacts
Artifacts

Closed Alert

Containment
Closed Alert

We see our results. Woohoo! All correct! No one is perfect all the time however, and if you missed anything you can always re-investigate the case.

Terminal Shortcuts


Protect Your Digital Presence & Stay Cyber Safe 💙

Thanks🌸