Loading...

Command Evade Turla Kazuar Loader

Command Evade Turla Kazuar Loader

The Turla group, a long‑standing threat actor with a history of sophisticated operations, has recently deployed a new loader that demonstrates advanced evasion techniques. The loader, which we refer to as the Turla Kazuar v3 Loader, is a multi‑stage infection chain that leverages legitimate Windows components, COM integration, and memory‑resident execution to deliver a backdoor with minimal footprint and high stealth. This report provides a comprehensive analysis of the loader’s architecture, its evasion methods, and recommendations for detection and mitigation.

Infection Chain Overview

The loader’s lifecycle begins with a seemingly innocuous VBScript file that drops a legitimate Hewlett‑Packard printer driver installer and a native loader DLL into the victim’s local application data folder. The script then executes the installer, which in turn runs the native loader, hpbprndiLOC.dll. The native component is responsible for performing security bypasses, including AMSI and ETW blinding, and for orchestrating the transition to a COM‑visible .NET assembly. This assembly acts as a bridge that decrypts and loads three modular .NET backdoor components – KERNEL, WORKER, and BRIDGE – directly from memory.

Stage One: VBScript Dropper

The VBScript file, named 8RWRLT.vbs, is the initial foothold. It creates a nested directory under %LOCALAPPDATA% that mimics a legitimate HP printer driver installation path. Within this directory, the script drops the HP driver installer (hpbprndi.exe) and the encrypted payloads jayb.dadk, kgjlj.sil, and pkrfsu.ldy. After installation, the script launches the installer which executes the native loader DLL. The script also writes a persistence registry key under HKCU\Software\Classes\CLSID and sets a Run key in HKCU\Software\Microsoft\Windows\CurrentVersion\Run to ensure the loader re‑executes on reboot.

Stage Two: Native Loader and Security Bypass

The native loader, hpbprndiLOC.dll, is a 32‑bit DLL that performs a series of low‑level bypasses. It uses vectored exception handling and the NtContinue API to temporarily disable AMSI and ETW monitoring, effectively blinding local security telemetry. The loader also employs a sophisticated control‑flow redirection technique that exploits the MFC satellite DLL loading mechanism. By registering itself as a side‑loaded component, the loader hands control to a COM‑visible .NET assembly without invoking standard file system APIs, thereby evading many endpoint detection systems.

Stage Three: COM‑Visible .NET Bridge

The COM‑visible .NET assembly, jtjdypzmb.yqg, is a small wrapper that bridges the unmanaged loader to the managed Kazuar payloads. The assembly is registered under HKCU and HKLM CLSID keys, pointing to mscoree.dll with an InprocServer32 surrogate. When CoCreateInstance is called, Windows spawns a dllhost surrogate that loads the .NET runtime and the assembly into a sandboxed AppDomain. The assembly’s public method, EeseOleAscaUtcent, receives the encrypted payload bytes and a cryptographic seed, then performs AES‑CBC decryption followed by raw inflation. The resulting .NET executables – KERNEL, WORKER, and BRIDGE – are then loaded into memory and executed via dllhost, attributing the malicious activity to the surrogate process.

Stage Four: Kazuar v3 Backdoor Modules

The three Kazuar modules are modular .NET executables that perform distinct functions. The KERNEL module orchestrates keylogging, credential theft, and configuration management. The WORKER module monitors system defenses and maintains persistence, while the BRIDGE module handles outbound communication. The BRIDGE module uses compromised WordPress plugin URLs to exfiltrate data from the local data directory, which is stored under C:\ProgramData\WindowsGraphicalDevice. The agent label AGN‑RR‑01 is embedded in each module, indicating the backdoor’s classification.

Detection and Mitigation

Detection of the Turla loader requires a multi‑layered approach. First, monitor for the creation of the HP printer driver directory and the presence of the hpbprndiLOC.dll file. Second, watch for anomalous COM registrations under HKCU and HKLM CLSID keys that reference mscoree.dll surrogates. Third, implement endpoint detection that flags the use of vectored exception handlers and the NtContinue API, which are strong indicators of AMSI/ETW bypass attempts. Finally, block outbound traffic to the known C2 WordPress plugin domains and enforce strict application whitelisting for .NET assemblies.

Conclusion

The Turla Kazuar v3 Loader showcases a highly sophisticated infection chain that blends legitimate components with advanced evasion techniques. By leveraging COM, MFC sideloading, and in‑memory decryption, the loader achieves a high level of stealth and resilience. Organizations should adopt comprehensive detection strategies that include monitoring for anomalous COM activity, enforcing strict application whitelisting, and maintaining robust endpoint telemetry to counter this evolving threat.

Leave a Reply

Looking for the Best Cyber Security?

Seamlessly integrate local and cloud resources with our comprehensive cybersecurity services. Protect user traffic at endpoints using advanced security solutions like threat hunting and endpoint protection. Build a scalable network infrastructure with continuous monitoring, incident response, and compliance assessments.

Contact Us

Copyright © 2025 ESSGroup

Discover more from ESSGroup

Subscribe now to keep reading and get access to the full archive.

Continue reading