{"id":839,"date":"2017-05-22T21:27:54","date_gmt":"2017-05-22T20:27:54","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=839"},"modified":"2017-05-22T21:27:54","modified_gmt":"2017-05-22T20:27:54","slug":"2017-05-22-blankslateglobalimposter-malspam","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=839","title":{"rendered":"2017-05-22 Blankslate\/GlobalImposter Malspam"},"content":{"rendered":"<p>As promised from my last <a href=\"http:\/\/www.herbiez.com\/?p=831\" target=\"_blank\">post<\/a>, here is the write up from running the malicious Javascript in my VM. Initially a couple of us on <a href=\"http:\/\/twitter.com\/HerbieZimmerman\/status\/865584749938700290\" target=\"_blank\">Twitter<\/a> thought that this may be GEO IP specific since they could not get it to run in the US, and nor could I. I could only seem to get it to work when using European endpoints. Turns out that I forgot to delete the *.tmp file that got created when running the Javascript script when I started bouncing around different VPN locations. As of this write-up, I was able to get the malware to run from California and Japan without any issues. <\/p>\n<p>I was also able to find where Brad had seen the same email address in the ransomware note too, which he stated was a BlankSlate malspam campaign using GlobalImposter ransomware. For more information about this check out his blog post <a href=\"http:\/\/www.malware-traffic-analysis.net\/2017\/05\/03\/index2.html\" target=\"_blank\">here<\/a>. I also came across another Tweet from <a href=\"http:\/\/twitter.com\/JAMESWT_MHT\" target=\"_blank\">@JamesWT<\/a> (you should follow him on Twitter) where he came across the malicious domain <a href=\"http:\/\/twitter.com\/JAMESWT_MHT\/status\/865479601547378688\" target=\"_blank\">back on the 19th<\/a> which links over to the Virustotal results <a href=\"http:\/\/www.virustotal.com\/en\/file\/e602813bc553843cf7e6eaffaedbcc16a2268e44fa0626b0f13620e3f29289a8\/analysis\/1495181243\/\" target=\"_blank\">here<\/a>.<\/p>\n<p>Below is a snapshot of what my install of Security Onion saw as well while I was running the malspam on my VM. As noted in the results from Squil, the Javascript script is related to Nemucod as well. Security Onion was using the paid version of the Snort VRT rules. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/SO.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/SO.png\" alt=\"\" width=\"1326\" height=\"349\" class=\"aligncenter size-full wp-image-847\" \/><\/a><\/p>\n<p>With that being said&#8230;<\/p>\n<p>Indicators of Compromise:<br \/>\n=========================<br \/>\n47.91.93.208 \/ pichdollard[.]top (HTTP)<\/p>\n<p>Artifacts<br \/>\n=========<br \/>\nFile name: 4090.js<br \/>\nFile size: 13 KB<br \/>\nMD5: 263726d5c60868300549a9b9682e738b<br \/>\nVirustotal: NA<br \/>\nMalwr: NA<br \/>\nPayload Analysis: NA <\/p>\n<p>File name: 92927.exe<br \/>\nFile size: 233KB<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\<br \/>\nMD5: 1bbd2dc9746292c60121865663b287f2<br \/>\nVirustotal: <a href=\"http:\/\/virustotal.com\/en\/file\/2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234\/analysis\/<\/a><br \/>\nFirst detection: 2017-05-21 16:12:16 UTC<br \/>\nDetection ratio: 25 \/ 61<br \/>\nMalwr: NA<br \/>\nPayload Analysis: NA<\/p>\n<p>File name: qfjgmfgmkj.tmp<br \/>\nFile size: 20B<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Temp\\<br \/>\nMD5: 19bf319ca5b94c8d2ef352c49bbae50e<br \/>\nVirustotal: <a href=\"http:\/\/virustotal.com\/en\/file\/b384f104c0134a0c0e7887e2a312cdabd774d0cf5794288b30b547af38f2dc3f\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/b384f104c0134a0c0e7887e2a312cdabd774d0cf5794288b30b547af38f2dc3f\/analysis\/<\/a><br \/>\nFirst detection: 2017-05-16 11:20:12 UTC<br \/>\nDetection ratio: 0 \/ 56<br \/>\nMalwr: NA<br \/>\nPayload Analysis: NA<\/p>\n<p>File name: hjkhkHUhhjp.bat<br \/>\nFile size: 259B<br \/>\nFile path: C:\\Users\\%username%\\AppData\\Local\\Temp\\<br \/>\nMD5: 6e26f75126c4ccc964d027ab76146482<br \/>\nVirustotal: NA<br \/>\nMalwr: NA<br \/>\nPayload Analysis: NA<\/p>\n<p>Analysis of Malware:<br \/>\n====================<br \/>\nThis is a pretty simple infection chain to say the least. The user received the following email which had a Javascript file in a zip file attached to it. <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Email-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Email-2.png\" alt=\"\" width=\"740\" height=\"392\" class=\"aligncenter size-full wp-image-842\" \/><\/a><\/p>\n<p>Once the Javascript had been executed, there was a single GET request to the site &#8216;pichdollard[.]top\/admin[.]php?f=404&#8217; to download the malicious binary. The file that got downloaded was called &#8220;404&#8221; as seen below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Binary-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Binary-2.png\" alt=\"\" width=\"1775\" height=\"820\" class=\"aligncenter size-full wp-image-840\" \/><\/a><\/p>\n<p>It was then saved to the &#8220;SpecialFolders&#8221; directory called &#8220;Templates&#8221; as [random_number].exe (in this case it was called &#8220;92927.exe&#8221;). For more information about SpecialFolders in Windows, check out the Microsoft MSDN article <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/s2esdf4x(v=vs.100).aspx\" target=\"_blank\">here<\/a>. Once the file had been written to the file-system, the Javascript script proceeded to execute &#8220;92927.exe.&#8221;<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Binary-info.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Binary-info.png\" alt=\"\" width=\"434\" height=\"514\" class=\"aligncenter size-full wp-image-841\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Start-binary.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Start-binary.png\" alt=\"\" width=\"708\" height=\"277\" class=\"aligncenter size-full wp-image-848\" \/><\/a><\/p>\n<p>Once it was up and running, it then created a child process of itself. This process then created the &#8220;qfjgmfgmkj.tmp&#8221; file to show that the malware had run on the system. This is the file that I forgot to delete when I was bouncing between VPN endpoints. This file contained just a simple string &#8211; D1478B8A8D18D838C5AC. If I deleted that file, I was able to re-run the malware without any issues. If the file was left, the binary would not run and would exit out. This child process also kicked off the VSSADMIN.exe process to start deleting the system&#8217;s shadow copies:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Shadow-copy.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Shadow-copy.png\" alt=\"\" width=\"943\" height=\"569\" class=\"aligncenter size-full wp-image-846\" \/><\/a><\/p>\n<p>Once this was done, the 92927.exe process started to encrypt files as seen below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Rename.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Rename.png\" alt=\"\" width=\"939\" height=\"568\" class=\"aligncenter size-full wp-image-845\" \/><\/a><\/p>\n<p>and also created a batch file called &#8220;hjkhkHUhhjp.bat&#8221; that did some cleaning up\/housekeeping on the VM.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n:Repeat\r\ndel &quot;C:\\Users\\Bill\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\986444.exe&quot;\r\nif exist &quot;C:\\Users\\Bill\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\986444.exe&quot; goto Repeat\r\nrmdir &quot;C:\\Users\\Bill\\AppData\\Roaming\\Microsoft\\Windows\\Templates&quot;\r\ndel &quot;C:\\Users\\Bill\\AppData\\Local\\Temp\\hjkhkHUhhjp.bat&quot;<\/pre>\n<p>The odd thing with this one is that I never got the pop-up alerting me to the fact that the system had been infected and that the files were encrypted. There was no change of my desktop, or anything of the sort. It wasn&#8217;t until I noticed the file extension &#8220;.crypt&#8221; on files when I was browsing around directories and also when I saw the HTML instructions file called &#8220;how_to_back_files.html&#8221; in one of the directories.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/File-encrypted.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/File-encrypted.png\" alt=\"\" width=\"1192\" height=\"491\" class=\"aligncenter size-full wp-image-844\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Encrypted.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2017\/05\/Encrypted.png\" alt=\"\" width=\"2263\" height=\"1287\" class=\"aligncenter size-full wp-image-843\" \/><\/a><\/p>\n<p>You can find the artifacts, PCAP, and ProcMon logs from this investigation over on my Github account <a href=\"http:\/\/github.com\/bloomer1016\/2017-05-22-Blankslate-GlobalImposter-Malspam\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As promised from my last post, here is the write up from running the malicious Javascript in my VM. Initially a couple of us on Twitter thought that this may be GEO IP specific since they could not get it to run in the US, and nor could I. I could only seem to get it to work when using European endpoints. Turns out that I forgot to delete the *.tmp file that got created when running the Javascript script when I started bouncing around different VPN locations. As of this write-up, I was able to get the malware to&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=839\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-839","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=839"}],"version-history":[{"count":4,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/839\/revisions"}],"predecessor-version":[{"id":852,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/839\/revisions\/852"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}