{"id":6329,"date":"2017-01-23T15:50:23","date_gmt":"2017-01-23T23:50:23","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-167\/"},"modified":"2017-01-23T15:50:23","modified_gmt":"2017-01-23T23:50:23","slug":"news-167","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-167\/","title":{"rendered":"Nemucod dot dot..WSF"},"content":{"rendered":"<p>The latest Nemucod campaign shows the malware distributing a spam email attachment with a .wsf extension, specifically ..wsf (with a double dot) extension.<\/p>\n<p>It is a variation of what has been observed since last year (2015) \u2013 the <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">TrojanDownloader:JS\/Nemucod<\/a> malware downloader using JScript. It still spreads through spam email attachment, typically inside a .zip file, using a file name of interest with .js or .jse as extension.<\/p>\n<p>The following screenshots show how the malicious file attachment looks like in the recent campaign:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu1.png\" rel=\"attachment wp-att-8415\"><img loading=\"lazy\" decoding=\"async\" width=\"591\" height=\"399\" title=\"Example of how an email spam containing the latest version of Nemucod might look like\" class=\"aligncenter wp-image-8415 size-full\" alt=\"Example of how an email spam containing the latest version of Nemucod might look like\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu1.png\" \/><\/a><\/p>\n<p><em>Figure 1: Example of how an email spam containing the latest version of Nemucod might look like<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu2.png\" rel=\"attachment wp-att-8425\"><img loading=\"lazy\" decoding=\"async\" width=\"613\" height=\"204\" title=\"Example of how Nemucod malware looks like when extracted and opened with an archive viewer.\" class=\"aligncenter wp-image-8425 size-full\" alt=\"Example of how Nemucod malware looks like when extracted and opened with an archive viewer.\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu2.png\" \/><\/a><\/p>\n<p><em>Figure 2: Example of how Nemucod malware looks like when extracted and opened with an archive viewer<\/em><\/p>\n<h2>What the double dots mean: Social engineering for unsuspecting eyes<\/h2>\n<p>As seen in the following file name samples, the double dot paired with the uncommon .wsf extension creates an illusion that the file name was either abbreviated, was intentionally omitted, or shortened by the system because it was too long:<\/p>\n<ul>\n<li><i><em>profile-d39a..wsf<\/em><\/i><\/li>\n<li><em>profile-e3de..wsf<\/em><\/li>\n<li><em>profile-e7dc..wsf<\/em><\/li>\n<li><em>profile-f8d..wsf<\/em><\/li>\n<li><em>profile-fb50..wsf<\/em><\/li>\n<li><em>spreadsheet_07a..wsf<\/em><\/li>\n<li><em>spreadsheet_1529..wsf<\/em><\/li>\n<li><em>spreadsheet_2c3b..wsf<\/em><\/li>\n<li><em>spreadsheet_36ff..wsf<\/em><\/li>\n<li><em>spreadsheet_3a8..wsf<\/em><\/li>\n<\/ul>\n<p>Some might look at the sample file names and assume that they might originally have been a long unique string identifier consisting of random letters and numbers that could be a transaction ID, receipt number or even user ID:<\/p>\n<ul>\n<li><i><em>profile-d39as1u3e8k9i3m4wsf<\/em><\/i><\/li>\n<li><em>profile-e3dee1uwl8s10f3m4wsf<\/em><\/li>\n<li><em>profile-e7dc4d1u3e83m4wsf<\/em><\/li>\n<li><em>profile-f8dsdwsfe8k4i38wsf<\/em><\/li>\n<li><em>profile-fb50s1u3l8k9i3m4wsf<\/em><\/li>\n<li><em>spreadsheet_07as133e3k9i3e4wsf<\/em><\/li>\n<li><em>spreadsheet_1529s15se8f9i3o6wsf<\/em><\/li>\n<li><em>spreadsheet_2c3bs1u5dfk9i3m6wsf<\/em><\/li>\n<li><em>spreadsheet_36ffs1ure8koei3d5ws<\/em><\/li>\n<li><em>spreadsheet_3a8s1udwsf8s9i323wsf<\/em><\/li>\n<\/ul>\n<p>However, this is not the case. These are script files that might contain malicious code which could harm your system.<\/p>\n<h2>Underneath the WSF<\/h2>\n<p>Windows Scripting File is a text document containing Extensible Markup Language (XML) code. It incorporates several features that offer you increased scripting flexibility. Because Windows script files are not specific to a script language, the underlying code can have either JavaScript or VBScript, depending on language declaration in the file. WSF acts as a container.<\/p>\n<p>Underneath the WSF is the same typical Nemucod JScript code.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu3.png\" rel=\"attachment wp-att-8435\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"582\" title=\"Nemucod code inside WSF: has encrypted code and the decryption is written under @cc_on (conditional compilation)\" class=\"aligncenter wp-image-8435 size-full\" alt=\"Nemucod code inside WSF: has encrypted code and the decryption is written under @cc_on (conditional compilation)\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu3.png\" \/><\/a><\/p>\n<p><em>Figure 3: Nemucod code inside WSF: has encrypted code and the decryption is written under @cc_on (<\/em><em>conditional compilation)<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>This Nemucod version leverages the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/8ka90k2e(v=vs.84).aspx\">@cc_on (conditional compilation)<\/a> command. Such a command can possibly evade AV scanner detection. It tricks the AV scanners to think the command is part of a comment, thus preventing the AV scanners from interpreting it as an executable code.<\/p>\n<p>Upon code decryption, the following URLs &#8211; where the malware payload is being hosted &#8211; are revealed:<\/p>\n<ul>\n<li><i><em>hxxp:\/\/right-livelihoods.org\/rpvch<\/em><\/i><\/li>\n<li><em>hxxp:\/\/nmfabb.com\/rgrna1gc<\/em><\/li>\n<li><em>hxxp:\/\/www.fabricemontoyo.com\/v8li8<\/em><\/li>\n<\/ul>\n<p><strong> <\/strong><\/p>\n<h2>Recent spam campaign and trends<\/h2>\n<p>The latest Nemucod telemetry for the past 15 days shows that it has constantly been active, although there haven\u2019t been any huge spikes.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu4.png\" rel=\"attachment wp-att-8445\"><img loading=\"lazy\" decoding=\"async\" width=\"1088\" height=\"387\" title=\"Daily detection trend for Nemucod. These are the unique machine encounters per day.\" class=\"aligncenter wp-image-8445 size-full\" alt=\"Daily detection trend for Nemucod. These are the unique machine encounters per day\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu4.png\" \/><\/a><\/p>\n<p><em>Figure 4: Daily detection trend for Nemucod. These are the unique machine encounters per day<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu5.png\" rel=\"attachment wp-att-8455\"><img loading=\"lazy\" decoding=\"async\" width=\"1098\" height=\"651\" title=\"Geographic distribution of Nemucod. Data taken from July 3 to July 18, 2016\" class=\"aligncenter wp-image-8455 size-full\" alt=\"Geographic distribution of Nemucod. Data taken from July 3 to July 18, 2016\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu5.png\" \/><\/a><\/p>\n<p><em>Figure 5: Geographic distribution of Nemucod. Data taken from July 3 to July 18,2016<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Other than using ..wsf and @cc_on technique, we\u2019ve also seen different and old tricks used as part of its social engineering tactics. This includes, but is not limited to:<\/p>\n<ul>\n<li>Double extension (for example: <em>&lt;filename&gt;pdf.js<\/em>)<\/li>\n<li>Invoice, receipt, and delivery related file names such as DHL, FedEx delivery, and so forth<\/li>\n<\/ul>\n<h2>Nemucod infection chain<\/h2>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu6.png\" rel=\"attachment wp-att-8465\"><img loading=\"lazy\" decoding=\"async\" width=\"944\" height=\"274\" title=\"Nemucod infection chain showing spam email distributing WSF which downloads and runs malware\" class=\"aligncenter wp-image-8465 size-full\" alt=\"Nemucod infection chain showing spam email distributing WSF which downloads and runs malware\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/nemu6.png\" \/><\/a><\/p>\n<p>Just like the Nemucod campaigns before this, the malware downloader payload includes ransomware, such as:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Ransom:Win32\/Locky<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Cerber\">Ransom:Win32\/Cerber<\/a><\/li>\n<\/ul>\n<h2>Mitigation and prevention<\/h2>\n<p>To avoid falling prey from this new Nemucod malware campaign:<\/p>\n<ul>\n<li>Use an up-to-date real-time antimalware product, such as <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> for Windows 10.<\/li>\n<li><a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-8\/join-maps-community\">Ensure that Microsoft Active Protection Service has been enabled<\/a>.<\/li>\n<li>Use Office 365 Advanced Threat Protection. It has a machine learning capability to help your network administrators <a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">block dangerous email threats<\/a>. See the <a href=\"https:\/\/www.youtube.com\/watch?v=GEE5y9sE_t4\">Overview of Advanced Threat Protection in Exchange: new tools to stop unknown attacks<\/a>, for details.<\/li>\n<li>Be wary of emails with attachments having <em>.wsf<\/em> file extensions. It is uncommon and quite suspicious for people to send legitimate applications with such extensions through email. Attachments with \u201c.wsf\u201d extension and, more importantly, double dot extension are more likely to be dubious. Do not click or open these attachments.<\/li>\n<li>Use the <a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a> to prevent dubious software from running. Add <em>.wsf<\/em> to the file types to block in your AppLocker Group Policy.<\/li>\n<li>Though ransomware and macro-based malware are on the rise, there\u2019s still something that you or your administrators can proactively do:\n<ul>\n<li>Ensure that a strong <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc770394%28v=ws.10%29.aspx\">password policy<\/a> is implemented throughout the enterprise.<\/li>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/02\/24\/locky-malware-lucky-to-avoid-it\/\">Disable the loading of macros in Office programs<\/a>.<\/li>\n<li><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/ee857085.aspx\">Disable macro loading through the Group Policy settings<\/a>.<\/li>\n<li>Keep your software <a href=\"http:\/\/www.microsoft.com\/security\/portal\/definitions\/adl.aspx\">up-to-date<\/a> to mitigate possible software exploits.<\/li>\n<li>Protect derived domain credentials with <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/mt483740%28v=vs.85%29.aspx\">Credential Guard for Windows 10 Enterprise<\/a>.<\/li>\n<li>Secure your code integrity with <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/dn986865%28v=vs.85%29.aspx\">Device Guard for Windows 10 Enterprise<\/a>.<\/li>\n<li><a href=\"http:\/\/download.microsoft.com\/download\/5\/1\/6\/516F59A7-91EE-4463-8612-C85FD3BEBDC7\/pop-securing-lateral-account-movement.pdf\">Secure the lateral account movement in your enterprise<\/a>.<\/li>\n<li>Use two-factor authentication with <a href=\"https:\/\/blogs.windows.com\/buildingapps\/2016\/01\/26\/convenient-two-factor-authentication-with-microsoft-passport-and-windows-hello\/\">Microsoft Passport and Windows Hello<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><em> <\/em><\/p>\n<p><em>Francis Tan Seng and Alden Pornasdoro<br \/> <\/em><em>MMPC<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/07\/23\/nemucod\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest Nemucod campaign shows the malware distributing a spam email attachment with a .wsf extension, specifically ..wsf (with a double dot) extension. It is a variation of what has been observed since last year (2015) \u2013 the TrojanDownloader:JS\/Nemucod malware downloader using JScript. It still spreads through spam email attachment, typically inside a .zip file,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,10871,10846,10927,10851,10928,10929,10510,10518,10833,10930,10931],"class_list":["post-6329","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-javascript","tag-javascript-spam-attachment","tag-js-attachment","tag-nemucod","tag-nemucod-infection-chain","tag-nemucod-mitigation","tag-social-engineering","tag-spam","tag-trojan","tag-windows-scripting-file","tag-wsf"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6329"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6329\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6329"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}