{"id":6334,"date":"2017-01-23T15:50:25","date_gmt":"2017-01-23T23:50:25","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-172\/"},"modified":"2017-01-23T15:50:25","modified_gmt":"2017-01-23T23:50:25","slug":"news-172","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-172\/","title":{"rendered":"The new .LNK between spam and Locky infection"},"content":{"rendered":"<p>Just when it seems the <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Ransom:Win32\/Locky<\/a> activity has slowed down, our continuous monitoring of the ransomware family reveals a new workaround that the authors might be using to keep it going.<\/p>\n<p>The decline in <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> activity can be attributed to the slowdown of detections of <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">Nemucod<\/a>, which <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> uses to infect computers. <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">Nemucod<\/a> is a .wsf file contained in .zip attachments in spam email (see our <a target=\"_blank\" href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/07\/23\/nemucod\/\">Nemucod WSF blog<\/a> for details). <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> has also been previously distributed by exploit kits and spam email attachments with other extensions such as .js, .hta, etc.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1469\" height=\"299\" class=\"alignnone size-full wp-image-9045\" alt=\"The graph shows that Locky machine encounters has recently been low\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk1.png\" \/><\/a><\/p>\n<p><em>Figure 1. The graph shows that <\/em><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\"><em><u>Locky<\/u><\/em><\/a><em> machine encounters has recently been low<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"206\" class=\"alignnone size-full wp-image-9055\" alt=\"Nemucod detection peaked early in October 2016\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk2.png\" \/><\/a><\/p>\n<p><em>Figure 2: Nemucod detection peaked early in October 2016<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>We observed that the <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> ransomware writers, possibly upon seeing that some emails are being proactively blocked, changed the attachment from .wsf files to shortcut files (.LNK extension) that contain PowerShell commands to download and run <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a>.<\/p>\n<p>An example of the spam email below shows that it is designed to feign urgency. It is sent with high importance and with random characters in the subject line. The body of the email is empty.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"545\" class=\"alignnone size-full wp-image-9065\" alt=\"Example of a spam email that could lead to a Locky infection\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk3.png\" \/><\/a><\/p>\n<p><em>Figure 3: Example of a spam email that could lead to a <\/em><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\"><em>Locky<\/em><\/a><em> infection<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The spam email typically arrives with a .zip attachment, which contains the .LNK files. We\u2019ve observed that the attachment is named bill, possibly meant to trick users into thinking it is a bill they need to pay. In opening the .zip attachment, users trigger the infection chain.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"458\" height=\"325\" class=\"alignnone size-full wp-image-9075\" alt=\".LNK file inside the zip attachment\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk4.png\" \/><\/a><\/p>\n<p><em>Figure 4: .LNK file inside the zip attachment<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Inspecting the .LNK file reveals the PowerShell script.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"376\" height=\"520\" class=\"alignnone size-full wp-image-9085\" alt=\"Embedded PowerShell command in the shortcut file\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk5.png\" \/><\/a><\/p>\n<p><em>Figure 5: Embedded PowerShell command in the shortcut file<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>This threat is detected as <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:PowerShell\/Ploprolo.A\">TrojanDownloader:PowerShell\/Ploprolo.A<\/a><u>.<\/u><\/p>\n<p>When the PowerShell script successfully runs, it downloads and executes <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> in a temporary folder (for example, <em>BJYNZR.exe<\/em>), completing the infection chain.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"836\" height=\"114\" class=\"alignnone size-full wp-image-9095\" alt=\"Embedded PowerShell command used to download the payload\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/10\/SPLnk6.png\" \/><\/a><\/p>\n<p><em>Figure 6: Embedded PowerShell command used to download the payload<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The payload malware is the recent version of <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> that has the following characteristics:<\/p>\n<ul>\n<li>Encrypted file extension:\n<ul>\n<li><em>.odin<\/em><\/li>\n<\/ul>\n<\/li>\n<li>Decryption instruction files:\n<ul>\n<li>_440_HOWDO_text.html<\/li>\n<li>_HOWDO_text.bmp<\/li>\n<li>_HOWDO_text.html<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>For details, see the <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Locky\">Win32\/Locky<\/a> family description.<\/p>\n<p>The static configuration inside the binary contains the following information:<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"160\"><strong>Static configuration variables<\/strong><\/td>\n<td width=\"463\"><strong>Values<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"160\">AffiliateId<\/td>\n<td width=\"463\">5<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">DGA seed<\/td>\n<td width=\"463\">74311<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">Language skipped<\/td>\n<td width=\"463\">Russian<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">URL path<\/td>\n<td width=\"463\">\/apache_handler.php<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">Hard coded C&amp;C addresses used<\/td>\n<td width=\"463\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 93.170.104.126<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 185.46.11.73<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">Offline encryption allowed using public key<\/td>\n<td width=\"463\">BgIAAACkAABSU0ExAAgAAAEAAQA7cxE2y7KzaqNzjzvUMZHpLzaCnLlnDkPn3W74o09zNmJNhvjw<\/p>\n<p>qEcwUOJBZmpRCjIoeCnH+NZVPLvdXjfHJGU3WguCLrOE97HEZaXd\/uHW95UE8AZW+r4zPdCClnN1<\/p>\n<p>mfHF+CvvLJGjiTv+8OMJXNxYA\/TJlyXqDhpWarPN79UMGrWApdYkkUiPiN+EBXlJWJsnXfWi5d9N<\/p>\n<p>xrb\/vfPIZIzSXmOkOtEg5D1\/MlElPrKYJ2yXwCAkSWDzeYXU06uIG6OYeCOrxKIy26wYmCdv+7yE<\/p>\n<p>KJ6tXZYH3enbsiwXw+6VR2EAwyD7\/U6GnWq4LTT0M\/u58dY5WlyGuWIvBrzQ2xXO<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The following SHA1s were used in this analysis:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:PowerShell\/Ploprolo.A\">TrojanDownloader:PowerShell\/Ploprolo.A<\/a> &#8211; 3dcf2f116af0a548e88022baa1f41f61f362ae39<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Ransom:Win32\/Locky<\/a> &#8211; c1ee00884c0f872767992d5348e4de576935d8da<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Mitigation and prevention<\/h2>\n<p>To avoid falling prey to this new <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Locky<\/a> ransomware campaign, here are some tips:<\/p>\n<p><strong>For end users<\/strong><\/p>\n<ul>\n<li>Use an up-to-date, real-time antimalware product, such as <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> for Windows 10.<\/li>\n<li>Keep Windows and the rest of your software up-to-date to mitigate possible software exploits.<\/li>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/02\/24\/locky-malware-lucky-to-avoid-it\/\">Disable the loading of macros in Office programs<\/a>.<\/li>\n<li>Think before you click. Do not open emails from senders you don\u2019t recognize.\u00a0 Upload any suspicious files here: <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx\">https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx.<\/a> It is uncommon and quite suspicious for people to send legitimate applications with such extensions through email. Do not click or open such attachments:\n<ul>\n<li><em>Files with<\/em><em> .LNK <\/em><em>extension<\/em><\/li>\n<li><em>Files with<\/em><em>.wsf<\/em> extension<\/li>\n<li><em>Files with<\/em> double dot extension (for example, <em>profile-d39a..wsf)<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>For IT Administrators<\/strong><\/p>\n<ul>\n<li>Use Office 365 Advanced Threat Protection. It has a machine learning capability to help your network administrators <a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">block dangerous email threats<\/a>. See the <a href=\"https:\/\/www.youtube.com\/watch?v=GEE5y9sE_t4\">Overview of Advanced Threat Protection in Exchange: new tools to stop unknown attacks<\/a>, for details.<\/li>\n<li>Use <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> to help detect, investigate, and respond to advanced and targeted attacks on your enterprise networks.<\/li>\n<\/ul>\n<ul>\n<li>Use the <a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a> to prevent dubious software from running. Add <em>.LNK,<\/em><em>.wsf, and ..wsf<\/em> to the file types to block in your AppLocker Group Policy.<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/ee857085.aspx\">Disable macro loading through the Group Policy settings<\/a>.<\/li>\n<\/ul>\n<p>To learn more about what\u2019s new in Windows 10 security, go here: <a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/whats-new\/security\">https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/whats-new\/security<\/a><\/p>\n<ul><\/ul>\n<p>&nbsp;<\/p>\n<p><em>Francis Tan Seng and Duc Nguyen<\/em><em> <\/em><\/p>\n<p><em><em>MMPC<\/em><\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/10\/19\/the-new-lnk-between-spam-and-locky-infection\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just when it seems the Ransom:Win32\/Locky activity has slowed down, our continuous monitoring of the ransomware family reveals a new workaround that the authors might be using to keep it going. The decline in Locky activity can be attributed to the slowdown of detections of Nemucod, which Locky uses to infect computers. Nemucod is a&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10966,10967,10968,10969,10760,10970,10971,10972,10973,3765,10974,10833,10975,10762,10865,10976],"class_list":["post-6334","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-lnk-between-spam-and-locky","tag-lnk-embedded-powershell-command","tag-lnk-embedded-powershell-script","tag-lnk-spam-spreads-locky-infection","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-email-spam","tag-locky-ransomware","tag-nemucod-and-locky","tag-ransomwin32locky","tag-ransomware","tag-spammed-lnk-spreads-locky","tag-trojan","tag-trojandownloaderpowershellploprolo-a","tag-windows-defender","tag-windows-defender-atp","tag-windows-defender-in-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6334"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6334\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6334"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}