{"id":6340,"date":"2017-01-23T15:50:27","date_gmt":"2017-01-23T23:50:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-178\/"},"modified":"2017-01-23T15:50:27","modified_gmt":"2017-01-23T23:50:27","slug":"news-178","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-178\/","title":{"rendered":"Fake fax ushers in revival of a ransomware family"},"content":{"rendered":"<p>&#8220;Criminal case against you&#8221; is a message that may understandably cause panic. That\u2019s what a recent spam campaign hopes happens, increasing the likelihood of recipients\u00a0opening the malicious attachment.<\/p>\n<p>We recently discovered a new threat that uses email messages pretending to be fax messages, but in truth deliver a ransomware downloader. The attachment used in this campaign, &#8220;Criminal Case against_You-O00_Canon_DR-C240IUP-4VF.rar&#8221;, is password-protected RAR archive file that, when extracted, is a trojan detected as <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">TrojanDownloader:JS\/Crimace.A<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"440\" height=\"480\" class=\"alignnone wp-image-9465 size-full\" alt=\"Email message masquerading as a fax but carrying TrojanDownloader:JS\/Crimace.A as attachment \" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/crimace-spam-email.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 1. Email message masquerading as a fax but carrying <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\"><u><span style=\"color: #0066cc\">TrojanDownloader:JS\/Crimace.A<\/span><\/u><\/a> as attachment<\/em><\/p>\n<p>The malicious email ticks all the boxes to fake a fax:<\/p>\n<ul>\n<li>The subject is a simple &#8220;PLEASE READ YOUR FAX T6931&#8221;<\/li>\n<li>The message body lists fax protocol, date and time, fax channel and number of pages<\/li>\n<li>The attachment file name spoofs a popular fax machine brand<\/li>\n<li>The attached archive file contains a file that has the fake meta-data &#8220;&#8212;RAW FAX DATA&#8212;&#8220;<\/li>\n<\/ul>\n<p>The use of a password-protected RAR file attachment is a clear attempt to evade AV scanners. The password is provided in the email message body. The archive file contains no fax, but <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">Crimace<\/a>, a malicious Windows Script File (.WSF) developed in JScript.<\/p>\n<p>When the recipient falls for the lure and opens the attachment, <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">Crimace<\/a> displays the following message to complete the fax pretense:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"358\" height=\"137\" class=\"alignnone wp-image-9445 size-full\" alt=\"Crimace displays a message to signify the fake fax cannot be displayed\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/crimace-message.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 2. <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">Crimace<\/a> displays a message to signify the fake fax cannot be displayed<\/em><\/p>\n<p>Unsuspecting victims might think that is the end of it. But <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">Crimace<\/a> goes ahead with its intention to download its payload, a ransomware detected as <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/WinPlock.B\">Ransom:Win32\/WinPlock.B<\/a>.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/WinPlock.B\">WinPlock<\/a> is a family of ransomware that has been around since September 2015 but did not have significant activity until recently. The discovery of this new variant signals that it\u2019s back to wreak havoc.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/WinPlock.B\">Ransom:Win32\/WinPlock.B<\/a> can search for and encrypt a total of 2,630 file types.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"599\" class=\"alignnone wp-image-9475\" alt=\"Ransom:Win32\/WinPlock.B\u2019s ransom note contains instructions to pay\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-ransom-1.png\" \/><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-ransom-1.png\"><\/a><\/p>\n<p style=\"text-align: left\"><em>Figure 3. <u><span style=\"color: #0066cc\">Ransom:Win32\/WinPlock.B<\/span><\/u>\u2019s ransom note contains instructions to pay<\/em><\/p>\n<p>It asks for a ransom of .55 Bitcoin, which the ransom note indicates as converting to ~US$386. However, using current conversion rates, it converts a little higher:<\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" width=\"538\" height=\"118\" class=\"alignnone wp-image-9515 size-full\" alt=\"Bitcoin to US Dollar conversion on November 11, 2016 shows a higher rate than what is indicated in the ransom note\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-bitcoin-us-dollar-conversion.png\" \/><em><\/em><\/p>\n<p style=\"text-align: left\"><em>Figure 4. Bitcoin to US Dollar conversion on November 15, 2016 shows a higher rate than what is indicated in the ransom note (data from Coinbase)<\/em><\/p>\n<p>Interestingly, when this ransomware family was first discovered in September 2015, it asked for ransom of 1 Bitcoin, which at the time converted to ~US$300. The market has changed since then, with more and more ransomware families and better technologies to detect ransomware. The increase in ransom amount indicates the actors behind this ransomware family are tracking Bitcoin exchange rates, and aim for potentially bigger gain.<\/p>\n<p>And, just like the fake fax that delivers <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">Crimace<\/a>, <u><span style=\"color: #0066cc\">Ransom:Win32\/WinPlock.B<\/span><\/u> attempts to cause panic by setting a timer that gives a victim 120 hours to pay the ransom:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"158\" height=\"177\" class=\"alignnone wp-image-9505 size-full\" alt=\"data:text\/mce-internal,content,%3Cimg%20width%3D%22538%22%20height%3D%22118%22%20class%3D%22alignnone%20size-full%20wp-image-9515%22%20alt%3D%22Bitcoin%20to%20US%20Dollar%20conversion%20on%20November%2011%2C%202016%20shows%20a%20higher%20rate%20than%20what%20is%20indicated%20in%20the%20ransom%20note%22%20src%3D%22https%3A\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-bitcoin-us-dollar-conversion.png%22%20\/%3E\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-timer.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 5. <u><span style=\"color: #0066cc\">Ransom:Win32\/WinPlock.B<\/span><\/u> sets a timer<\/em><\/p>\n<h2>TrojanDownloader:JS\/Crimace.A has a lot of functions to download and execute<\/h2>\n<p><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">TrojanDownloader:JS\/Crimace.A<\/a> arrives as a malicious .WSF file contained in a RAR archive attached to emails:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"474\" class=\"alignnone wp-image-9415\" alt=\"The attachment is a RAR archive containing a malicious .WSF file\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/crimace-archive-1024x606.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 6. The attachment is a RAR archive containing a malicious .WSF file<\/em><\/p>\n<p>Inspecting the .WSF file shows that it is obfuscated script file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"343\" class=\"alignnone wp-image-9455\" alt=\"crimace-obfuscated-script\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/crimace-obfuscated-script-1024x440.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 7. The .WSF file before\u00a0unobfuscated form<\/em><\/p>\n<p>Decrypting the file reveals a lot of suspicious functions including download and execute capabilities:<\/p>\n<ul>\n<li>function CheckWSFInAutorun()<\/li>\n<li>function CheckWSFInFolder()<\/li>\n<li>function CopyWSFToFolder()<\/li>\n<li>function DecRequest()<\/li>\n<li>function Download()<\/li>\n<li>function EncRequest()<\/li>\n<li>function Execute()<\/li>\n<li>function GetCurrentFile()<\/li>\n<li>function GetInstallPath()<\/li>\n<li>function GetRandHASH()<\/li>\n<li>function GetRandomName()<\/li>\n<li>function GetStrHASH()<\/li>\n<li>function GetWSFGuid()<\/li>\n<li>function HTTPRequest()<\/li>\n<li>function HTTPRequestRaw()<\/li>\n<li>function IsUserAdmin()<\/li>\n<li>function MakeAutorun()<\/li>\n<li>function SelfDelete()<\/li>\n<li>function UnitChange()<\/li>\n<li>function UnitPing()<\/li>\n<li>function UnitRequest()<\/li>\n<\/ul>\n<p>The header of the file is its configuration code and is embedded on the file as an array:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"329\" class=\"alignnone wp-image-9425\" alt=\"The header of the decrypted script is the configuration code\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/crimace-decrypted-1024x421.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 8. The header of the decrypted script is the configuration code<\/em><\/p>\n<p>When decrypted, the configuration includes data including campaign number, download links, and installation paths:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"373\" class=\"alignnone wp-image-9435 size-full\" alt=\"Decrypted configuration\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/crimace-decrypted-header.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 9. Decrypted configuration<\/em><\/p>\n<h2>Ransom:Win32\/WinPlock.B encrypts 2,620 file types<\/h2>\n<p><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/WinPlock.B\">Ransom:Win32\/WinPlock.B<\/a> is downloaded by <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Crimace.A\">Crimace<\/a> as a Nullsoft Scriptable Install System (NSIS) package. Once executed it may create the following desktop shortcut:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"89\" height=\"89\" class=\"alignnone wp-image-9565 size-full\" alt=\"NSIS package icon used by malware\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-nsis-icon.png\" \/><\/p>\n<p style=\"text-align: left\"><em>Figure 10. NSIS package icon used by malware<\/em><\/p>\n<p>When the malicious file is extracted from the NSIS package, it uses the following icon:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"75\" class=\"alignnone wp-image-9545 size-full\" alt=\"Icon used by malware after extraction from package\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-icon.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 11. Icon used by malware after extraction from package<\/em><\/p>\n<p>The malware\u2019s file information also shows campaign ID as internal name and version:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"398\" height=\"176\" class=\"alignnone wp-image-9535 size-full\" alt=\"The malware file information \" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-file-info.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 12. The malware file information<\/em><\/p>\n<p>When successfully executed, <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/WinPlock.B\">Ransom:Win32\/WinPlock.B<\/a> encrypts files with extensions in its list of 2,630. Notably, the ransom note contains an email address to contact for support. It asks for ransom of .55 Bitcoins.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"597\" class=\"alignnone wp-image-9485\" alt=\"Ransom:Win32\/WinPlock.B\u2019s ransom note contains support information\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-ransom-2.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 13. <u><span style=\"color: #0066cc\">Ransom:Win32\/WinPlock.B<\/span><\/u>\u2019s ransom note contains support information<\/em><\/p>\n<p>The ransom note also lists websites where victim can buy Bitcoins:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"598\" class=\"alignnone wp-image-9495\" alt=\"Ransom:Win32\/WinPlock.B\u2019s ransom note lists information for acquiring Bitcoins\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-ransom-3.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 14. <u><span style=\"color: #0066cc\">Ransom:Win32\/WinPlock.B<\/span><\/u>\u2019s ransom note lists information for acquiring Bitcoins<\/em><\/p>\n<p>Clicking the &#8220;Show files&#8221; lists all the encrypted files. Unlike other ransomware, <u><span style=\"color: #0066cc\">Ransom:Win32\/WinPlock.B<\/span><\/u> does not change the extension of the encrypted files:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"142\" class=\"alignnone wp-image-9555 size-full\" alt=\"List of encrypted files \" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-list-encrypted.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 15. List of encrypted files<\/em><\/p>\n<p>It also creates additional files to remind users that their computer is infected:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"588\" height=\"129\" class=\"alignnone wp-image-9525 size-full\" alt=\"The malware creates additional files to indicate that files have been encrypted\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/winplock-addl-files.png\" \/><\/p>\n<p style=\"text-align: left\"><em> Figure 16. The malware creates additional files to indicate that files have been encrypted<\/em><\/p>\n<h2>Prevention and mitigation<\/h2>\n<p>To avoid falling prey to this new ransomware campaign, here are some tips:<\/p>\n<p><strong> For end users<\/strong><\/p>\n<ul>\n<li>Use an up-to-date, real-time antimalware product, such as <a target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> for Windows 10.<\/li>\n<li>Keep Windows and the rest of your software up-to-date to mitigate possible software exploits.<\/li>\n<li>Think before you click. Do not open emails from senders you don\u2019t recognize.\u00a0 Upload any suspicious files here: <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx\">https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx<\/a>. This campaign uses a RAR archive file, which may be a common attachment type, but it contains a .WSF file. Be mindful of what the attachment is supposed to be (in this case, a fax) and the actual file type (a script).<\/li>\n<\/ul>\n<p><strong>For IT Administrators<\/strong><\/p>\n<ul>\n<li>Use Office 365 Advanced Threat Protection. It has a machine learning capability to help your network administrators <a target=\"_blank\" href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">block dangerous email threats<\/a>. See the <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=GEE5y9sE_t4\">Overview of Advanced Threat Protection in Exchange<\/a>: new tools to stop unknown attacks, for details.<\/li>\n<li>Use <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> to help detect, investigate, and respond to advanced and targeted attacks on your enterprise networks.<\/li>\n<li>Use the <a target=\"_blank\" href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a> to prevent dubious software from running.<\/li>\n<\/ul>\n<h2>Additional information<\/h2>\n<p>To learn more about how Microsoft protects you from ransomware, you can read the following:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/whats-new\/security?f=255&amp;MSPPError=-2147217396http:\/\/wincom.blob.core.windows.net\/documents\/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf\">Ransomware protection in Windows 10 Anniversary Update (PDF)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/blogs.windows.com\/business\/2016\/11\/11\/defending-against-ransomware-with-windows-10-anniversary-update\/#V0eUZQohUKYcrYlE.97\">Defending against ransomware with Windows 10 Anniversary Update<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/whats-new\/security?f=255&amp;MSPPError=-2147217396http:\/\/wincom.blob.core.windows.net\/documents\/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf\">What&#8217;s new in Windows 10 security<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Francis Tan Seng<\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/11\/15\/fake-fax-ushers-in-revival-of-a-ransomware-family\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Criminal case against you&#8221; is a message that may understandably cause panic. That\u2019s what a recent spam campaign hopes happens, increasing the likelihood of recipients\u00a0opening the malicious attachment. We recently discovered a new threat that uses email messages pretending to be fax messages, but in truth deliver a ransomware downloader. The attachment used in this&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10807,10760,11008,10812,11009,10803,10516,10700,10831,11010,3765,1931,10518,10833,11011,10761,10762,10787,11012],"class_list":["post-6340","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-crimace","tag-enterprise-software-security","tag-fake-fax","tag-malware-research","tag-microsoft","tag-microsoft-edge","tag-mmpc","tag-ransomwin32winplock-b","tag-ransomware","tag-research","tag-spam","tag-trojan","tag-trojandownloaderjscrimace-a","tag-windows-10","tag-windows-defender","tag-windows-defender-for-windows-10","tag-winplock"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6340"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6340\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6340"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}