On October 19th 2017, an unknown malspam campaign delivered a malicious RTF document, “Inquiry_list.doc”, which attempts to exploit Microsoft Office/WordPad via a Remote Code Execution (RCE) vulnerability in the Windows API, CVE-2017-0199.  

 

vt-doc.PNG

vt2-doc.PNG

After opening the document via a vulnerable Microsoft Word application, a connection is established to “wizkiddz[.]xyz” to download a malicious DOT file, "dotenq.dot", which kicks off the following network events.

file-dot-nw.PNG

tree-nw.PNG

 

This DOT file contains obfuscated code, which downloads a malicious HTA, “htaenq.hta”, from same domain.

file-dot2-nw.PNG

file-hta-nw.PNG

 

This HTA file then uses Base64 obfuscated code to spawn powershell and create a shell object in order to download the final payload, “enq.exe”, and then close the browser window automatically.

file-hta3-nw.PNG

file-exe-nw.PNG

file-exe2-nw.PNG

 

This final payload, “enq.exe”, is a Fareit Trojan, a commodity malware info-stealer often seen with Zeus/ZBOT campaigns.

file-exe3-vt.PNG

file-exe4-vt.PNG

file-exe5-vt.PNG

Current RSA NetWitness detection populates following meta for the download sessions:

preinfection-meta1.PNG

preinfection-meta2.PNG

Once the download is complete, the binary is executed and post-infection traffic started.

postinfection.PNG

Current RSA NetWitness detection populates following meta for Post Infection traffic:

post-infection-meta1.PNG

post-infection-meta2.PNG

Thanks go to Ahmed Sonbol and Kevin Stear for contributing to this threat advisory.

47874-wb-net-FirstWatch-banner-1792x98.png

Topic: