On September 27th, malspam delivered a malicious RTF document that tries to exploit Microsoft Office/WordPad via a Remote Code Execution (RCE) Vulnerability in the Windows API, CVE-2017-0199.

VirusTotal Analysis of delivered document confirms presence of RTF exploit.

docVT2.PNG

docVT1.PNG

After opening the document in a vulnerable Microsoft Word application, users are warned that the document is attempting to download externally linked files.

screen_1.png

Upon clicking "Yes", and a direct to IP connection to 173.44.42[.]164 is established and the following network events take place.

nwtree.1PNG.PNG

As shown above, "3Pxi69djmwiIKmc.hta" (VirusTotal and Hybrid-Analysis) was the first download.  This file creates two XMLHTTP objects using VBScript which helps to connect and download VBS file which acts as Trojan Downloader.  It also creates Shell object to execute HTA file as Internet Explorer Application.

nwhta1.PNG

Next, a VBS script, "Km1Dizoq3Jxz.vbs", (VirusTotal  and Hybrid Analysis) uses obfuscated code to create paths from which executable “UvnG1Oz9d0.exe” is downloaded and executed.

vbsscriptnw.PNG

In the same session, "nJwsm39La.html” then deletes both the VBS and executable file.

filevbs.PNG

vbsdeletenw.PNG

VirusToatal Analysis of the payload, “UvnG1Oz9d0.exe”, (VirusTotal  and Hybrid-Analysis) confirms that it is Quasar Spyware, a Remote Access Trojan (RAT).

exenw.PNG

Once the download is complete, the binary is executed and post-infection traffic started.

quasar-traffic-1.png

quasar-traffic-2.png

Current RSA NetWitness detection populates following meta for the download sessions:

meta3.PNG

meta2.PNG

You can also check FirstWatch recent threat advisory on the recent uptick in malspam attempting to exploit CVE-2017-0199, https://community.rsa.com/community/products/netwitness/blog/2017/08/31/malspam-and-cve-2017-0199

Thanks go to Ahmed Sonbol and Kevin Stear for contributing to this threat advisory.

FirstWatch_banner.png

Topic: