On February 1st 2018, malspam delivered a malicious RTF document that tries to exploit Microsoft Office/WordPad via a Buffer Overflow Vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library, CVE-2012-0158. The malicious code can be triggered by a specially crafted DOC or RTF file for un-patched MS Office products.

download.jpg

VirusTotal Analysis of delivery document paymentorder.doc confirms presence of RTF exploit.

1_vtRTF.PNG

2_vtRTF.PNG

After opening the document in a vulnerable Microsoft Word application, a connection is established to “pgamix[.]com” to download a malicious executable payload, using shell code present in RTF file,  which kicks off the following network events.

adwind.png

4_nwjar.PNG

5_nefile.PNG

VirusTotal Analysis of final payload “babawire.jar” confirms that it’s Adwind, a Java based Remote Access Trojan (RAT). Adwind RAT is a multifunctional malware program and it is distributed through a single malware-as-a-service platform.

6_vtPayload.PNG

7_vtpayload.PNG

This file is a compressed stream containing 168 files. It imports multiple java packages required for execution of the Trojan.

8.1_nwfiels.PNG

Current RSA NetWitness detection populates following meta for the download sessions:

10_nwsession1.PNG

11_nwsession2.PNG

Although we didn't achieve a full detonation in our own sandbox, post-infection traffic from  Malware-Traffic-Analysis.net populates following meta for the download sessions with Current RSA NetWitness detection:

12_postinfection.PNG

13_postinfection.PNG

More detailed information about CVE-2012-0158 can be found here:

https://community.rsa.com/community/products/netwitness/blog/2014/02/12/triaging-malicious-microsoft-office-documents-cve-2012-0158 

Thanks go to Kevin Stear and Ahmed Sonbol for contributing to this threat advisory.

 FirstWatch_banner.png

References:

Topic: