A user received malspam with a .doc attachment. Static analysis of the file showed it was a Microsoft Word 2007+ document with an embedded macro located in vbaProject.bin.
The malware authors trick victims into enabling macros (Enable Content) and, to better evade sandboxes, use AutoClose to execute the macro after the file has been closed.
Dynamic analysis of the code via a debugger quickly shows the string we’re looking for:
After closing the document, we can see the GET request to sukiebuchnieohuelivobos[.]com/AFK/lima.php?utma=versusf:
The User-Agent string used for this request was “Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3)”. Furthermore, you can see the script returned by the remote server in the image above.
Decoding it shows the following PowerShell command:
The GET requests are shown below:
The GET request for sukiebuchnieohuelivobos[.]com/AFK/versusf.pfx returns the malware payload:
The GET request for sukiebuchnieohuelivobos[.]com/s.php?id=versusf simply returned “tid=versusf”.
The GET request for cash4lcd[.]com/Stat.counter returned the following command:
This generated the GET request for workswell[.]at/images/1300.exe:
Both payloads were downloaded to %AppData% and then detonated:
For persistence, 661.exe sets autostart registry key “HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Appltdll:
Process 661.exe then created a copy of itself at “C:\Users\<User>\AppData\Roaming\Microsoft\BtpamRes\BthTtons.exe”:
661.exe creates a .bat file in a folder in %Temp%, writes to it, and then creates process cmd.exe. Process cmd.exe then reads from the .bat file, spawns cmd.exe as a child process, and then uses that to detonate BthTtons.exe. Process BthTtons.exe eventually deletes 661.exe.
Below is the process tree, which might give you a better understanding of what happened:
Post-infection traffic shows follow-up GET requests:
These GET requests appear to download files associated with the Tor functionality.
There is also this registry entry at HKCU\SOFTWARE\AppDataLow\Software\Microsoft\:
DNS queries and responses:
Some post-infection traffic:
More post-infection traffic found in the VT report:
File name: malspam.doc
File name: 62f5e05a.exe
File name: 661.exe
Network Based IOCs:
- sukiebuchnieohuelivobos.com – GET /AFK/lima.php?utma=versusf
- sukiebuchnieohuelivobos.com – GET /AFK/versusf.pfx
- sukiebuchnieohuelivobos.com – GET /s.php?id=versusf
- cash4lcd.com – GET /Stat.counter
- www.workswell[.]at – GET /images/1300.exe
- www.dietaesaluteonline[.]it – GET /api/456.bin
- dipnavaseauto.xf.cz – GET /p.png
- mogolik.at – GET /assets/images/[removed]/C_2F_2Bm.jpeg
- mogolik.at – POST /assets/images/[removed]/_2BHk.gif
- classypetshop.com – GET /include/p1.pif
Password is “infected”