I wanted to alert everyone of a new malware distributing SPAM campaign that I just received that contains a password protected Word document, which pretends to be about a payment I would be receiving shortly. As I always love free money, I had to take a look and see what I was getting for free.
The SPAM emails are being sent with a subject like "Important Information from Troy Watt", with the names most likely being different between recipients. These emails then contain a password protected Word docx attachment with names like l_%74kk03ca52q_Troy Watt.docx.
You may wondering what use is a password protected word document if the recipient doesn't know the password. Well, you have nothing to fear as our buddy Troy decided to include that in his email to me:
Good morning
This contact details ([recipient_email]) was specified as the recipient of the payment. The Transaction should appear in 1 days.
The Passwd is 0qArccIMK. You need to paste it to be able to open the document.
Troy Watt

So I fired up a virtual machine to take a look at what happens when I open up this document about all the moolah I would be receiving and see the password prompt Troy helpfully told me about.

I entered the password, and sadly I do not see anything about money being sent to me. Instead, I see 4 embedded documents waiting to be clicked on. One of these must be about the payment I was receiving, right?

When I clicked on them, though, Troy tricked me and instead a JS file wanted to execute! Well, my money must be in there, so I clicked on the Open button.

This obfuscated Javascript file, which I found in the %Temp% folder, is then executed by wscript.exe.

This JS file essentially downloads a DLL file from one of the following three URLS and saves it to %AppData%.
46.17.40.142/45.txt
www.afripaper.co.za/Readme.txt
vreken.co.za/php.txt
Once downloaded, the dll is executed by regsvr32.exe and strangely, what appears to be a debug alert is displayed to indicate the DLL was successfully executed.

As you can see, these DLL files are installed into and loaded from the %AppData% folder and will have the ogg extension and a random numeric name. For example, 35116.ogg as seen in the alert above.
Unfortunately, I could not figure out what this thing does, but I have to assume Troy tricked me and its not transferring money into my account. Furthermore, the DLL is only 4KB in size, which is quite small, and has very few viewable strings without being unpacked.

According to security researcher -0day, this campaign is installing the Ursniff keylogger and data stealing Trojan. It also turns out I wrote about this back in April and forgot. Oops.
The takeaway from this article is to be careful and not open any password protected document unless you are expecting them and know who they are coming from.
Updated 7/12/17 4:05 PM EST: 0day tweeted today that this was the Ursniff keylogger being installed.
IOCs
Hashes:
JS File: https://www.virustotal.com/en/file/f1bf6cb221a30f1bd960ccdd98b53844a5c8032769f208ea40258f9ce562a3f2/analysis/
DLL File: https://www.virustotal.com/en/file/4271e0ea664064acc651bf463c41ec5818e00776323e67971634e27c99d91b46/analysis/
Docx File: https://www.virustotal.com/en/file/319c106ada3e496a31ecf6d86606c7564d4efaeee34a8074b94d71d2d141020b/analysis/1499883911/
Network Connections:
46.17.40.142/45.txt
www.afripaper.co.za/Readme.txt
vreken.co.za/php.txt
Files:
%AppData%\[random].ogg
Comments
Kate82 - 7 years ago
Isn't it better to just use a spam filter for all your devices?
Angoid - 7 years ago
I think the point is this: spam filters sometimes report "false positives" - that is, messages marked as spam that are not spam and also "false negatives" - messages not marked as spam which should be.
Yes, this is a spam email. It is an example of social engineering, probably designed to get round spam filters. Result: It gets delivered right into your inbox.
Some anti-virus software (and even email software) will block encrypted attachments on the basis that, if they cannot get in to see what the attachment is, then it must be dangerous. Clearly this is not always true but it could be that this malicious 'document' is encrypted to prevent AV packages from picking up on the fact that it contains malicious scripts.
There are no substitutes for vigilance and common sense. Common sense dictates that you do run anti-virus software, spam filters, a firewall and other security software but it also mandates that you do not rely on it 100%.
Bottom line: If it looks too good to be true, it probably is.
woody188 - 7 years ago
Got a few of these today. Same exact email body just a different name in the FROM and SUBJECT. Ours turned out to be an xls file dropped after the password protected docx file was opened. It failed in my sandbox but I had enough to know we were not getting any funds deposited and marked the file hash as malicious. :)
Had another URSNIFF/Dreambot this week that had a JS file embedded in two archive files. No subject, just looked like a reply email with this ZIP attachment. Of course someone had to open it and run the JS file so they could know what the person sent. ID 10 T
achzone - 7 years ago
Great heads up article. Thanks for sharing!
Occasional - 7 years ago
Don't have a sandbox to play with these. Thanks for showing what I missed.
Curious, though, that with Troy's namesake, the trick horse was incoming, not outgoing - Ah! that must be how he was able to trick a guy as savvy as LA!