{"id":85580,"date":"2018-01-29T15:50:35","date_gmt":"2018-01-29T10:20:35","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85580"},"modified":"2018-01-29T15:50:35","modified_gmt":"2018-01-29T10:20:35","slug":"new-fake-resume-email-campaign-infecting-users-smokeloader-malware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-fake-resume-email-campaign-infecting-users-smokeloader-malware\/","title":{"rendered":"New fake resume email campaign infecting users with the SmokeLoader malware"},"content":{"rendered":"<p>Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns.<\/p>\n<p>To succeed in carrying out an intended malware attack, it is necessary that recipients of the malicious email should trust the email and do what the attacker wants him to do. To achieve this, malware authors continuously employ new tactics to make their malicious emails looks as legitimate as possible.<\/p>\n<p>Quick Heal Security Labs has recently observed a new malicious spam campaign that is spreading the SmokeLoader malware. SmokeLoader is a Trojan downloader malware and is well known for downloading and installing other malware on the infected computer.<\/p>\n<p><strong>Infection routine<\/strong><\/p>\n<p>The attack in this campaign starts with a spam email that pretends to be a \u201cWebsite Job application\u201d. This email contains a password-protected zip file. The password to open the zip file is given in the body of the spam email itself. This trick gives the attacker the following advantages:<\/p>\n<ul>\n<li>The email looks more legitimate to the targeted user<\/li>\n<li>It is difficult for the email protection security modules to scan files inside password-protected zip files.<\/li>\n<\/ul>\n<p>Fig 1 below shows a sample of the email used in this campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85585 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/1.jpg\" alt=\"\" width=\"686\" height=\"443\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/1.jpg 822w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/1-300x194.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/1-768x496.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/1-604x390.jpg 604w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/1-789x510.jpg 789w\" sizes=\"(max-width: 686px) 100vw, 686px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1. Email with a malicious attachment<\/p>\n<p>As we can see in the fig 1, the email is pretending to be a job application email, containing a resume in a zip file. This zip is password-protected. After downloading this zip file, it asks for the password (12345), which is already provided in body of email. After successful extraction, \u201cresume.doc\u201d file is obtained. This doc is a malicious macro laced Word document. If the user tries to run this doc file to view the content, the user is asked to run the macro by clicking the <strong>Enable Content<\/strong> button as shown in fig 2.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85586 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/2.jpg\" alt=\"\" width=\"600\" height=\"324\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/2.jpg 600w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/2-300x162.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: center\">Fig 2. Doc file asking to enable macro<\/p>\n<p>When the user enables the macro by clicking on \u201c<strong>Enable Content\u201d<\/strong>, in the background, a malicious macro gets executed which further launches the PowerShell that requests for the remotely hosted file which downloads and launches the malicious payload on the user\u2019s system.<\/p>\n<p>Fig. 3 below shows the malicious macro code contained in the doc file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85587 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/3.png\" alt=\"\" width=\"744\" height=\"146\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/3.png 939w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/3-300x59.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/3-768x150.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/3-650x127.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/3-789x155.png 789w\" sizes=\"(max-width: 744px) 100vw, 744px\" \/><\/p>\n<p style=\"text-align: center\">Fig 3. Malicious macro code inside doc file<\/p>\n<p>The code mentioned above launches a PowerShell with malicious parameters as shown in fig 4.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85588 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/4.jpg\" alt=\"\" width=\"575\" height=\"92\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/4.jpg 575w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/4-300x48.jpg 300w\" sizes=\"(max-width: 575px) 100vw, 575px\" \/><\/p>\n<p style=\"text-align: center\">Fig 4. PowerShell executing with malicious parameters<\/p>\n<p>If we look closely, the malicious file is hosted as a poop.jpg file on the attacker\u2019s server, which is actually an executable SmokeLoader malware. This file is dropped with the name <strong>DKSPKD.exe<\/strong> at %Temp% location and launched to perform malicious activities.<\/p>\n<p>Some of the significant activities observed during the analysis of this scam campaign are as follows:<\/p>\n<ul>\n<li>The malware scenario is successfully generated on Microsoft Windows 8 and above platform only.<\/li>\n<li>During the execution, the malware kills all the processes related to malware analysis tools and debugger.<\/li>\n<li>Upon successful execution, SmokeLoader can download other malware components on the infected system.<\/li>\n<\/ul>\n<p><strong>Quick Heal detection<\/strong><\/p>\n<p>Quick Heal Browser Protection successfully blocks malicious URLs used to download the payload.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85589 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/5.png\" alt=\"\" width=\"340\" height=\"211\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/5.png 379w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/5-300x186.png 300w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/p>\n<p style=\"text-align: center\">Fig 5: Quick Heal Browsing Protection alert<\/p>\n<p>Quick Heal Virus Protection successfully detects and block malicious document files responsible for delivering the payload into the system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85590 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/6.png\" alt=\"\" width=\"314\" height=\"167\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/6.png 314w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/6-300x160.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/><\/p>\n<p style=\"text-align: center\">Fig 6. Quick Heal Virus Protection alert for doc file<\/p>\n<p>Quick Heal Virus Protection also detects and stops the malicious SmokeLoader payload.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85591 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/7.png\" alt=\"\" width=\"297\" height=\"159\" \/><\/p>\n<p style=\"text-align: center\">Fig 7. Quick Heal Virus Protection alert for malicious payload<\/p>\n<p><strong>Best practices to stay safe from such malware attacks<\/strong><\/p>\n<p><strong>\u00a0<\/strong>Do not download attachments or click on links received from unwanted or unexpected email sources.<\/p>\n<ul>\n<li>Beware of emails that ask you to enable \u2018macros\u2019 to view the content.<\/li>\n<li>Keep your <a href=\"https:\/\/bit.ly\/2ncPU26\">antivirus<\/a> updated and ensure you are using the latest version.<\/li>\n<li>Always keep a secure backup of your important data.<\/li>\n<li>Apply all recommended updates on your Operating System and programs like Adobe, Java, Internet browsers, etc.<\/li>\n<li>Ensure that your computer\u2019s Automatic Updates are enabled.<\/li>\n<\/ul>\n<p><strong>Subject Matter Expert: <\/strong><\/p>\n<p>Gulamgaus Shaikh, Prashil Moon | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended malware attack, it is necessary that recipients of the malicious email should trust the email and [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":85593,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-85580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85580"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85580"}],"version-history":[{"count":3,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85580\/revisions"}],"predecessor-version":[{"id":85592,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85580\/revisions\/85592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85593"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}