{"id":87818,"date":"2019-06-21T14:45:28","date_gmt":"2019-06-21T09:15:28","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87818"},"modified":"2019-06-21T17:16:42","modified_gmt":"2019-06-21T11:46:42","slug":"beware-email-attachments-can-make-victim-spear-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-email-attachments-can-make-victim-spear-phishing-attacks\/","title":{"rendered":"Beware! Email attachments can make you victim of spear phishing attacks"},"content":{"rendered":"<p>In the last few months,\u00a0we\u2019ve seen a sudden increase\u00a0in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses\u00a0social engineering tricks and some business transactions or deals to entice end user in believing that the email message is genuine and from a known person or contact.\u00a0The agenda of these emails, like any other cyber fraud, is to either gain access to the user\u2019s system or obtain other classified information. Spear phishing is considered as one of the most successful cyber-attack techniques because of the superior level of personalization done to attack users, which makes it highly believable.<\/p>\n<p><strong><b>Technical Details<\/b><\/strong><strong><b>:<\/b><\/strong><\/p>\n<p>The entry point for this infection chain is a benign looking email with an XLS file as an attachment. The attachment names look like\u00a0some\u00a0Important Notifications\/Updates related to private operation, government source. Due to this, the victim would try to open this type of attachments. When the recipient opens the XLS attachment, it prompts the user to enable macro in excel.<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/first-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87824 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/first-1.png\" alt=\"\" width=\"650\" height=\"453\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/first-1.png 949w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/first-1-300x209.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/first-1-768x536.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/first-1-559x390.png 559w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/first-1-789x550.png 789w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 1. XLS file (Enable Macro Prompt)<\/p>\n<p>Once the user clicks on the \u201cEnable Macros\u201d button, the XLS file is opened for viewing. One of the attachments which we analyzed further, had two\u00a0user\u00a0forms\u00a0with different names and a module with the source code of the macro present. The first form, \u201cWsHAfi Box\u201d contains data in Decimal form.<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87829 size-large aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/11-624x390.png\" alt=\"\" width=\"624\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/11-624x390.png 624w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/11-300x187.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/11-768x480.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/11-789x493.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/11.png 1018w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 2. Form \u201cWsHAfi Box\u201d in macro<\/p>\n<p>After further analyzing this form, we found that replacing apostrophe (\u2018) with space\u00a0gives\u00a0us some data in the decimal format. We converted\u00a0the decimal data into ASCII to\u00a0get a Zip file. This zip file contains the actual malware payload. Here are the screen-shots of original form data, data in decimal form and data in the zip file.<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/zipp.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87830 size-large aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/zipp-650x350.png\" alt=\"\" width=\"650\" height=\"350\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/zipp-650x350.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/zipp-300x161.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/zipp-768x413.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/zipp-789x425.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/zipp.png 1403w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 3. Steps to get to the zip file.<\/p>\n<p>Execution starts from Module1 using\u00a0Sub userHafizaiLoadr()\u00a0function. In the \u201cWsHAfi Box\u201d user\u00a0form, it creates one\u00a0variable named ByteArray\u00a0and copy\u00a0data from \u201cWsHAfi Box\u201d user\u00a0form into this variable which is further used to create a zip file in \u201cC:\\Users\\Documents\u201d\u00a0folder.<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/loca-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87833 size-large aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/loca-1-577x390.png\" alt=\"\" width=\"577\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loca-1-577x390.png 577w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loca-1-300x203.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loca-1-768x519.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loca-1-789x534.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loca-1.png 924w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 4. userHafizaiLoadr() function<\/p>\n<p>For extracting contents of this zip file,\u00a0Sub unHafizaizip() function is used. Finally, the payload (&#8220;dtiardhues.exe&#8221;) is executed using Shell command.<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/loc2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87835 size-large aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/loc2-547x390.png\" alt=\"\" width=\"547\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loc2-547x390.png 547w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loc2-300x214.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loc2-768x548.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loc2-789x563.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/loc2.png 904w\" sizes=\"(max-width: 547px) 100vw, 547px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 5. Executable file with Payload dropped at a predefined location<\/p>\n<p>As we observed, contents of this executable file are different for different Windows NT versions (like 6.1 is for Windows 7, 6.2 is windows 8 and 6.3 is Windows 8.1). The payload,\u00a0dtiardhues.exe, is\u00a0a remote access trojan. It gets executed automatically without a user\u2019s intervention\u00a0and connects to a remote CnC Server. Once the victim host connects to the CnC server, it waits for the further commands from it. We noticed that this CnC server supports a wide list of commands for data collection and ex-filtration.<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/cnc1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87836 size-large aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/cnc1-650x343.png\" alt=\"\" width=\"650\" height=\"343\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc1-650x343.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc1-300x158.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc1-768x405.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc1-789x417.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc1.png 930w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 6. Commands received from CnC Server<\/p>\n<p>Initially, this CnC server collects information from victim host such as Hostname, user name, OS\u00a0version, IP, AV Software name, if any. etc. It also collects information about the current running processes from the victim Host and then commands the victim Host to ex-filtrate all the gathered data.<\/p>\n<p>We analyzed the CnC server\u2019s communication through different victim Hosts and could identify the following commands used and their functionality.<\/p>\n<table style=\"height: 534px\" width=\"946\">\n<tbody>\n<tr>\n<td width=\"92\"><strong><b>command<\/b><\/strong><\/td>\n<td width=\"234\"><strong><b>description<\/b><\/strong><\/td>\n<td width=\"100\"><strong><b>command<\/b><\/strong><\/td>\n<td width=\"181\"><strong><b>description<\/b><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"92\">info<\/td>\n<td width=\"234\">it sends machine info (host name, user, AV).<\/td>\n<td width=\"100\">dirs<\/td>\n<td width=\"181\">send list of drives in system<\/td>\n<\/tr>\n<tr>\n<td width=\"92\">clping<\/td>\n<td width=\"234\">set time<\/td>\n<td width=\"100\">cscreen<\/td>\n<td width=\"181\">take and send screenshot<\/td>\n<\/tr>\n<tr>\n<td width=\"92\">fldr<\/td>\n<td width=\"234\">send list of folders<\/td>\n<td width=\"100\">fles<\/td>\n<td width=\"181\">search file on disk.<\/td>\n<\/tr>\n<tr>\n<td width=\"92\">filsz<\/td>\n<td width=\"234\">size of file<\/td>\n<td width=\"100\">delt<\/td>\n<td width=\"181\">delete file<\/td>\n<\/tr>\n<tr>\n<td width=\"92\">procl<\/td>\n<td width=\"234\">list of process<\/td>\n<td width=\"100\">runf<\/td>\n<td width=\"181\">run executable file<\/td>\n<\/tr>\n<tr>\n<td width=\"92\">listf<\/td>\n<td width=\"234\">search for file<\/td>\n<td width=\"100\">afile<\/td>\n<td width=\"181\">exfiltrate file to server<\/td>\n<\/tr>\n<tr>\n<td width=\"92\">cnls<\/td>\n<td width=\"234\">cancel functionality<\/td>\n<td width=\"100\">endpo<\/td>\n<td width=\"181\">end process<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/cnc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87837 size-large aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/06\/cnc-605x390.png\" alt=\"\" width=\"605\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc-605x390.png 605w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc-300x193.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc-768x495.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc-789x509.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/06\/cnc.png 1083w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Fig 7. CnC Communication Traffic<\/p>\n<p><strong><b>IOC\u2019s-<\/b><\/strong><\/p>\n<table style=\"height: 382px\" width=\"1048\">\n<tbody>\n<tr>\n<td width=\"277\">Email attachments (OLE files)<\/td>\n<td width=\"274\">Payloads dropped by OLE files<\/td>\n<td width=\"116\">CnC\u00a0Serve\u2019s\u00a0IP<\/td>\n<td width=\"58\">Port<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">0e174d44893458f27feb7e859bac3191<\/td>\n<td width=\"274\">b9a3cc40fd0e73538c2500455572fc44<\/td>\n<td width=\"116\">81.17.56.226<\/td>\n<td width=\"58\">3864<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">593B11780B40EB78D118630CAA79F935<\/td>\n<td width=\"274\">FC4DCD4D5360AB976E7B1FDFBFAF2097<\/td>\n<td width=\"116\">107.175.1.103<\/td>\n<td width=\"58\">3268<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">A3434B63DFBE12A302DACCD056E10B54<\/td>\n<td width=\"274\">FDD6344CA2587A9016F60BD69E788F55<\/td>\n<td width=\"116\">192.99.241.4<\/td>\n<td width=\"58\">4915<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">0AE759DD1D108FB0A6D28DB83DB04C9D<\/td>\n<td width=\"274\">D7540267D12657CE3411275A7C811C55<\/td>\n<td width=\"116\">95.168.176.141<\/td>\n<td width=\"58\">49188<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">D1DBC070FA713CE9527970ED1164F609<\/td>\n<td width=\"274\">893289045B002B034BCA837EA210D270<\/td>\n<td width=\"116\">192.99.241.4<\/td>\n<td width=\"58\">4915<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><b>Conclusion<\/b><\/strong><strong><b>:<\/b><\/strong><\/p>\n<p>Though identifying Spear Phishing emails is little difficult for an end user, one can always be careful while opening any email attachment. Users should consider the following points before opening any email attachment:<\/p>\n<ol>\n<li>Verify the sender\u2019s email id<\/li>\n<li>Don\u2019t get lured by freebies mentioned in the email subject or body<\/li>\n<li>Do not click on any link from mail body.<\/li>\n<li>Open the Office document files in Read Only mode; don\u2019t enable the macros by default.<\/li>\n<\/ol>\n<p><strong>Quick Heal<\/strong> and <strong>Seqrite <\/strong>enterprise security solutions protect its users from such malicious email attachments and can also help in identifying remote Command and Control server communication. So, remember to keep the endpoint security solutions always updated.<\/p>\n<p><strong><b>Subject Matter Expert:<\/b><\/strong><\/p>\n<p>Prashant Tilekar, Anjali Raut | Quick Heal Security Labs<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last few months,\u00a0we\u2019ve seen a sudden increase\u00a0in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses\u00a0social engineering tricks and some business transactions or deals to [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":87821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[289,21,24,303,5,304,293],"tags":[],"class_list":["post-87818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-safety","category-email","category-malware","category-phishing","category-security","category-social-engineering-2","category-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87818"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87818"}],"version-history":[{"count":21,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87818\/revisions"}],"predecessor-version":[{"id":87850,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87818\/revisions\/87850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87821"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}