German users targeted in Vodafone Spam Campaign (Mar 8, 2012)
SonicWALL UTM Research team discovered a new spam campaign targeting users in Germany. The email pretending to be from Vodafone informs the recipient that their new Vodafone bill has been generated and is attached to the email. The PDF attachment is malicious and if opened attempts to exploit Adobe reader via heap spray which in turn downloads a Trojan and executes it.
The spam campaign is shown below:
The spam email is in German and is translated below:
We discovered the following on analysis of the attached PDF:
- The PDF attachment contains an obfuscated malaicious javascript shown below:
- The javascript when deobfuscated was found exploiting Adobe reader and using heap spray to load and execute shell code:
- On inspecting the shell code being used in the heap spray we discovered that it was downloading and executing a Trojan from a remote URL:
The downloaded Trojan performs the following activities:
- It injects code in to csrss.exe
- It checks for connectivity to the internet by querying google.com
- It creates the following file:
- %windir%system32wink.exe (Copy of itself) [Detected as GAV: Inject.DCGC (Trojan)]
- It creates to following registry entry to add itself as a debugger for the userinit.exe process. This ensures it is executed in the execution sequence of userinit.exe at windows logon:
- HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsuserinit.exe Debugger “wink.exe”
- It posts data to a remote server:
SonicWALL Gateway AntiVirus provides protection against this threat with the following signatures:
- GAV: Pidief.AWT (Exploit)
- GAV: Inject.DCGC (Trojan)