Posts

Qbot Infostealer Trojan (Oct 15, 2010)

SonicWALL UTM Research team observed reports of a new Qbot Infostealer Trojan variant being spammed in the wild via e-mail. The e-mail pretends to contain pictures of the sender and lures the user into opening them. The attachment is an executable file (pic.exe) and leads to compromise of confidential information.

The e-mail message looks like below:

screenshot

Most e-mail clients with default security settings will block the attachment by default as it is an executable file. However, if the user manages to open the attached file then it will perform following activities:

  • Steals confidential information from victim machine including E-mail account credentials, Various website credentials, and confidential information stored in cookies. It stores the confidential information in encrypted format.
  • Blocks Antivirus updates as well as Google updates on the victim machine
  • Connects to a compromised domain going-wide.net and downloads newer variant of itself which was saved as:
    • (Temp)ky95.tmp.exe [Detected as GAV: Qbot.RP (Trojan)]
  • Drops following files on the victim machine:
    • (WINDOWS)system32 a.dll
    • (WINDOWS)system32 d.dll
    • (WINDOWS)system32 kkkkkkk
    • (WINDOWS)system32 n.dll
    • (WINDOWS)system32 ntcore.dll
    • (WINDOWS)system32 o.dll
    • (WINDOWS)system32 p.dll
    • It patches the following system file:
      • (WINDOWS)system32ole32.dll
    • Sample request that it uses to send confidential system information:

      screenshot

    • Sample runtime activity log from infected system:

      screenshot

    SonicWALL Gateway AntiVirus provides protection against this Information stealing Trojan variant via GAV: Qbot.RP (Trojan) signature.

Microsoft Security Bulletins Coverage (Oct 12, 2010)

SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of October, 2010. A list of issues reported, along with SonicWALL coverage information follows:

MS10-071 Cumulative Security Update for Internet Explorer (2360131)

  • CVE-2010-0808 – AutoComplete Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3243 – HTML Sanitization Vulnerability
    IPS 5844 MS IE XSS Vulnerability Exploit
  • CVE-2010-3324 – HTML Sanitization Vulnerability
    IPS 4149 MS IE toStaticHTML Method Invocation
  • CVE-2010-3325 – CSS Special Character Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3326– Uninitialized Memory Corruption Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3327 – Anchor Element Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3328– Uninitialized Memory Corruption Vulnerability
    Note: Detection would require a logical analysis or traversal of a file. It is not feasible.
  • CVE-2010-3329– Uninitialized Memory Corruption Vulnerability
    IPS 5836MS IE Uninitialized Memory Corruption Vulnerability 2 (MS10-071)
  • CVE-2010-3330– Cross-Domain Information Disclosure Vulnerability
    Note: Detection would require a logical analysis or traversal of a file. It is not feasible.
  • CVE-2010-3331– Uninitialized Memory Corruption Vulnerability
    IPS 5835MS IE Uninitialized Memory Corruption Vulnerability (MS10-071)

MS10-072 Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)

  • CVE-2010-3243– HTML Sanitization Vulnerability
    Note: Please refer to MS10-071
  • CVE-2010-3324– HTML Sanitization Vulnerability
    Note: Please refer to MS10-071

MS10-073 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)

  • CVE-2010-2549– Win32K Reference Count Vulnerability
    Note: Local elevation of privilege
  • CVE-2010-2743– Win32K Keyboard Layout Vulnerability
    Note: Local elevation of privilege
  • CVE-2010-2744– Win32k Window Class Vulnerability
    Note: Local elevation of privilege

MS10-074 Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution (2387149)

  • CVE-2010-3227– Windows MFC Document Title Updating Buffer Overflow Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

MS10-075 Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution (2281679)

  • CVE-2010-3225– RTSP Use After Free Vulnerability
    IPS 5845 Microsoft Windows Media Player Code Execution Exploit

MS10-076 Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132)

  • CVE-2010-1883– Embedded OpenType Font Integer Overflow Vulnerability
    IPS 5837 Malicious Font File Download 5b

MS10-077Vulnerability in .NET Framework Could Allow Remote Code Execution (2160841)

  • CVE-2010-3228– .NET Framework x64 JIT Compiler Vulnerability
    Note: There is no way to differentiate malformed and legitimate traffic.

MS10-078 Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Elevation of Privilege (2279986)

  • CVE-2010-2740– OpenType Font Parsing Vulnerability
    IPS 5831 Malicious Font File Download 3b
  • CVE-2010-2741– OpenType Font Validation Vulnerability
    IPS 5832 Malicious Font File Download 4b

MS10-079Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2293194)

  • CVE-2010-2747– Word Uninitialized Pointer Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-2748– Word Boundary Check Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-2750– Word Index Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3214– Word Stack Overflow Vulnerability
    IPS 5833Malicious Word Document 3b
  • CVE-2010-3215– Word Return Value Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3216– Word Bookmarks Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3217– Word Pointer Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3218– Word Heap Overflow Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3219– Word Index Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3220– Word Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3221– Word Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

MS10-080 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2293211)

  • CVE-2010-3230– Excel Record Parsing Integer Overflow Vulnerability
    IPS 5840Malicious Excel Document 6b
  • CVE-2010-3231– Excel Record Parsing Memory Corruption Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3232– Excel File Format Parsing Vulnerability
    IPS 5839Malicious Excel Document 5b
  • CVE-2010-3233– Lotus 1-2-3 Workbook Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3234– Formula Substream Memory Corruption Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3235– Formula Biff Record Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3236– Out Of Bounds Array Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3237– Merge Cell Record Pointer Vulnerability
    IPS 5834Malicious Excel Document 3b
  • CVE-2010-3238– Negative Future Function Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3239– Extra Out of Boundary Record Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3240– Real Time Data Array Record Vulnerability
    IPS 5838Malicious Excel Document 4b
  • CVE-2010-3241– Out-of-Bounds Memory Write in Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3242– Ghost Record Type Parsing Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

MS10-081 Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2296011)

  • CVE-2010-2746– Comctl32 Heap Overflow Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

MS10-082 Vulnerability in Windows Media Player Could Allow Remote Code Execution (2378111)

  • CVE-2010-2745– Windows Media Player Memory Corruption Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

MS10-083 Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution (2405882)

  • CVE-2010-1263– COM Validation Vulnerability
    Note: This is a platform design-level issue. The detection logic varies in different ActiveX control.

MS10-084 Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (2360937)

  • CVE-2010-3222– LPC Message Buffer Overrun Vulnerability
    Note: This is a Local elevation of privilege.

MS10-085 Vulnerability in SChannel Could Allow Denial of Service (2207566)

  • CVE-2010-3229– TLSv1 Denial of Service Vulnerability
    IPS 5846MS IIS 7.0 Denial of Service Attempt

MS10-086 Vulnerability in Windows Shared Cluster Disks Could Allow Tampering (2294255)

  • CVE-2010-3223– Permissions on New Cluster Disks Vulnerability
    Note: There is no way to differentiate malformed and legitimate traffic.

Virus Murofet.A (Oct 8, 2010)

SonicWALL UTM Research team received reports of a new file infector active in the wild. This new virus infects PE files and uses its own random domain name generator to generate domain names. It then attempts to download and execute malicious files via these domains.

Last time we saw random domain name generation algorithm being used by Conficker Worm to download additional Malware.

Installation:

The virus drops a copy of itself on the system and runs it. It will also inject codes to running processes before dropping a batch file to delete itself.

The injected code generates random domains and tries to download and execute additional Malware. These generated domains are derived from a randomizing function computed from the current UTC system time and date using the Windows API GetSystemTime.

It generates 800 random domains per second until it successfully downloads a Malware from one of the domains.

Dropped Files

It drops a copy of itself at:

  • {User}Application Data{random folder (4 Characters)}{random}.exe

In our environment, the virus copied itself as:

  • {User}Application DataDyemvaiq.exe – GAV: Murofet.A (Virus)

Other dropped files:

  • {User}Application DataKesakuaww.eve

Registry modification

It adds the following registry entry to ensure that the dropped copy of malware starts on every system reboot:

  • Key: [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun] Value: “{ABE1C0BF-B85A-7A2B-01C5-9CAEA05BDB43}”
    Data: “”{User}Application DataDyemvaiq.exe””
Infection Routine

  • It infects .exe files and uses cavity style of infection to insert malicious code. This allows the virus to infect files without increasing its file size.

Random Domain Name Generation

  • Get the current System time and date (UTC Format)
  • Compute based on timestamp to generate Ascii characters [a-z].
  • Generate Domain Name from characters [a-z] not exceeding 16 characters.
  • Uses one of the following top level domains to form the URL:
    • .com
    • .net
    • .info
    • .biz
    • .org
  • The generator does not include the seconds and milliseconds in the computation. This makes any infected machine synchronize up to the Minute to generate the same Domain Name.

URL Pattern:

    http://{generated_domain}/forum/

Samples of Domain Names observed:

  • eiw{REMOVED}gyoqzm.info
  • opq{REMOVED}ghpnjux.biz
  • njj{REMOVED}tekjpsib.net
  • onu{REMOVED}xrtusnyl.org
  • trk{REMOVED}xsvuml.com

Download Routine

Infected files attempt to download other malicious file from the generated URL and saves it in %TEMP% directory. It also validates the downloaded file first before executing it. Files downloaded by this virus are getting blocked as GAV: Conficker.gen (Worm)

Sample DNS requests:

    screenshot

SonicWALL Gateway AntiVirus provided protection against this malware via GAV: Murofet.A (Virus) and GAV: Conficker.gen (Worm)

Apple Safari WebKit Counter Vulnerability (Oct 7, 2010)

Safari is a graphical web browser developed by Apple and included as part of the Mac OS X operating system. Safari became Apple’s default browser beginning with Mac OS X v10.3 “Panther” and it is also the native browser for the iOS. A version of Safari for the Microsoft Windows operating system, first released on June 11, 2007, supports Windows XP, Windows Vista, and Windows 7. As of 2010, Safari is the fourth most widely used browser in the US. Safari offers numerous features such as processing HTML, images, scripting languages, and various other popular Internet specifications.

Safari’s browsing functionality is built on a rendering engine, called WebKit. WebKit has a development toolkit which allows third party developers to build applications that use Internet technologies such as HTML, HTTP, and others. WebKit provides WebCore, an HTML parser, and JavaScriptCore, which is a JavaScript engine. WebKit also supports styling using CSS.

Cascading Style Sheets (CSS) is a style sheet language used to describe the presentation semantics (the look and formatting) of a document written in a markup language. It’s most common application is to style web pages written in HTML and XHTML, but the language can also be applied to any kind of XML document, including SVG and XUL. CSS can define color, font, text alignment, size, borders, spacing, layout and many other typographic characteristics. One of these characteristics is the ability to create counters to count objects. These counters can perform functions such as numbering elements inside a web document. There are several properties associated with counters, counter-reset sets which identifier will be incremented and by what amount; counter-increment actually increments the counter by the specified amount or the default, which is one. The example below numbers the elements inside a list:

      
term
definition
term
definition
term
definition

In the above code, a counter term is created for the list. Next, the numbering scheme is applied to the list, placing a monotonically increasing digit before each item in the list.

A memory corruption vulnerability exists in Apple Safari. The vulnerability is due to an error in the function that destroys a widget. It causes the counter object pointing at invalid memory. A remote attacker can exploit this vulnerability to inject and execute arbitrary code. Any code injected will be executed within the security context of the currently logged in user.

SonicWALL UTM team has researched this vulnerability, and created the following GAV signatures for the exploits.

  • Safari.RenderingCounter.AS.1
  • Safari.RenderingCounter.AS.2

The CVE identifier for this vulnerability is CVE-2010-1784.

Oficla Trojan Spam Campaign (October 1, 2010)

SonicWALL UTM Research team observed a Facebook spam campaign involving a newer variant of Oficla Trojan in the last 3 days. The spam emails arrive with a zip archived attachment which contains the Oficla Trojan executable. The e-mail is drafted to appear as a Facebook password reset notification.

Campaign #1

Attachment: FacebookPassword.zip
Subject: Facebook password has been changed! ID444

Email Body:
————————
How to Avoid Moving Scams
Mass. woman pleads guilty in glass-eating scheme
————————

Campaign #2

Attachmentc: FaceBook_Password_Nr2829.zip
Subject: Your New Facebook password

Email Body:
————————
Dear user of facebook.

Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.

Thanks,
Your Facebook.
————————

Campaign #3

Attachmentc: FaceBook_Password_Nr27477.zip
Subject: Facebook Password Reset Confirmation!

Email Body:
————————
Dear user of facebook.

Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.

Thanks,
Your Facebook.
————————

Sample email messages looks like:

screenshot

screenshot

screenshot

The executable files inside the attachment looks like this:

screenshot

If the user opens the malicious attachment then it performs following activities on the victim’s machine:

  • Network Activity:
    • It connects to C&C server and receives commands
    • screenshot

    • It donwloads file from URL specified in command
    • It send process information to remote C&C server
    • screenshot

  • File Activity:

    It creates the following files

    • %temp%4.tmp – Detected as GAV: Oficla.AFZ (Trojan)
    • %temp%5.tmp – Detected as GAV: Scar.CUQT (Trojan)
    • %windirsystem32bfky.ojo – Detected as GAV: Oficla.AFZ (Trojan)
    • %windirsystem32svrwsc.exe – Detected as GAV: Scar.CUQT (Trojan)
  • Process Activity:
    • It injects itself into running svchost.exe process
  • Registry Activity:
    • It creates HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSvrWsc: %windirsystem32svrwsc.exe ensuring infection on system restart
    • It modifies HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon with new value “Explorer.exe rundll32.exe bfky.ojo bwapp” ensuring malicious dll is loaded on system restart

SonicWALL Gateway AntiVirus provides protection against this Oficla Trojan variant with GAV: Oficla.AHB (Trojan) signature. [517,120 hits recorded in last 3 days]

screenshot

HP Data Protector Express Stack BO (Oct 1st, 2010)

HP OpenView Storage Data Protector is a backup solution for enterprise and distributed environments. The Data Protector environment consists of various components and services controlled by a management console. The management console provides quick access to track all Data Protector Express objects, including jobs, media, and scheduling rotation schemes. The login screen allows to enter the host name or the IP address of the target server to which the user wants to log in. The default host is the local machine, however, remote hosts can be accessed via hostname or IP. The console accepts the username and password credential combination to authenticate users. The default username is ‘Admin’ with a blank password.

The login credentials are exchanged over TCP port 3817. The protocol specification is unknown to the public as it is proprietary. The session starts with a handshake packet that includes the computer name of the client system and the database name, among other information. The handshake packet is followed by a packet containing login credentials.

The credentials packet has the following format:

 Offset     Length  Description ---------- ------- ----------------------------------- 0x0000     2       Command (x51x84) 0x0002     10 0x000C     4       Size 0x0010     4 0x0014     x       username 0x0014+x   y       password 

A buffer overflow vulnerability exists in HP OpenView Storage Data Protector software. The vulnerability is due to a boundary error in the method used to parse the username value. The vulnerable code allocates a limited size stack buffer for the username and calls a strcpy function to copy the null terminated string into the buffer. The code does not verify the length of the source string before copying it into the said buffer. As a result of this, if an overly large username is provided in the packet, the stack buffer can be overflowed, overwriting critical stack data such as the function return addresses and the SEH pointer.

Remote unauthenticated attackers could exploit this vulnerability by sending a crafted login request to the target server. Successful exploitation of this vulnerability may allow for arbitrary code injection and execution with the privileges of the affected service. If the attack is not successful, the service will terminate abnormally causing a Denial of Service condition.

SonicWall has released an IPS signature to address a known exploit targeting this vulnerability. The following signature was released:

  • 5803 – HP Data Protector Express DtbClsLogin BO Attempt

This vulnerability has been assigned CVE-2010-3007 by mitre. The vendor has released an advisory regarding this issue.

FakeAV Downloader – CV spam (Sept 24, 2010)

SonicWALL UTM Research team observed a new wave of Resume spam campaign starting at noon today. The e-mails contain a zip archive attached which contains the malicious executable file inside it. This is different from the FakeAV html campaign that we reported last week.

Resume spam campaign involves e-mails pretending to contain CV document attached with the e-mail. This spam theme was last used by Bredolab authors back in July, 2010. SonicWALL UTM Research team has received more than 20,000 e-mail copies from this spam campaign so far and it is still going on.

Some of the E-mail subjects we have seen in this campaign so far:

  • The resume document is attached.
  • I have attached the resume.
  • Please find attached.
  • Enclosed please find.
  • Here’s that file that you wanted.
  • Enclosed is my CV for your consideration. Thanks

Sample e-mail messages looks like:

screenshot

The zip archive attachment contains a malicious executable file – cv.exe which is a new variant of FakeAV Downloader Trojan. Upon execution, it leads to the download and installation of FakeAV malware[Antivirus Safebrowser] on the victim machine and asks for payment.

screenshot

It attempts to connect to multiple malicious domains to download malware executables and related configuration files:

  • (REMOVED)lups.com/a/ad
  • (REMOVED)hamed.org/any3/5-direct.ex
  • (REMOVED)ndconvince.org/avt/avt_db
  • (REMOVED)ort.com/customers/getbuild.php

The following files are dropped onto the victim machine:

  • (User Favorites)_favdata.dat
  • (User Temp)asd94.tmp.exe [Detected as GAV: Conficker.gen (Worm)]
  • (User Temp)asd95.tmp.exe [Detected as GAV: Conficker.gen (Worm)]
  • (User Temp)asd96.tmp.exe [Detected as GAV: Conficker.gen (Worm)]
  • (User Temp)asd97.tmp.exe [Detected as GAV: Conficker.gen (Worm)]
  • (User Temp)eapp32hst.dll [Detected as GAV: ZPACK.GEN_187 (Trojan)]
  • (User Temp)wscsvc32.exe [Detected as GAV: Conficker.gen (Worm)]
  • (Program FilesAnViavt.db
  • (Program FilesAnViavt.exe [Detected as GAV: Kryptik.AT_7 (Trojan)]
  • (User Temp)dfrgsnapnt.exe [Detected as GAV: FraudLoad.XFUP (Trojan)]

If the user attempts to open any other legitimate executable file, the FakeAV malware will block the application launch and display a fake infection message as seen below for Calculator program:

screenshot

As seen before in other FakeAV malware analysis, it subsequently starts scanning the system files and displays more fake infections prompting the user to purchase the application in order to clean up the infections.

screenshot

SonicWALL Gateway AntiVirus provides protection against this FakeAV Downloader Trojan by GAV: Kryptik.AJD (Trojan) signature.

screenshot

IBM Lotus Domino iCalendar Stack BO (Sept 24, 2010)

Lotus Domino is an IBM server product that provides enterprise e-mail and collaboration capabilities. The server can be used as an application server for Lotus Notes applications as well as a web server. One of the components contained in Domino is the calendar. With the calendar, a user can book and share appointments with other users. Domino supports the iCalendar technology which enables scheduling. iCalendar defines a file format which allows Internet users to send meeting requests and tasks to other users. These requests may be sent via email, or be shared as files with the .ics extension. Recipients of the iCalendar data file can respond to the sender easily or propose another meeting date and time.

The iCalendar specification is defined by RFC 5545. It is based on the earlier vCalendar specification by the Internet Mail Consortium (IMC). iCalendar data files are plain text files with either an .ics or .ifb extension. The top-level element in iCalendar is the Calendaring and Scheduling Core Object, a collection of calendar and scheduling information. This information will typically consist of a single iCalendar object. However, multiple iCalendar objects can be grouped together as well. The first and last lines in the file must be “BEGIN:VCALENDAR” and “END:VCALENDAR” respectively. The body of the calendar is contained between these lines. An example of an iCalendar object follows:

BEGIN:VCALENDAR VERSION:2.0 BEGIN:VEVENT UID:test@test.com ORGANIZER;CN=test:MAILTO:test@test.com DTSTART:20100922T171111Z DTEND:20100923T041111Z SUMMARY:test END:VEVENT END:VCALENDAR

A stack buffer overflow vulnerability exists in IBM Lotus Domino server. The vulnerability is due to a boundary error in the nrouter service while handling crafted calendar event messages. The vulnerable code allocates a fixed size buffer to write the value of one of the headers of an event message. However, the code uses a strcpy function to copy the string value into the stack buffer. In case of an overly long string value being supplied in the affected header, the said buffer can be overflowed, allowing for overwriting the function return addresses and other critical data on the stack.
A remote attacker can exploit this vulnerability by sending a crafted email message to the target SMTP server. Successful exploitation may allow for arbitrary code injection and execution with the privileges of the nrouter process. Code injection that does not result in execution would terminate the service and cause a denial of service condition.

SonicWALL has released an IPS signature to address this issue. The following signature has been released:

    • 5767 – IBM Lotus Domino iCalendar Stack Buffer Overflow Attempt
  • In addition to the new signature, SonicWALL has numerous existing signatures that detect and block popular shellcode which is often used in exploitation attempts of this type of vulnerability. The vendor has released a security bulletin regarding the issue and available patches.

    New FakeAV HTML Spam (Sept 16, 2010)

    SonicWALL UTM Research team observed a high volume of FakeAV related e-mail spam campaign during the last two days. These e-mails arrive with a malicious HTML attachment and used different themes to lure users into opening the file. The HTML attachment will eventually redirect users to a FakeAV drive-by download web page.

    SonicWALL UTM Research team has received more than 200,000 e-mail copies from this spam campaign so far and it is still going on.

    The following are the email samples used in this campaign:

    Sample #1
    Subject: Employment letter for visa application
    Attachment: jun wang letter.html
    Email Body:
    ————————
    Hi:

    Attached please find the employment letter for Jun Wang’s H-1B visa application in Canada.
    Please print it out with your company letterhead and sign. Please mail the original along
    with the original H-1B approval notice to Jun Wang at your earliest convenience

    Thank you
    ————————

    The e-mail message looks like below:

      screenshot

    Sample #2
    Subject: find a copy of the letter
    Attachment: copy of the letter.html
    Email Body:
    ————————
    Hello

    Attached please find a copy of the letter. Eva should we send the original I-797 to Jun?
    Jun, please confirm receipt of the I-94 from Eva.

    Thank you
    ————————

    The e-mail message looks like below:

      screenshot

    Sample #3
    Subject: Invoice for Floor Replacement
    Attachment: Invoice-Stocketon.html
    Email Body:
    ————————
    Hi,
    Please see attached invoice for stockton floor project. Thanks!
    ————————

    The e-mail message looks like below:

      screenshot

    Malware Installation:

    This instance of FakeAV spam wave used an HTML file attachment that redirects users to a FakeAV download page instead of the usual Trojan downloader we’ve seen before and covered in this previous SonicAlert

    Once the user opens the HTML file attachment, it will redirect to this webpage-{hxxp://dark-[removed]in.com/x.html} with following message:

      screenshot

    Soon after, the user will see a fake virus infection alert prompting to download a Microsoft Security Assessment Tool to fix the problem.

      screenshot

    Regardless of the user input to the alert window, it will show the fake AV scanning seen below:

      screenshot

    After it finishes scanning, it will show the message below to continue removing detected Viruses. At this point, the User’s computer is not yet infected but only made to believe so that the User will unknowingly continue to download and install the FakeAV.

      screenshot

    If the user clicks on remove all button, it will prompt for the downloading of the FakeAV installer.

      screenshot

    SonicWALL Gateway AntiVirus provided protection against these spammed FakeAV variants via following signatures:

    • GAV: VBS.Drost1 (Trojan)- 14 million hits in last 48 hours
    • GAV: Suspicious#fakeav_14 (Trojan) – 1,416 Hits

      screenshot

      screenshot

    Microsoft Security Bulletins Coverage (Sep 15, 2010)

    SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of September, 2010. A list of issues reported, along with SonicWALL coverage information follows:

    MS10-061 Vulnerability in Print Spooler Service Could Allow Remote Code Execution

    • CVE-2010-2729 – Print Spooler Service Impersonation Vulnerability
      IPS 5686 MS Print Spooler Service Executable File Reception
      IPS 5691 MS Print Spooler Service Remote Code Execution PoC (MS10-061)

    MS10-062 Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution

    • CVE-2010-0818 – MPEG-4 Codec Vulnerability
      IPS 5694 MS MPEG-4 Codec Remote Code Execution PoC (MS10-062)

    MS10-063 Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution

    • CVE-2010-2738 – Uniscribe Font Parsing Engine Memory Corruption Vulnerability
      Note: There are no known public exploits targeting this vulnerability.

    MS10-064 Vulnerability in Microsoft Outlook Could Allow Remote Code Execution

    • CVE-2010-2728 – Heap Based Buffer Overflow in Outlook Vulnerability
      SPY 1814 Malicious RTF File Download

    MS10-065 Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution

    • CVE-2010-1899 – IIS Repeated Parameter Request Denial of Service Vulnerability
      Note: There is no way to differentiate malformed and legitimate traffic.
    • CVE-2010-2730 – Request Header Buffer Overflow Vulnerability
      IPS 5689 Excessive HTTP Request Headers Attempt
    • CVE-2010-2731 – Directory Authentication Bypass Vulnerability
      IPS 5687 MS IIS Directory Authentication Bypass Attempt

    MS10-066 Vulnerability in Remote Procedure Call Could Allow Remote Code Execution

    • CVE-2010-2567 – RPC Memory Corruption Vulnerability
      Note: There is no way to differentiate malformed and legitimate traffic.

    MS10-067 Vulnerability in WordPad Text Converters Could Allow Remote Code Execution

    • CVE-2010-2563 – WordPad Word 97 Text Converter Memory Corruption Vulnerability
      Note: There are no known public exploits targeting this vulnerability.

    MS10-068 Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege

    • CVE-2010-0820 – LSASS Heap Overflow Vulnerability
      Note: There are no known public exploits targeting this vulnerability.

    MS10-069 Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege

    • CVE-2010-1891 – CSRSS Local Elevation of Privilege Vulnerability
      Note: Local elevation of privilege