Common Vulnerabilities and Exposures (CVE)number
CVE-2010-3333
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003
SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office
for Mac 2011, and Open XML File Format Converter for Mac allows remote
attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack
Buffer Overflow Vulnerability
Please read a technical analysis of this vulnerability on the Microsoft Threat Research & Response Blog Targeted attacks against recently addressed Microsoft Office vulnerability (CVE-2010-3333/MS10-087) 29 Dec 2010 12:10 PM
General File Information
File China's Military Build-up in the Early Twenty-first Century
MD5 02B77C3941478A05F2EE6559E3B76FB6
SHA1 cd7a8327dc8917d90bdbe693a310fa75a43a1ae0
File size : 214503 bytes
Type: PDF
Distribution: Email attachment
Download
Sender: It appears that the message is not spoofed but was sent from a compromised account, which belongs to an existing employee of "The Local 26 IBEW-NECA Joint Trust Funds" located in Laurel, Maryland.
This mail server IP 69.85.28.235 is not shared by multiple customers and it was already featured by the Project Honeypot for sending phishing mail
It appears to be a hosted mail server. Please see more information about this in the Sender section below.
This mail server IP 69.85.28.235 is not shared by multiple customers and it was already featured by the Project Honeypot for sending phishing mail
It appears to be a hosted mail server. Please see more information about this in the Sender section below.
Attachment: The attachment is a malicious word (RTF) document (CVE-2010-3333), with the payload described below plus a clean word document - the paper named in the subject of the message "China’s military build-up in the early twenty-first century : from arms procurement to war-fighting capability" The paper itself in pdf format is available at the Nanyang Technological University website (Singapore)
Payload: The embedded binary (Trojan.CryptRedol.Gen.3) creates a copy of itself (same MD5 each time) with a new name in %userprofile%\Local Settings, connects to an IP in Thailand, creates a registry setting to run on startup, it runs under svchost.exe.
The names match standard Windows DLL and EXE files. There are
List of possible names:
Alerter.exe
AppMgmt.exe
CiSvc.exe
ClipSrv.exe
COMSysApp.exe
dmadmin.exe
Dot3svc.exe
EapHost.exe
HidServ.exe
hkmsvc.exe
ImapiService.exe
Messenger.exe
mnmsrvc.exe
MSDTC.exe
MSIServer.exe
napagent.exe
NetDDE.exe
NetDDEdsdm.exe
Netlogon.exe
NtLmSsp.exe
NtmsSvc.exe
ose.exe
RasAuto.exe
RDSessMgr.exe
RemoteAccess.exe
rpcapd.exe
RpcLocator.exe
RSVP.exe
SwPrv.exe
SysmonLog.exe
TlntSvr.exe
upnphost.exe
UPS.exe
VSS.exe
WmdmPmSN.exe
Wmi.exe
WmiApSrv.exe
wuauserv.exe
xmlprov.exe
Original Message
----Original Message-----From: Cxxxxxxxxxx Mxxxxxxxxxxx [mailto:cmxxxxxxxx@ewtf.org]
Sent: Friday, February 25, 2011 3:57 AM
To: XXXXXXXXXXXXXX
Subject: China's Military Build-up in the Early Twenty-first Century
Dear all,
1. Abstract:
Since the late 1990s, China’s military arsenal has been dramatically modernised. However, the actual military value of the newly developed systems has yet to be clarified. This study attempts to do so, on the basic assumption that technological military progress per se is not sufficient to increase military strength. Instead of evaluating arms development in technological terms, it therefore adopts an alternative approach to consider its adaptability to the country’s strategic situation.
To this end, the study employs the concepts of military procurement and military readiness, and makes two assumptions. First, the value of a weapon system is measured by its suitability to the country’s military, economic and technological conditions, and the degree to which it is supplied to the military in the required quantities, timeframe and with the appropriate sustaining support. Second, the country’s ability to meet these requirements depends to a large extent on conditions related to the procurement process.
Exploring China's recent military procurement approaches, the study finds that the relationship between China’s strategic conditions and its procurement efforts tends to be tenuous, China’s inclination towards self-reliance is strengthening, and the technological ambition of its military procurement is ever-increasing. Under these conditions, the paper concludes that in remote and complex conflicts, China’s military procurement process could reduce the actual military value of the newly developed weapon systems.
2. Bio:
Yoram Evron is a Visiting Fellow at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University. He is also Assistant Professor in the Department of Asian Studies at the University of Haifa, and a Research Fellow at the Institute for National Security Studies (INSS). Dr. Evron’s research interests include theories and practices of China’s national security, military development and military procurement, and China-Middle East relations. He holds a Ph.D. in Political Science from the University of Haifa. Address for correspondence: Yoram Evron, Department of Asian Studies, University of Haifa, Mount Carmel, Haifa 31905, Israel.
Message Headers
Received: (qmail 5101 invoked from network); 25 Feb 2011 08:54:19 -0000
Received: from ewtfdc2.ewtf.org (HELO ewtfexch07.ewtf.org) (69.85.28.235)
by xxxxxxxxxxxx with SMTP; 25 Feb 2011 08:54:19 -0000
Received: from ewtfexch07.ewtf.org ([192.9.200.202]) by ewtfexch07
([192.9.200.202]) with mapi; Fri, 25 Feb 2011 03:56:44 -0500
From: CXXXXX MXXXXXX
To: "XXXXXXXXXXX"
Date: Fri, 25 Feb 2011 03:56:43 -0500
Subject: China's Military Build-up in the Early Twenty-first Century
Thread-Topic: China's Military Build-up in the Early Twenty-first Century
Thread-Index: AQHL1Mnsw1zqzd9eEkCwCEeLEIBloQ==
Message-ID: <3F535BAE97971649A1F52F35547BEB4361A136548B@ewtfexch07>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/mixed;
boundary="_002_3F535BAE97971649A1F52F35547BEB4361A136548Bewtfexch07_"
MIME-Version: 1.0
Sender
69.85.28.235
Mail.ewtf.org point to 69.85.28.235.
It is blacklisted in one list.
Hostname: ewtfdc2.ewtf.org
ISP: Global Telecom Brokers
Organization: Global Telecom Brokers
Type: Corporate
Assignment: Static IP
State/Region: Maryland
City: Ridgely
ISP: Global Telecom Brokers
Organization: Global Telecom Brokers
Type: Corporate
Assignment: Static IP
State/Region: Maryland
City: Ridgely
Sender: It appears that the message is not spoofed but was sent from a compromised account (possibly it is a compromsed/misconfigured Exchange mail server), which belongs to "The Local 26 IBEW-NECA Joint Trust Funds" located in Laurel, Maryland.
This mail server IP 69.85.28.235 is not shared by multiple customers and it was already featured by the Project Honeypot for sending phishing mail
It appears to be a hosted mail server.
Automated Scans
File name:China's Military Build-up in the Early Twenty-first Century.doc
http://www.virustotal.com/file-scan/report.html?id=08c38be704142757bcde9f24a7a9d2db126fcc81ce6de7cc7792c035e956bedf-1298938615
Submission date:2011-03-01 00:16:55 (UTC)
Result:8/ 43 (18.6%)
Avast 4.8.1351.0 2011.02.23 RTF:CVE-2010-3333
Avast5 5.0.677.0 2011.02.23 RTF:CVE-2010-3333
Commtouch 5.2.11.5 2011.02.28 CVE-2010-3333!Camelot
Fortinet 4.2.254.0 2011.03.01 Data/CVE20103333.A!exploit
GData 21 2011.03.01 RTF:CVE-2010-3333
Microsoft 1.6603 2011.02.28 Exploit:Win32/CVE-2010-3333
PCTools 7.0.3.5 2011.02.28 Trojan.Mdropper
Symantec 20101.3.0.103 2011.03.01 Trojan.Mdropper
MD5 : 02b77c3941478a05f2ee6559e3b76fb6
Submission date:2011-03-01 00:16:55 (UTC)
Result:8/ 43 (18.6%)
Avast 4.8.1351.0 2011.02.23 RTF:CVE-2010-3333
Avast5 5.0.677.0 2011.02.23 RTF:CVE-2010-3333
Commtouch 5.2.11.5 2011.02.28 CVE-2010-3333!Camelot
Fortinet 4.2.254.0 2011.03.01 Data/CVE20103333.A!exploit
GData 21 2011.03.01 RTF:CVE-2010-3333
Microsoft 1.6603 2011.02.28 Exploit:Win32/CVE-2010-3333
PCTools 7.0.3.5 2011.02.28 Trojan.Mdropper
Symantec 20101.3.0.103 2011.03.01 Trojan.Mdropper
MD5 : 02b77c3941478a05f2ee6559e3b76fb6
Embedded executable
Files Created
Attachment: The attachment is a malicious word (RTF) document (CVE-2010-3333), with the payload described below plus a clean word document - the paper named in the subject of the message "China’s military build-up in the early twenty-first century : from arms procurement to war-fighting capability" The paper itself in pdf format is available at the Nanyang Technological University website (Singapore)%userprofile%\Local Settings\Temp
0/ 42 (0.0%)
Clean document, which is supposed to open to fool the victim but it never does.
File: China's Military Build-up in the Early Twenty-first Century.doc
Size: 160256
MD5: 91572F3D15588F34F42EE5136D74C738
Payload: The embedded binary (Trojan.CryptRedol.Gen.3) creates a copy of itself (same MD5 each time) with a new name in %userprofile%\Local Settings, connects to an IP in Thailand, creates a registry setting to run on startup, it runs under svchost.exe.
Strings from the dumped process
WININET.dll
WS2_32.dll
GetAdaptersInfo
iphlpapi.dll
StrChrA
PathRemoveFileSpecA
SHLWAPI.dll
61.7.158.11
regedit.exe /s
~dfds3.reg
%tmp%\
Windows Registry Editor Version 5.00
[%s]
"%s"="%s"
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
.exe
%tmp%
WinHttp
http://%s:%d/%s.php?id=%06d%s&ext=%s
%temp%\
/%s.php?id=%06d%s&ext=%s
http://%s:%d/%s.php?id=%06d%s
%c%c%c%c%c
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
/%s.php?id=%06d%s
%%temp%%\%u
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Content-Type: application/x-www-form-urlencoded
POST
HTTP/1.1
%02X-%02X-%02X-%02X-%02X-%02X
01-01-01-01-01-01
%c%c%c%c%c%c.exe
Update March 1, 2011 = This is not all, I will add more information about this binary later, it is a interesting piece.
The names match standard Windows DLL and EXE files. There are
Registry change:
HKU\S-1-5-21-789336058-1580436667-1060284298-1003\Software\Microsoft\Windows\CurrentVersion\Run\FILENAME: "C:\Documents and Settings\username\Local Settings\FILENAME.exe"
List of possible names:
Each time the binary is launched (or the Word/RTF document is launched), it creates a copy of the binary with a new name in %userprofile%\Local Settings.Alerter.exe
AppMgmt.exe
CiSvc.exe
ClipSrv.exe
COMSysApp.exe
dmadmin.exe
Dot3svc.exe
EapHost.exe
HidServ.exe
hkmsvc.exe
ImapiService.exe
Messenger.exe
mnmsrvc.exe
MSDTC.exe
MSIServer.exe
napagent.exe
NetDDE.exe
NetDDEdsdm.exe
Netlogon.exe
NtLmSsp.exe
NtmsSvc.exe
ose.exe
RasAuto.exe
RDSessMgr.exe
RemoteAccess.exe
rpcapd.exe
RpcLocator.exe
RSVP.exe
SwPrv.exe
SysmonLog.exe
TlntSvr.exe
upnphost.exe
UPS.exe
VSS.exe
WmdmPmSN.exe
Wmi.exe
WmiApSrv.exe
wuauserv.exe
xmlprov.exe
This ensures all victims get different malicious files names on their system - it is a common feature in malware.
File name:1f4e6cad1513e9e7765ef50bce4837b0
http://www.virustotal.com/file-scan/report.html?id=735f4c005ca44073130562e5fd4ac71aabc130ea27a42deddc8247507fa46985-1298938595
Submission date:2011-03-01 00:16:35 (UTC)
Result:7/ 42 (16.7%)
AntiVir 7.11.4.13 2011.02.28 TR/Dropper.Gen
BitDefender 7.2 2011.03.01 Trojan.CryptRedol.Gen.3
F-Secure 9.0.16160.0 2011.03.01 Trojan.CryptRedol.Gen.3
GData 21 2011.03.01 Trojan.CryptRedol.Gen.3
Norman 6.07.03 2011.02.28 W32/Malware
nProtect 2011-02-10.01 2011.02.15 Trojan.CryptRedol.Gen.3
Sophos 4.61.0 2011.02.28 Sus/UnkPack-C
Show all
MD5 : 1f4e6cad1513e9e7765ef50bce4837b0
SHA1 : 0dc6e154341e0331a982e657944998fb06f32370
Submission date:2011-03-01 00:16:35 (UTC)
Result:7/ 42 (16.7%)
AntiVir 7.11.4.13 2011.02.28 TR/Dropper.Gen
BitDefender 7.2 2011.03.01 Trojan.CryptRedol.Gen.3
F-Secure 9.0.16160.0 2011.03.01 Trojan.CryptRedol.Gen.3
GData 21 2011.03.01 Trojan.CryptRedol.Gen.3
Norman 6.07.03 2011.02.28 W32/Malware
nProtect 2011-02-10.01 2011.02.15 Trojan.CryptRedol.Gen.3
Sophos 4.61.0 2011.02.28 Sus/UnkPack-C
Show all
MD5 : 1f4e6cad1513e9e7765ef50bce4837b0
SHA1 : 0dc6e154341e0331a982e657944998fb06f32370
Network activity
TCP
61.7.158.11:80
61.7.158.11:80
61.7.158.11:443
Hostname: 61.7.158.11
ISP: CAT Telecom public company Ltd
Organization: CAT Telecom public company Ltd
Country: Thailand
State/Region: Krung Thep
City: Bangkok
ISP: CAT Telecom public company Ltd
Organization: CAT Telecom public company Ltd
Country: Thailand
State/Region: Krung Thep
City: Bangkok
http://www.projecthoneypot.org/ip_61.7.158.11 - bad record on that ip
The binary does not download anything, the link gives 404-not found error. However, it successfully beacons on port 443
Download pcap here
Hi Mila
ReplyDeleteThe svchost.exe (bin2) is launched by the original executable binary (bin1) dropped by the Doc exploit. The SVCHOST.exe takes the path of the original binary as an argument, and is started into a suspended state.
The body of the svchost.exe (bin2) is then replaced by a decrypted seg inside bin1, before svchost is resumed from suspension.
svchost.exe here is nothing like the svchost.exe on disk and at launch. You already have the strings from the svchost.exe in memory in your blog.
Thank you for sharing the files. Cheers.
It is very interesting, thank you for the comment.
ReplyDeleteI have another variant - same payload but different alive C&C and more activity but did not get around to post yet. Email me if you want it.