"The "taskmgr.exe" embedded from offset 0x24E00. The exe is XOR'ed with 64 bit key 0xCA5039AF00000000. If you XOR the file again with same key you'll find the exe headers at offset 0x24E00." Please see his screenshot below
Download the following files as a password protected archive. (Please contact me if you need the password)
├───analysis files (by Tom - see below)
│ exe (taskmgr.ex 441D239744D05B861202E3E25A2AF0CD 32,768 bytes; taskmgr.idb)
│ shell (shel1.bin; shel1.idb; shel2.bin; shel2.idb)
├───collected
│ 1.tmp 441D239744D05B861202E3E25A2AF0CD 32,768 bytes
│ Taiwan 2010.doc 85AF26A74E548B56ADEA933CFB878520 52,224 bytes
│ taskmgr.exe 441D239744D05B861202E3E25A2AF0CD 32,768 bytes
└───original doc
Taiwan 2010.doc 9EF09819AA5D552ECB15067A14A33152 183,808 bytes
Sent: Monday, February 22, 2010 4:17 AM
To: diguapinggao@gmail.com
Subject: Taiwan 2010
Virustotal
http://www.virustotal.com/analisis/0f57baeb3070bf7a806f004ab61243aaf1b16f328e0c5f96d0c9128294d95b2c-1266926867
File Taiwan_2010.doc received on 2010.02.23 12:07:47 (UTC)
Result: 8/41 (19.52%)
Authentium 5.2.0.5 2010.02.23 MSWord/Dropper.B!Camelot
Avast 4.8.1351.0 2010.02.23 MPPT97:ShellCode-A
Fortinet 4.0.14.0 2010.02.21 MSWord/Agent.Y!exploit
GData 19 2010.02.23 MPPT97:ShellCode-A
Jiangmin 13.0.900 2010.02.23 Exploit.MSWord.b
McAfee-GW-Edition 6.8.5 2010.02.23 Heuristic.BehavesLike.Exploit.OLE2.CodeExec.EBKP
Panda 10.0.2.2 2010.02.22 Trj/1Table.C
Sophos 4.50.0 2010.02.23 Troj/MalDoc-Fam
File size: 183808 bytes
MD5...: 9ef09819aa5d552ecb15067a14a33152
OfficeMalScanner results
/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--/--
Analysis by Tom (thank you, Tom)---------------------------
Shellcode in hex
obfuscated shellcode
Shellcode 1
EXE - taskmgr.exe
before and after transposition.
Virustotal scan results
http://www.virustotal.com/analisis/d4340b59ef53951316d66f2f171029c7dba363d9fd0c2f4f828544583405a944-1266988204
File taskmgr.ex received on 2010.02.24 05:10:04 (UTC)
Result: 1/41 (2.44%)
Symantec 20091.2.0.41 2010.02.24 Suspicious.Insight
Additional information
File size: 32768 bytes
MD5 : 441d239744d05b861202e3e25a2af0cd
================================================
Screenshot from Abhishek Lyall
Additional information:
Connections
Dropped file tskmgr.exe establishes connection with xwwl8899.vicp.net hosted a server in China
information from robtex.com
Hostname: 218.23.30.101
ISP: CHINANET Anhui province network
Organization: CHINANET Anhui province network
Country: China
State/Region: Anhui
Wireshark capture
DNS queries and TCP connections to 218.23.30.101:80
wwl8866.vicp.net has one IP number. vicp.net is a domain controlled by two nameservers at dnsoray.net. They are on different IP networks. vicp.net has one IP number. xwwl8866.vicp.net is hosted on a server in China. It is not listed in any blacklists.
xwwl8866.vicp.net point to 218.23.30.101. It is blacklisted in four lists.
- dev.null.dk
- spamsources.fabel.dk
- spam.dnsbl.sorbs.net - List of hosts that have been noted as sending spam/UCE/UBE to the admins of SORBS. This zone also contains netblocks of spam supporting service providers, this could be for providing websites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be blocked.
- no-more-funn.moensted.dk
inetnum: 218.22.0.0 - 218.23.255.255
netname: CHINANET-AH
country: CN
descr: CHINANET Anhui province network
descr: Data Communication Division
descr: China Telecom
admin-c: CH93-AP
tech-c: AT318-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-AH
changed: hm-changed@apnic.net 20060322
source: APNIC
role: ANHUI TELECOM
address: 305 Changjiang West Road
address: Hefei Anhui China
country: CN
phone: +86 0551 5185089
fax-no: +86 0551 5185500
e-mail: wanglinlin2@anhuitelecom.com
trouble: send spam reports to abuse@ah163.com
trouble: and abuse reports to abuse@ah163.com
trouble: Please include detailed information and
trouble: times in GMT+8:00
admin-c: LW604-AP
tech-c: LW604-AP
nic-hdl: AT318-AP
remarks: http://www.ah163.net
notify: wanglinlin2@anhuitelecom.com
mnt-by: MAINT-CHINANET-AH
changed: wanglinlin2@anhuitelecom.com 20060323
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@ns.chinanet.cn.net
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
changed: dingsy@cndata.com 20070416
mnt-by: MAINT-CHINANET
source: APNIC
route: 218.22.0.0/15
descr: PNAP-SEA usei chinanet routes
origin: AS4134
mnt-by: INAP-MAINT-RADB
changed: swhitson@internap.com 20010524
source: RADB
====================================
Anubis report
http://anubis.iseclab.org/?action=result&task_id=1face8929a332692425ef0e12a533fa3a
Exe autostart
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value C:\Taskmgr.exe
Exe autostart
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value C:\Taskmgr.exe
No comments:
Post a Comment