Common Vulnerabilities and Exposures (CVE)number
CVE-2010-3333
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003
SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office
for Mac 2011, and Open XML File Format Converter for Mac allows remote
attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack
Buffer Overflow Vulnerability
Please read a technical analysis of this vulnerability on the Microsoft Threat Research & Response Blog Targeted attacks against recently addressed Microsoft Office vulnerability (CVE-2010-3333/MS10-087) 29 Dec 2010 12:10 PM
General File Information
File Materials.doc
MD5 2EEA004842A335607B612FF10418F6C6
SHA1 a81a35804c056186c533ddd31e22ee0c0d2aa4df
File size : 243663
Type: DOC
Distribution: Email attachment
Post Update
February 7, 2010
There was another mailing after the first one but from a different location.
From: Anne Principe [mailto:anne.principe@yahoo.com]
Sent: Friday, January 21, 2011 6:54 AM
To: XXXXXXXXXXXXX
Subject: This is the materials you need
This is The Materials I told you about. Please check it and reply as soon as possible.
Best
Headers
Received: (qmail 736 invoked from network); 21 Jan 2011 11:54:30 -0000
Received: from web120514.mail.ne1.yahoo.com (HELO web120514.mail.ne1.yahoo.com) (98.138.85.241)
by XXXXXXXXXXXXXXXXX; 21 Jan 2011 11:54:30 -0000
Received: (qmail 38488 invoked by uid 60001); 21 Jan 2011 11:54:29 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1295610869; bh=T6PYZhAJBvHdbMDRjYJCy748DpISxb703J9WYvNrE8M=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type; b=KNLZKhWTr+Z+UMtiMC6dY7GmKt49wyNHC8Y1j8kv5f/KM8u7bs6ifqGFNhwckx18edFsi+ajzhsNM01R8UN+ox/r9Ss6ut/Mssll5hxwtBHXEmvIxrl8dFTUg/CmMgSjJNhW6KlOZfVkUU2nikWaMzxkqSgTJ9JCM828Qw1xZbM=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=s1024; d=yahoo.com;
h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=eqwO+5NenEdsqmjuNowZ25VlFcli8zNaedc26kn00QeqFLcMxeSuTDB+vYhmeUYJfAYe+fZ13q8p1qKILMX0AMH7/MDwbeBOBaRL8xTf33LpWE4KwgeYq4uEKjZfptSRvA6RrpPHjDLWoE55D0uAMGV/hMk50g7s/eGes9VnAc0=;
Message-ID: <416336.37770.qm@web120514.mail.ne1.yahoo.com>
X-YMail-OSG: duFcYVsVM1lbQScN.uiS.a_.kSCtbZmEsYYlwKxqs50olw9
S80HwIFK3gqCA7OM9LSU.JBWKbHZXNzNbBWlx1y8__meJqFUjCoB3qTY9ll4
79Y_9XKC5KZXY6_OTA6RVB1j8NwW8Ozasz_xzbX5Ajh.yX7Y2NqePEUnApDc
pWb0wpspWrIpPe9w9gzbAfrYmQRTXiyQtlxFjd_gk272zbKkWkcTAtxtFsiY
UjAwiofHbox4vUrwVCekO.jf11bo-
Received: from [211.55.34.205] by web120514.mail.ne1.yahoo.com via HTTP; Fri, 21 Jan 2011 03:54:29 PST
X-Mailer: YahooMailRC/555 YahooMailWebService/0.8.107.285259
Date: Fri, 21 Jan 2011 03:54:29 -0800
From: Anne Principe
Subject: This is the materials you need
To: XXXXXXXXXXXXXXXXXXX
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="0-1514884592-1295610869=:37770"
211.55.34.205
Hostname: 211.55.34.205
ISP: KRNIC
Organization: Korea Telecom
Country: Korea
State/Region: Soul-t'ukpyolsi
City: Seoul
Download
Download -Materials.doc and created files listed below as a password protected archive (contact me if you need the password)
Download pcap file
The
message came from a Yahoo mail account, which was accessed/used from 216.183.175.3, which happens to be a Small Business server belonging to Cleveland Council on World Affairs
The word doc contains embedded encrypted executable and has proven ability to bypass most enterprise AV filters.
The files created by the malicious attachment generate traffic to a server in Singapore Newmedia Express Pte Ltd Singapore Web Hosting
Upon opening, the doc file will dispay a resume.
The trojan that gets installed is designed for stealing information from the infected computer
The word doc contains embedded encrypted executable and has proven ability to bypass most enterprise AV filters.
The files created by the malicious attachment generate traffic to a server in Singapore Newmedia Express Pte Ltd Singapore Web Hosting
Upon opening, the doc file will dispay a resume.
The trojan that gets installed is designed for stealing information from the infected computer
File Analysis
For the shellcode, see this post by @binjo (Genwei Jiang) https://github.com/binjo/misc/blame/master/x0.html
plus a few details here https://www.vicheck.ca/md5query.php?hash=2eea004842a335607b612ff10418f6c6
Original Message
From: John Resig [mailto:johnresig37@yahoo.com]
Sent: Thursday, January 20, 2011 6:54 AM
To: XXXXXXX
Subject: Materials you need
Hi XXXXXXXXXX
This is The Materials I told you about. Please check it and reply as soon as possible.
Yours
Received: from XXXXXXXXXXXXXXXXXXXX by XXXXXXXXXXXXXXXXXX
(XXXXXXXXXXXXXXXXXX) Thu, 20 Jan 2011
06:54:26 -0500
X-VirusChecked: Checked
X-Env-Sender: johnresig37@yahoo.com
X-Msg-Ref: XXXXXXXXXXXXXXXXXXXXX
X-StarScan-Version: 6.2.9; banners=-,-,-
X-Originating-IP: [98.138.82.220]
X-SpamReason: No, hits=0.0 required=7.0 tests=HTML_MESSAGE
Received: (qmail 30083 invoked from network); 20 Jan 2011 11:54:25 -0000
Received: from web120713.mail.ne1.yahoo.com (HELO
web120713.mail.ne1.yahoo.com) (98.138.82.220) by
XXXXXXXXXXXXXXXXXXXXXXXXXXX with SMTP; 20 Jan 2011 11:54:25 -0000
Received: (qmail 29995 invoked by uid 60001); 20 Jan 2011 11:54:24 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1295524464; bh=0LiA/GFk0fBVixLkc6Lv0daaDswB4Y6aZuGINXe6QzQ=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=HEgHjHUk4oArhL3nePrfCSImQkCcwMoLp7uIaxs9kTMrfSiptgmIPEOlze4U+nDekuQgyHZpuF+E7VN2sOPJLsDyCs9XR4Crpx40ERF260xQZGQrNK9dFRdq1FeN0sCF2BY3cImaBw8c5jH8G98KFWdE9P1YMeHrHBP53xcQfF8=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=s1024; d=yahoo.com;
h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=UPbHxJjJgBCSWCkGYaikDD5YLYJNOWO4ai28rueC9j3MJ0ONCwnf1zPHGMXdHIiUmfYcxo+bsYntj0W3RHdAjwNlnsN0uMKx0l+5s4xaNU922rcEEEO0MWWvJuizPwwWTbLs6ADervut68ylvaS+y7k6ne4qkPv/DyBF/inUYtc=;
Message-ID: <503427.29909.qm@web120713.mail.ne1.yahoo.com>
X-YMail-OSG: qTj3pWkVM1kmufcLulCg4tP_uqiyEH7rDjuPI2A0J0G6ff3
omr2jR9.0gS2ERYOZNEX.MJBapzDek_EEhzG5tgvyUWtFt7BeEDTb7q4OyoA
Omqszx4XdIUCYog1YVN79KaTicCO7vdYZwoBpC8A171yy_h.5zzgIMNhn977
WxbI9CK58yNDuwfYEZWDbB4EpXGliPmpOYgbP.w--
Received: from [216.183.175.3] by web120713.mail.ne1.yahoo.com via HTTP; Thu,
20 Jan 2011 03:54:24 PST
X-Mailer: YahooMailRC/555 YahooMailWebService/0.8.107.285259
Date: Thu, 20 Jan 2011 03:54:24 -0800
From: John Resig
Subject: Materials you need
To: XXXXXXXXXXXXXXXXXXXXXX
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="0-262391507-1295524464=:29909"
Return-Path: johnresig37@yahoo.com
X-MS-Exchange-Organization-PRD: yahoo.com
Received-SPF: None XXXXXXXXXXXX: johnresig37@yahoo.com does not
designate permitted sender hosts)
X-MS-Exchange-Organization-SenderIdResult: NONE
(XXXXXXXXXXXXXXXXXX) Thu, 20 Jan 2011
06:54:26 -0500
X-VirusChecked: Checked
X-Env-Sender: johnresig37@yahoo.com
X-Msg-Ref: XXXXXXXXXXXXXXXXXXXXX
X-StarScan-Version: 6.2.9; banners=-,-,-
X-Originating-IP: [98.138.82.220]
X-SpamReason: No, hits=0.0 required=7.0 tests=HTML_MESSAGE
Received: (qmail 30083 invoked from network); 20 Jan 2011 11:54:25 -0000
Received: from web120713.mail.ne1.yahoo.com (HELO
web120713.mail.ne1.yahoo.com) (98.138.82.220) by
XXXXXXXXXXXXXXXXXXXXXXXXXXX with SMTP; 20 Jan 2011 11:54:25 -0000
Received: (qmail 29995 invoked by uid 60001); 20 Jan 2011 11:54:24 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1295524464; bh=0LiA/GFk0fBVixLkc6Lv0daaDswB4Y6aZuGINXe6QzQ=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=HEgHjHUk4oArhL3nePrfCSImQkCcwMoLp7uIaxs9kTMrfSiptgmIPEOlze4U+nDekuQgyHZpuF+E7VN2sOPJLsDyCs9XR4Crpx40ERF260xQZGQrNK9dFRdq1FeN0sCF2BY3cImaBw8c5jH8G98KFWdE9P1YMeHrHBP53xcQfF8=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=s1024; d=yahoo.com;
h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=UPbHxJjJgBCSWCkGYaikDD5YLYJNOWO4ai28rueC9j3MJ0ONCwnf1zPHGMXdHIiUmfYcxo+bsYntj0W3RHdAjwNlnsN0uMKx0l+5s4xaNU922rcEEEO0MWWvJuizPwwWTbLs6ADervut68ylvaS+y7k6ne4qkPv/DyBF/inUYtc=;
Message-ID: <503427.29909.qm@web120713.mail.ne1.yahoo.com>
X-YMail-OSG: qTj3pWkVM1kmufcLulCg4tP_uqiyEH7rDjuPI2A0J0G6ff3
omr2jR9.0gS2ERYOZNEX.MJBapzDek_EEhzG5tgvyUWtFt7BeEDTb7q4OyoA
Omqszx4XdIUCYog1YVN79KaTicCO7vdYZwoBpC8A171yy_h.5zzgIMNhn977
WxbI9CK58yNDuwfYEZWDbB4EpXGliPmpOYgbP.w--
Received: from [216.183.175.3] by web120713.mail.ne1.yahoo.com via HTTP; Thu,
20 Jan 2011 03:54:24 PST
X-Mailer: YahooMailRC/555 YahooMailWebService/0.8.107.285259
Date: Thu, 20 Jan 2011 03:54:24 -0800
From: John Resig
Subject: Materials you need
To: XXXXXXXXXXXXXXXXXXXXXX
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="0-262391507-1295524464=:29909"
Return-Path: johnresig37@yahoo.com
X-MS-Exchange-Organization-PRD: yahoo.com
Received-SPF: None XXXXXXXXXXXX: johnresig37@yahoo.com does not
designate permitted sender hosts)
X-MS-Exchange-Organization-SenderIdResult: NONE
Sender
IP Information for 216.183.175.3
IP Location: | United States Cleveland Continental Broadband Pennsylvania Inc |
Resolve Host: | mail.ccwa.org |
IP Address: | 216.183.175.3 Cleveland Council on World Affairs (via yahoo account) |
NetRange: 216.183.160.0 - 216.183.191.255
CIDR: 216.183.160.0/19
OriginAS:
NetName: CBP
NetHandle: NET-216-183-160-0-1
Parent: NET-216-0-0-0-0
NetType: Direct Allocation
NameServer: AUTH1.DNS.EXPEDIENT.COM
NameServer: AUTH2.DNS.EXPEDIENT.COM
NameServer: AUTH3.DNS.EXPEDIENT.COM
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2000-09-07
Updated: 2007-05-22
Ref: http://whois.arin.net/rest/net/NET-216-183-160-0-1
OrgName: CONTINENTAL BROADBAND PENNSYLVANIA, INC.
OrgId: CBP-17
Address: 810 Parish St
City: Pittsburgh
StateProv: PA
PostalCode: 15220
Country: US
CIDR: 216.183.160.0/19
OriginAS:
NetName: CBP
NetHandle: NET-216-183-160-0-1
Parent: NET-216-0-0-0-0
NetType: Direct Allocation
NameServer: AUTH1.DNS.EXPEDIENT.COM
NameServer: AUTH2.DNS.EXPEDIENT.COM
NameServer: AUTH3.DNS.EXPEDIENT.COM
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2000-09-07
Updated: 2007-05-22
Ref: http://whois.arin.net/rest/net/NET-216-183-160-0-1
OrgName: CONTINENTAL BROADBAND PENNSYLVANIA, INC.
OrgId: CBP-17
Address: 810 Parish St
City: Pittsburgh
StateProv: PA
PostalCode: 15220
Country: US
Automated Scans
File name:Materials.dochttp://www.virustotal.com/file-scan/report.html?id=68f10c2f8a484fcecdbbaa69cf01caf3d3bb725f66e7db00cd30c3d84a5c6af4-1295557632
Result:3 /43 (7.0%)
Avast 4.8.1351.0 2011.01.20 RTF:CVE-2010-3333
Avast5 5.0.677.0 2011.01.20 RTF:CVE-2010-3333
GData 21 2011.01.20 RTF:CVE-2010-3333
Show all
MD5 : 2eea004842a335607b612ff10418f6c6
SHA1 : a81a35804c056186c533ddd31e22ee0c0d2aa4df
SHA256: 68f10c2f8a484fcecdbbaa69cf01caf3d3bb725f66e7db00cd30c3d84a5c6af4
ssdeep: 3072:G0sQabH8jbvZwI32Vu4xiW3gKKZhXhZs65XgpO:nPwI32VuUiWQKKDXhi6K0
File size : 243663 bytes
First seen: 2011-01-20 21:07:12
Last seen : 2011-01-20 21:07:12
Magic: Rich Text Format data, version 1, unknown character set
TrID:
Rich Text Format (100.0%)
Materials.doc
Avast 4.8.1351.0 2011.01.20 RTF:CVE-2010-3333
Avast5 5.0.677.0 2011.01.20 RTF:CVE-2010-3333
GData 21 2011.01.20 RTF:CVE-2010-3333
Show all
MD5 : 2eea004842a335607b612ff10418f6c6
SHA1 : a81a35804c056186c533ddd31e22ee0c0d2aa4df
SHA256: 68f10c2f8a484fcecdbbaa69cf01caf3d3bb725f66e7db00cd30c3d84a5c6af4
ssdeep: 3072:G0sQabH8jbvZwI32Vu4xiW3gKKZhXhZs65XgpO:nPwI32VuUiWQKKDXhi6K0
File size : 243663 bytes
First seen: 2011-01-20 21:07:12
Last seen : 2011-01-20 21:07:12
Magic: Rich Text Format data, version 1, unknown character set
TrID:
Rich Text Format (100.0%)
Materials.doc
I think mailware is similar to the one described here
http://www.threatexpert.com/report.aspx?md5=82e455cb548f392c90246d472077b8fc
Partial Registry changes
It starts MSDTC service, - Distributed Transaction Coordinator and sets it to Auto start
HKLM\SYSTEM\ControlSet001\Services\MSDTC\Start: 0x00000003
HKLM\SYSTEM\ControlSet001\Services\MSDTC\Start: 0x00000002
HKLM\SYSTEM\ControlSet001\Services\MSDTC\ObjectName: "NT AUTHORITY\NetworkService"
HKLM\SYSTEM\ControlSet001\Services\MSDTC\ObjectName: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Control\ServiceCurrent\: 0x0000000B
HKLM\SYSTEM\CurrentControlSet\Control\ServiceCurrent\: 0x0000000C
Files created
%system%\oci.dll
Size: 48640
File: oci.dll (same name and location where Oracle client would have oci.dll (Oracle Call Interface), except this file has no resemblance to the real ocil.dll. I am not sure if installed Oracle software would change the behavior of the trojan.
There is an Alternate Data Stream (ADS) attached to the file, possibly to accept some logs from the system before transmitting them to the attacker. I did not run it long enough to tell exactly but currently there is no data that I can see
Stream Name | Filename | Full Stream Name | Stream Size | Stream Allocated Size |
---|---|---|---|---|
: SummaryInformation:$DATA | C:\WINDOWS\temp\uid.ax | C:\WINDOWS\temp\uid.ax: SummaryInformation | 88 | 4,096 |
:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d}:$DATA | C:\WINDOWS\temp\uid.ax | C:\WINDOWS\temp\uid.ax:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} | 0 | 0 |
Network activity
Download pcap file [-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] DNS Queries: Name: [ update3.effers.com ], Query Type: [ DNS_TYPE_A ], Query Result: [ 202.150.208.227 ], Successful: [ 1 ], Protocol: [ udp ] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] HTTP Conversations: to 202.150.208.227:80 - recorded transmission of data like user name and system info IP Location: |
Singapore Singapore Newmedia Express Pte Ltd Singapore Web Hosting |
Resolve Host: | 202-150-208-227.rev.ne.com.sg |
IP Address: | 202.150.208.227 |
Reverse IP: | 1 website uses this address. (example: budai125.net) |
inetnum: 202.150.208.0 - 202.150.223.255
netname: NEWMEDIAEXPRESS-AP
descr: NewMedia Express Pte Ltd, Singapore Web Hosting
country: SG
admin-c: SW640-AP
tech-c: SW640-AP
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be updated by APNIC hostmasters.
remarks: To update this object, please contact APNIC
remarks: hostmasters and include your organisation's account
remarks: name in the subject line.
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
changed: 20070118
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-SG-NEWMEDIAEXPRESS
source: APNIC
person: Shian Loong Woo
nic-hdl: SW640-AP
e-mail:
address: 25 Kallang Avenue
address: #05-04
address: Singapore 339416
phone: +65 63967188
fax-no: +65 63967189
country: SG
changed: 20110107
mnt-by: MAINT-SG-NEWMEDIAEXPRESS
source: APNIC
netname: NEWMEDIAEXPRESS-AP
descr: NewMedia Express Pte Ltd, Singapore Web Hosting
country: SG
admin-c: SW640-AP
tech-c: SW640-AP
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be updated by APNIC hostmasters.
remarks: To update this object, please contact APNIC
remarks: hostmasters and include your organisation's account
remarks: name in the subject line.
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
changed: 20070118
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-SG-NEWMEDIAEXPRESS
source: APNIC
person: Shian Loong Woo
nic-hdl: SW640-AP
e-mail:
address: 25 Kallang Avenue
address: #05-04
address: Singapore 339416
phone: +65 63967188
fax-no: +65 63967189
country: SG
changed: 20110107
mnt-by: MAINT-SG-NEWMEDIAEXPRESS
source: APNIC
No comments:
Post a Comment