CVE-2017-8759 remains popular this week in malspam world with more malicious documents trying to exploit non patched systems to deliver their payload [1][2]. This time the payload is a MoonWind variant. MoonWind is a Remote Access Trojan. It was first uncovered by security researchers at PaloAlto Networks Unit 42 in their blog post about targeted attacks against organizations in Thailand [3].
In this threat advisory we will go over the network and host behavior in RSA NetWitness Packets and Endpoint.
Upon opening the malicious readme.rtf in Microsoft Word, there was the request for the SOAP payload:
Next comes the request to download the HTA script:
The script is executed and a binary is downloaded:
The binary is executed and it downloads a dropper:
For the downloader process (httpx.exe), NetWitness Endpoint has more information about its strings, its tracking data, its path and its network connectivity:
NetWitness Endpoint generates the following IIOC for httpx.exe:
The dropper (invo.exe) drops a MoonWind variant (svcohos.exe) to the infected machine. It runs a batch file to delete itself:
The new process (svcohos.exe) copies itself to a new location, gains persistency on the system and starts to communicate with its command and control server:
NetWitness Endpoint generates the following IIOC for svcohos.exe:
However, the infected system failed to establish a connection with the C2 server. Here is a recap of the network traffic:
and here is another look at the process tree:
readme.rtf (SHA256):
httpx.exe (SHA256):
svcohos.exe (SHA256):
References:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.