Hancitor malspam was active today on 2018-12-05, and it went back to the older style of macros. Today showed 6.exe and 6.pif in the infected user's AppData\Local\Temp directory instead of werd.exe and wird.exe in the user's AppData\Roaming directory as shown in this diary. Files for today's infection with the older macros can be found here. My thanks, as always, to everyone who keeps an eye on Hancitor activity and reports about it on Twitter.
Today's diary reviews trends in recent malicious spam (malspam) pushing Hancitor.
Background: Malspam pushing Hancitor (also known as Chanitor or Tordal) is a long-running campaign. In recent months, we've often seen waves of Hancitor malspam 2 or 3 times each week. Infections from this malspam tend to follow predictable patterns, and have ended with Ursnif as the follow-up malware since the end of October 2018 (previously it had been Zeus Panda Banker).
Recent activity: After a wave of malspam on 2018-10-29, this campaign went silent, and we saw no new Hancitor malspam for one month. Last week on Thursday 2018-11-29, Hancitor malspam returned with changes to the macro code in the associated Word documents. Hancitor is still sending Ursnif as its follow-up malware.
Today's diary reviews an infection from Hancitor malspam seen on Tuesday 2018-12-04.
The email template for Tuesday's malspam was eFax-themed, which is something we've occasionally see from this campaign. No big surprises here. And the link to download a Word document follows the same pattern of ASCII characters at the end, where all characters after the = sign are an encoded string that represents the recipient's email address. I'm still not sure how to decode these strings.
Below is an example of the email headers from one of the messages on Tuesday:
Received: from lenoxia.com ([220.127.116.11]) by [removed] for [removed]; Tue, 04 Dec 2018 15:38:56 +0000 (UTC) Date: Tue, 04 Dec 2018 08:40:58 -0700 MIME-Version: 1.0 X-Mailer: iPad Mail (11D169b) Content-Transfer-Encoding: 7bit Subject: This is an automatic eFax Notification Message-ID: <1563DCE3.5F979EAC@lenoxia.com> From: "eFax, Inc." <email@example.com> Content-Type: text/html; charset="utf-8" TO: [removed] Reply-To: "eFax" <firstname.lastname@example.org>
At first glance, the downloaded Word document looks similar to those seen in previous waves of Hancitor malspam. Victims must enable macros to infect a vulnerable Windows host. However, the macros act noticeably different than before (more on that later).
Infection traffic follows the same patterns we've previously seen for Hancitor, except wotj additional infection traffic for Ursnif instead of Zeus Panda Banker. In this case, I also saw Tor traffic, which might be related to the Ursnif activity. An HTTP request to amalu[.]at returned an encoded binary about 2.2 MB in size, which matched a malware binary I found on the infected Windows host for Send Safe Enterprise (SSE) spambot malware. I also saw the UDP beaconing traffic associated with SSE spambot malware.
Forensics on the infected host
Unlike previous Hancitor Word docs, ever since Hancitor reappeared on 2018-11-29, the Word documents are noticeably larger, and they contain ASCII-based hex code that is decoded as two executable files dropped after enabling macros. These two executables are named werd.exe and wird.exe, and they're dropped to the user's AppData\Roaming directory. A folder also appeared in the AppData\Roaming directory with links copied from the desktop of my infected Windows host. I also saw folders named msohtmlclip and msohtmlclip1 that were created in the user's AppData\Local\Temp directory.
Ursnif was made persistent through about 14MB of ASCII code stored as Windows registry entries. This is normal for Ursnif infections, and I've exported a copy of these registry entries so people can review them. See the link at the end of this dairy to access the data.
Finally, SSE spambot malware was stored in the user's AppData\Local\Temp directory using random digits in the filename.
The following are indicators from an infected Windows host. Any malicious URLs, IP addresses, and domain names have been "de-fanged" to avoid any issues when viewing today's diary.
URL from the malspam text to download the initial Word document:
Hancitor infection traffic after enabling Word macros:
Ursnif infection traffic:
Tor traffic seen after the initial Hancitor and Ursnif activity:
Infected host retrieves SSE spambot malware:
UDP beacon caused by SSE spambot malware:
Malware from an infected Windows host:
3 email examples, a pcap of the infection traffic, and malware/artifacts associated with today's diary can be found here.
Dec 5th 2018
6 months ago