Reader Vince asked for help with the analysis of a malicious Word document. He started the analysis himself, following the method I illustrated in diary entry "Word maldoc: yet another place to hide a command". In the diary entry followed by Vince, I search for a VBA string, that is a string delimited with double quotes: "j9tmrnmi". Because this VBA string is used to identify an object that we can find in the streams of the OLE file. That is why the method followed by Vince does not work for this sample. You need to find the value of the variable, for example by reverse engineering the VBA statements and then calculate the value accordingly. But there is also a "quick-and-dirty" method that I illustrated in diary entry "Quickie: String Analysis is Still Useful": just search for long strings (printable character sequences) in the document file, regardless of the internal file structure.
This command-line statement selects characters from the string in red using indices in yellow: to build the following command: I used Python to do the indexing and concatenation to decode the PowerShell command:
Notice that this downloader tries 5 URLs:
to download an Emotet variant. Didier Stevens |
DidierStevens 533 Posts ISC Handler Dec 12th 2018 |
Thread locked Subscribe |
Dec 12th 2018 2 years ago |
Sign Up for Free or Log In to start participating in the conversation!