Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
Recently, a proof-of-conceptemerged on how the filetype SettingContent can be abused when getting embedded in Microsoft Office Documents. SettingContent is a feature in Windows 10 which acts as a shortcut to different system settings. Legitimate examples of this can be found in %windir%\ImmersiveControlPanel\Settings (e.g. %windir%\ImmersiveControlPanel\Settings\CortanaSettings.settingcontent-ms will launch Microsoft's Cortana when double clicked). In response, Microsoft updated the Packager Activation listso that Office 365 can now block SettingContent within an OLE package.
As expected, malware authors found another way to utilize the same technique of delivering malicious files through the filetype SettingContent. However this time, they have it embedded in PDF files.
We recently came across PDF samples with embedded .SettingContent-ms getting spammed in the wild. Although the email body does contain any deceptive or luring pretext, the cleverly named attachment can mislead curious users to click on it thinking that the attachment is a legitimate invoice pdf.
Malware Analysis:
Upon execution of the PDF attachment "INV 60542183.pdf", an embedded javascript object will run. Acrobat will prompt the user with a security warning regarding another object "downl.SettingContent-ms" that is about to be opened. Once the user agrees, it will be saved at the %temp% folder and executed. Afterwards, this will be deleted by Acrobat from the system.
Figure 3: The javascript object uses exportDataObject to launch "downl.SettingContent-ms"
The object "downl.SettingContent-ms" is an XML file recognized in the system as filetype SettingContent. It contains a DeepLink element which will execute any code within the <DeepLink/> tag. In this case, the code invokes PowerShell to download a binary silently into the system, then execute as "%temp%\update12.exe".
The downloaded binary "%temp%\update12.exe" will connect to hxxp://169.239.128.164/sd87f67ds5gs7d5fs7df to fetch an encrypted blob and decrypt it as "%programdata%\Microsoft Help\wsus.exe". This is the final payload known as FlawedAmmyy version 3.
FlawedAmmyy is a remote access trojan that has the following features:
It can also retrieve system information and send them to the C&C.
Conclusion:
The exploitable component of SettingContent is its DeepLink element since any code in it will be executed without any warning to the user. As the misuse of SettingContent has been addressed by Microsoft, malware authors looked for another way to deliver their malicious intent using this filetype. Now, it's via PDF.
IOCs:
Filename |
Size (bytes) |
Sha256 |
Codename |
Download URL |
INV 60542183.pdf |
2,345 |
0A4F3F9ACC61B85183108A31A306115FE34B571240DA70920F0A1425FC32C3DE |
PDF Attachment |
- |
%temp%\update12.exe |
172,032 |
7db2e889b3156f3ebaea1340a129845b4935361e8cdcf92b430d64c96ac26014 |
Downloader |
hxxp://169.239.128.164/tov |
- |
665032 |
618A1942370F4F0725FB2A28D85B7ACA828051F50079D51364A9B8AA19108F8 |
Encrypted blob |
hxxp://169.239.128.164/sd87f67ds5gs7d5fs7df |
%programdata%\Microsoft Help\wsus.exe |
665032 |
56f1ab4b108cafcbada89f5ca52ed7cdaf51c6da0368a08830ca8e590d793498 |
FlawedAmmyy RAT |
- |
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.