2019-03-29 - QUICK POST: MALSPAM USING PASSWORD-PROTECTED WORD DOCS PUSHES DRIDEX
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2019-03-29-example-of-email.zip 41.8 kB (41,759 bytes)
 - 2019-03-29-password-protected-Word-docs-14-examples-over-three-days.zip 548 kB (548,056 bytes)
 - 2019-03-29-password-protected-Word-doc-pushes-Dridex.pcap.zip 2.9 MB (2,928,558 bytes)
 - 2019-03-29-password-protected-word-docs-malware-and-artifacts.zip 2.0 MB (1,958,094 bytes)
 
NOTES:
- As early as Monday 2019-03-25, resume-themed malspam with password-protected Word docs started using updated macros with different infection characteristics.
 - Prior to 2019-03-25, the follow-up EXE retrieved by the Word macro was saved to the user's AppData\Local\Temp directory as qwerty2.exe.
 - But today's example was saved to the user's AppData\Local\Temp directory as inboxmvprocessingpersianbearinglegitimate.exe.
 - We are also seeing a different URL used for the initial EXE download than we've seen during the past few weeks.
 - Also since sometime last week, I've been seeing Dridex as the follow-up malware distributed through this campaign.
 
MALSPAM

Shown above:  Example of the malspam (still typical for this campaign).
UNLOCKED ATTACHMENT

Shown above:  Attached Word doc after using the password to unlock it.

Shown above:  Macro extracted from the attached Word document.

Shown above:  URL and downloaded file name are backwards in the VB script from the macro.
TRAFFIC

Shown above:  Traffic from the infection filtered in Wireshark.

Shown above:  Certificate data from post-infection traffic caused by Dridex (1 of 2).

Shown above:  Certificate data from post-infection traffic caused by Dridex (2 of 2).

Shown above:  Other post-infection traffic from the Dridex-infected Windows host.
MALWARE

Shown above:  Initial executable retrieved by the Word macro.

Shown above:  One of the Dridex DLL files persistent on the infected Windows host.

Shown above:  Another of the Dridex DLL files persistent on the infected Windows host.
Click here to return to the main page.
