Recently I have received few random emails attached with calendar invites from random email and unknow email ids in CC. These arrived in my inbox insteas of spam. Though, later I moved them to spam box.
Email Attachment:
File type: Calendar invite
File Extesion: .ICS
I have uploaded the ics attachment to Virus Total but no AV vedor detected it as malicious yet.
I have opened ics file in notepad and can see clearly there is URL direction to domain http: // ngsl7. bemobtrcks. com
When I opened the URL “http: // ngsl7. bemobtrcks. com” in browser, it redirects to “http :// receivepayment[.]fun” website and again redirect to “https: // bitcoinwallet. xyz” to “https: // paysitecash. paywest . net” website. Redirection of websites always changed and may land on different website each time I accessed the main URL.
Below screenshot one of the website it redirects.
When it opens up bitcoinwallet [.] receivepayment [.] xyz. It shows bad potential traffic.
There is bad malicious traffic mentioned by any.run because its using Lets encrypt encryption for for suspicious domain.
These are confirmed phishing emails. Calendar invites may bypass traditional email filters, making it easier for phishing emails using this method to reach users’ inboxes and this is what happening.
Below are the network connections getting established opening .ics file to domains.
ngsl7[.]bemobtrcks [.]com
receivepayment [.] fun
ctldl [.] windowsupdate [.] com
bitcoinwallet [.] receivepayment [.] xyz
IOC:
MD5: 264D98086A88D5A57E917EFBCFC36F87
MD5: 4187D230F6D850024E8B678B783F4464
MD5: F1C401645FAD5274AB7B86857E4CAF84
Summary:
These are cyrpto related phishing emails.
If such emails (.ics attached) from unknow sender, better to ignore.
It also drops Autoexec.bat.exe file and Autoexec.exe files at C:\ location. (But it didn’t drop these files instead it dropped AutoRun.INF and AutoRun.exe)
Also found computer username emartinez in path to PDB file, that means this file must be compiled on a machine under this user account.
and username janettedoe in another path to startup programs
I executed this PE file for dynamic analysis. I found this file dropped Helpme.exe, AutoRun.INF same location I have seen in hex code.
I did rename C:\$Recycle.Bin\S-1-5-18\desktop.ini file to desktop.ini.exe and double click to execute it. It has given error Cannot create file “C:\Windows\System32\HelpMe.exe
Then I executed desktop.ini.exe file with administrative privilege (before execute this file I had commented AutoRun.exe file at location C:\) and this file executed C:\Windows\System32\HelpMe.exe which dropped file AutoRun.exe at location C:\
I disassembled AutoRun.exe file and found this creates file Soft.lnk which again has path to execute HelpMe.exe on windows startup.
Below soft.lnk has comment Stone, I hate you! this file has target to execute AUTORUN.INF.exe
No internet connectivity has been tested from this malware, as this analysis done offline.
I have downloaded JS trojan downloader from VirusSign to analyze behavior of this malware. It was a zip file INC_0987155124US_Apr_19_2019.zip and after extracting it, I got .js file.
On opening JS file in notepad, i saw base64 obfuscated string. After obfuscation JS script, I found, this file has multiple sources/ URL’s to download SHA256- d6798b62cef08c4f61a30dfa346faf5aa29f9d03e4599ebe5ae910a193087b86
Below are the URL’s used in JS to download malicious executable files.
Below is JS code where it goes to the URL to check whether it’s up else will check another URL to get the malware downloaded on user’s machine.
I tried to accessed all four URL’s used in JS script and could able to download malicious .exe files from three of them. One URL was inaccessible.
Below are executable files downloaded from URL’s.
When I checked the version and hash of all three files, all were same.
Behavior of executable file:
On execution, file get created under C:\Windows\SysWow64 directory under name sourcematrix.exe.
and it also adds to the windows services (services.msc).
Wireshark log shows this malware executable connects to IP address 5[.]230[.]147[.]179