[nsp-sec] Bracing For Impact... MS08-067

Rob Thomas robt at cymru.com
Thu Oct 23 17:36:17 EDT 2008


Hey, Nick.

Great stuff, thanks!

> HTTP check in:
> 59.106.145.58

We see two samples with this action in them.

SHA1 fb486ee69baacb57e07f614a67a5586395f57be4
MD5 ccbb73c5f137335fa2a49d7f79722a6c

It creates the following files:

   C:\Documents and Settings\LocalService\Local Settings\Temporary
Internet Files\macnabi.log
   C:\WINDOWS\system32\wbem\basesvc.dll
   C:\WINDOWS\system32\wbem\syicon.dll
   C:\WINDOWS\system32\wbem\winbase.dll

We see three DNS RR lookups, A RR queries all:

   doradora.atzend.com
   perlbody.t35.com
   summertime.1gokurimu.com

The malware then performs three distinct HTTP GETs (the first is repeated):

   h x x p : / / 59.106.145.58/test2.php?abc=2?def=2
   h x x p : / / perlbody.t35.com/icon.php
   h x x p : / / doradora.atzend.com/icon.php

Interesting AV results - on 2008-10-09 05:32:23 UTC four AV packages
tagged this one as at least suspicious.  As of 2008-10-22 02:51:45 UTC
only two AV packages tag this as at least suspicious.

SHA1 be71878c08544e093ab41f245c32e76259181bf8
MD5 f173007fbd8e2190af3be7837acd70a4

As of 2008-10-23 18:02:02 UTC at least four AV packages tag this sample
as suspicious.

The malware creates the following files:

   C:\DOCUME~1\user\LOCALS~1\Temp\FPMOOWRB.bat
   C:\WINDOWS\system32\wbem\sysmgr.dll

It launches cmd.exe with the batch file as input.  Ultimately in the
chain of subsequently launched processes, it creates:

   C:\WINDOWS\system32\basesvc.dll
   C:\WINDOWS\system32\inetproc02x.cab
   C:\WINDOWS\system32\install.bat
   C:\WINDOWS\system32\scm.bat
   C:\WINDOWS\system32\syicon.dll
   C:\WINDOWS\system32\winbase.dll
   C:\WINDOWS\system32\winbaseInst.exe

It performs DNS queries for:

   doradora.atzend.com
   perlbody.t35.com
   summertime.1gokurimu.com

Some similar HTTP GETs:

   h x x p : / / 59.106.145.58/test2.php?abc=2?def=2
   h x x p : / / perlbody.t35.com/icon.php
   h x x p : / / summertime.1gokurimu.com/icon.php
   h x x p : / / doradora.atzend.com/icon.php

The data returned from that GET request is interesting.  I'm still
wading through it.

This is an interesting command that is launched later in the mix of fun:

   C:\WINDOWS\system32\cmd.exe /c net stop sysmgr

I'm not a Windows guy, so that's all a mystery to me.

I'm running queries for the referenced IPs now.

Thanks,
Rob.
-- 
Rob Thomas
Team Cymru
http://www.team-cymru.org/
cmn_err(CEO_PANIC, "Out of coffee!");




More information about the nsp-security mailing list