Malicios Word document analysis

Today I have started my malware analisys from getting the sample from virusshare.com. Output of file command states that this is XML document.

Then I found out that there there are 2 nodes called binData. They both were Base64 encoded binary data files. I extracted data within those nodes using python xmltodict module which basically parse XML document and puts its node into nested dictionary structure; to extract binary data I wrote simple python script which can be seen below. The script is also available on my github repository.

Then I decoded Base64 strings. One of them occurred to be JPEG file, the other one was ActiveMime file type. Since I did not know what should I do with Active Mime I asked Google and how should I handle such Active Mime file type. I found out that Active Mime is actually Visual Basic script encoded in the binary form. I extracted all contents starting from offset 0x2 and then I checked the script. It occurred to be quite obfuscated one.

Part of obfuscated Visual Basic script

Since I had no previous experience on handling scripts like that I looked for some help on infosec Twitter. I got some clues from David Ledbetter to skip most of the code since it was there only for confusing a researcher. I merged strings within the script and this provided me powershell command also encoded in Base64. Below you can see decoded script; it is just downloader, probably Emotet downloader, cannot say for sure now since all urls are down now.

Downloader part

Powershell script tries to download some exe file from 5 different location. If it succeeds then the file will be executed.

Leave a Reply

Your email address will not be published. Required fields are marked *