|
We’ve seen threat actors abuse almost all Windows OS applications in their campaigns, disguising malware as macros, Word documents, Excel spreadsheets, and PowerPoint presentations to trick users into opening and executing them. Most recently, they’ve been spreading malware in the guise of OneNote documents to cause mayhem.
Proofpoint researchers Tommy Madjar, Corsin Camichel, Joe Wise, Selena Larson, and Chris Talib spotted threat actors distributing malware disguised as a OneNote document over the past 2—3 months. While some campaigns seemed to target specific industries in North America and Europe, thousands of emails with malware-laced OneNote document attachments have been seen infecting the computers of the general populace.
Email recipients tricked into opening and interacting with the supposed OneNote document attachment can end up with AsyncRAT, Redline, AgentTesla, DOUBLEBACK, or Qbot malware-infected computers. Possible effects include data stealing via credential theft and more.
The Proofpoint study identified 82 indicators of compromise (IoCs), including URLs, IP addresses, and SHA-256 hashes. We stripped some of them down, which left us with 17 domains and 13 IP addresses shown in the table below.
Domains | IP Addresses |
---|---|
• files[.]catbox[.]moe • onenotegem[.]com • transfer[.]sh • depotejarat[.]ir • zaminkaran[.]ir • newtryex[.]ddns[.]net • stnicholaschurch[.]ca • winery[.]nsupdate[.]info • su1d[.]nerdpol[.]ovh • direct-trojan[.]com • mgcpakistan[.]com • plax[.]duckdns[.]org • ghcc[.]duckdns[.]org • barricks[.]org • kanaskanas[.]com • codezian[.]com • myvigyan[.]com | • 209[.]126[.]83[.]213 • 3[.]101[.]39[.]145 • 54[.]151[.]95[.]132 • 154[.]12[.]234[.]207 • 45[.]133[.]174[.]122 • 154[.]12[.]250[.]38 • 172[.]245[.]45[.]213 • 198[.]23[.]172[.]90 • 212[.]193[.]30[.]230 • 179[.]43[.]187[.]241 • 109[.]107[.]179[.]248 • 209[.]126[.]2[.]34 • 95[.]216[.]102[.]32 |
We used the IoCs as WHOIS and DNS tool search terms to scour the Web for other potential threat vectors through an in-depth IoC expansion analysis, which led to the discovery of:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
A look at the WHOIS records of the domains tagged as IoCs revealed the following findings:
The oldest domain—mgcpakistan[.]com—was created on 8 June 2002 while the newest—direct-trojan[.]com—was created on 12 December 2022. A majority of the IoCs (80%) were aged domains.
Six of the 17 domains—files[.]catbox[.]moe, onenotegem[.]com, transfer[.]sh, stnicholaschurch[.]ca, mgcpakistan[.]com, and codezian[.]com—continued to host live content with a few seeming to have been compromised legitimate sites for the threat actors’ use based on their screenshots. Mgcpakistan[.]com, for instance, looks like the website of a legitimate medical equipment manufacturer.
The 12 domains with retrievable WHOIS records were spread across 10 registrars, primarily NameCheap, Inc.
Four of the domains—onenotegem[.]com, depotejarat[.]ir, zaminkaran[.]ir, and barricks[.]org—had unredacted registrant email addresses in their historical WHOIS records. More interestingly, though, the email address used to register depotejarat[.]ir was also utilized for nine other domains, five of which are: tejaratdepoo[.]ir ariaevacuation[.]com datisairconditioner[.]com movieserial2[.]com bardia-bardia[.]com
Next up, we looked at the IoCs through the DNS lens, which showed that the domains resolved to an additional 11 IP addresses that weren’t included in the initial analysis’s list. Four of these IP hosts turned out to be malicious, two of which are 107[.]160[.]74[.]134 and 95[.]216[.]33[.]194.
Like the first campaigns that targeted users in North America and Europe, 92% of the attack IP addresses were concentrated in the same continents. The map below shows the IP geolocation country breakdown of the 24 IP hosts.
Reverse IP/DNS lookups for the IP addresses led to the discovery of 1,992 domains that shared the IoCs’ hosts. A bulk malware check for these web properties revealed that 16 of them were malicious. Nine examples are:
Despite being categorized as malware hosts, six of the domains continued to host live content.
Some of the domains tagged as IoCs contained unique strings, including:
Our searches on Domains & Subdomains Discovery found 32 additional domains that may be worth monitoring for signs of suspicious activity given their similarity with the IoCs.
Our deep dive into the malicious OneNote campaigns allowed us to identify 2,044 yet-unpublished artifacts, 24 of which have been dubbed malware hosts. The IoC expansion analysis results could be useful in early threat identification and mitigation for organizations.
If you wish to perform a similar investigation or get access to the full data behind this research, please don’t hesitate to contact us.
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC