Complaint from the Better Business Bureau

Over the weekend, one of ESET’s executives had an interesting surprise in their mailbox: A complaint from the Better Business Bureau (BBB). ESET is a BBB member, so we periodically receive e-mail from them. In this case, though, the email was not a newsletter or membership renewal notification. The e-mail stated that a consumer had filed a complaint regarding our "business services." The interesting part of this e-mail is the following sentence: “Instructions on how to resolve this complaint as well as a copy of the original complaint are attached to this email.”
 
Users should always proceed with caution when dealing with embedded documents coming from unknown sources, but in this case, the message appeared to originate from the BBB, and Microsoft Outlook does not provide a convenient way to view message headers. The message and instructions were suspicious, so the executive forwarded it over to the research division for examination.
 
The file attached to the e-mail is a Microsoft Word document. Once opened, it looks like this: The document contains an embedded file called “Document_for_Case.pdf” and instructions telling the user to double click on the document to open it.
 
Malware authors often embed executable program files inside Microsoft Office documents to circumvent the security measures that are deployed at network gateways or on workstations. In this case, the Microsoft Word document contained an executable file displaying an Adobe Acrobat PDF icon. The “Document_for_Case.doc” file containing the embedded executable file is detected as TrojanDropper.Agent.NLN by NOD32.
 
When the file is run, the following error message is displayed:an error message saying that Adobe Reader was unable to open the document is displayed.
 
This is interesting because Adobe Reader was not installed on the computer used to open the document; so as you can imagine our researcher found this behavior is very suspicious! Before displaying this error message, the executable posing as a PDF downloads a file named “WUPDATE.EXE” to the C:WINDOWS directory (or other location specified by the %windir% environmental variable ) and runs it. “WUPDATE.EXE” is detected as TrojanDropper.Agent.NFC by NOD32.
 
In addition to posing as the Microsoft Windows Update program and installing itself in the C:WINDOWS folder, Agent.NFC modifies the registry to make sure it will be run every time the infected host is rebooted. This malware then steals information from Windows’ clipboard, Internet cookies and also monitors all data that entered into web forms. Every web site that is visited by a computer infected with this malware is also recorded. The information is stored to disk in and, at the time of writing, the collected information is sent to a server located in Malaysia.
 
This attack uses a very old technique of sending malicious software by e-mail but also uses an embedded document to increase the likelihood of bypassing filters at the mail gateway and on the desktop. Like any other phish, the message is meant to reinforce the credibility of the communication and motivate the user into launching the attached document file. We advise users receiving files by e-mail to call the sender to verify the authenticity and purpose of the file.
 
Pierre-Marc Bureau Researcher

Author ESET Research, ESET

  • Justin Stanford

    Great article, Pierre! We’re always looking for 500-600 word general interest articles like these. J

  • http://www.computerdefense.org Tyler Reguly

    I’ve only recently learned about this blog (via Randy), so I’ve added it to my bloglines and decided to check it out. I just wanted to comment on this post because I was curious about which version of Outlook is being used where it is difficult to obtain the headers?

    I realize it’s not as intuitive as the alternatives but I’ve never found it overly convoluted.

    In Outlook 2003, it’s simply View –> Options.
    In Outlook 2007, they’ve made it even easier (although I’m still not sure about this new interface), you just click options.

    Anyways, I did enjoy the rest of the write-up… I just felt as though that was a bit of an unfair job at Microsoft.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
19 Jun 2007
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.