REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be...

17
Security Trend ASEC REPORT VOL.83 November, 2016

Transcript of REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be...

Page 1: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

Security Trend

ASEC REPORT VOL.83November, 2016

Page 2: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

2

ASEC (AhnLab Security Emergency Response Center) is a global security response group consisting of virus analysts

and security experts. This monthly report is published by ASEC and focuses on the most significant security threats and

latest security technologies to guard against such threats. For further details, please visit AhnLab, Inc.’s homepage (www.

ahnlab.com).

SECURITY TREND OF November 2016

1SECURITY

STATISTICS

2SECURITY

ISSUE

3IN-DEPTH

ANALYSIS

01 Malware Statistics

02 Web Security Statistics

03 Mobile Malware Statistics

4

6

7

Warning: Malware May Be After Your Facebook Account!

Malware Exploiting Ms Word User Forms Continues To Spread

10

13

Table of Contents

ASEC REPORT 83 | Security Trend

ASEC REPORT VOL.83 November, 2016

Page 3: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

ASEC REPORT 83 | Security Trend

SECURITY STATISTICS

01 Malware Statistics

02 Web Security Statistics

03 Mobile Malware Statistics

1

Page 4: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

4

According to the ASEC (AhnLab Security Emergency Response Center), 8,651,224

malware were detected in November 2016. The number of detected malware

decreased by 1,048,894 from 9,700,118 detected in the previous month as shown in

Figure 1-1. A total of 4,590,540 malware samples were collected in November.

* “Detected Samples” refers to the number of malware detected by AhnLab products deployed by our customers. * “Collected Samples” refers to the number of malware samples collected autonomously by AhnLab that were besides our products.

SECURITY STATISTICS

Malware Statistics01

ASEC REPORT 83 | Security Trend

[Figure 1-1] Malware Trend

Collected Samples

Detected Samples

5,000,000

6,000,000

9,000,000

10,000,000

20,000,000

1,000,000

2,000,000

3,000,000

4,000,000

NovemberOctoberSeptember

8,651,224

9,700,118

8,999,000

4,59

0,54

0

4,34

8,81

3

5,06

7,80

5

Page 5: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

5

Figure 1-2 shows the prolific types of malware in November 2016. It appears that

Trojan was the most distributed malware with 36.62% of the total. It was followed by

PUP(Potentially Unwanted Program, 23.65%) and Worm (7.85%).

Table 1-1 shows the Top 10 malware threats in November categorized by alias.

Trojan/Win32.Starter was the most frequently detected malware (228,433), followed

by Trojan/Win32.Banki (189,681).

[Figure 1-2] Proportion of Malware Type in November 2016

[Table 1-1] Top 10 Malware Threats in November 2016 (by Alias)

1 Trojan/Win32.Starter 228,433

2 Trojan/Win32.Banki 189,681

3 Malware/Win32.Generic 184,113

4 Worm/Win32.IRCBot 141,246

5 Dropper/Win32.Betabot 119,983

6 Unwanted/Win32.HackTool 116,770

7 Trojan/Win32.Cerber 82,922

8 Trojan/Win32.Neshta 75,557

9 Trojan/Win32.Agent 74,760

10 Trojan/Win32.Nitol 66,233

Rank Alias from AhnLab No. of detections

ASEC REPORT 83 | Security Trend

DownloaderAdwareWormetcPUPTrojan

7.85%

23.65%

25.73%

36.62%3.84%

2.31%

Page 6: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

6

In November 2016, a total of 10,193 domains and 11,165 URLs were comprised and

used to distribute malware. In addition, 3,963,654 malicious domains and URLs were

blocked.

SECURITY STATISTICS

Web Security Statistics02

[Figure 1-3] Blocked Malicious Domains/URLs in November 2016

Blocked Connections

Malicious URL

Malicious Domain

ASEC REPORT 83 | Security Trend

* “Blocked Connections” refers to the number of blocked connections from PCs and other systems to the malicious website by AhnLab products deployed by our customers.

10,000

20,000

30,000

6,000,000

7,000,000

40,000

50,000

5,000,000

4,000,000

3,000,000

0November

11,16510,193

3,2941,4642,9261,481

OctoberSeptember

3,963,654

4,605,999

3,924,516

Page 7: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

7

In November 2016, 368,605 mobile malware were detected as shown in Figure 1-4.

[Figure 1-4] Mobile Malware Trend

SECURITY STATISTICS

Mobile Malware Statistics03

ASEC REPORT 83 | Security Trend

100,000

200,000

300,000

500,000

600,000

700,000

400,000

0

NovemberOctoberSeptember

368,605393,374389,745

Page 8: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

8

[Table 1-2] Top 10 Mobile Malware Threats in November (by alias)

Table 1-2 shows the top 10 mobile malware detected in November 2016. Android-

PUP/Baogifter was the most distributed malware with 67,949 of the total.

1 Android-PUP/Baogifter 67,949

2 Android-PUP/SmsPay 43,976

3 Android-Trojan/SmsSpy 28,329

4 Android-PUP/Agent 24,761

5 Android-PUP/Shedun 18,916

6 Android-Trojan/Moavt 18,747

7 Android-PUP/SmsReg 15,548

8 Android-Trojan/SmsSend 13,044

9 Android-Trojan/Agent 11,076

10 Android-PUP/Noico 7,615

Rank Alias from AhnLab No. of detections

ASEC REPORT 83 | Security Trend

Page 9: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

ASEC REPORT 83 | Security Trend

2Warning: Malware May Be After Your Facebook Account!

SECURITY ISSUE

Page 10: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

Malware that hijacks Facebook account

information has recently been discovered.

The malware uses the Facebook logo to

disguise itself as the normal Facebook

launch application as shown in Figure 2-1.

If the user enters the email address

and the password in the screen above

and clicks the log in button, a message

window pops up to inform the user that

“your account has been hacked” as shown

in Figure 2-3.When the malware runs, a screen that

appears to be the regular Facebook login

screen appears as shown in Figure 2-2,

and asks for the email address or phone

number and the password required to

log onto Facebook. The user, however, is

prevented from entering other personal

information in the fields reserved for

creating a new account.

10

SECURITY ISSUE

ASEC REPORT 83 | Security Trend

Warning: Malware May Be After Your Facebook Account!

Figure 2-2 | Screen displayed after the malware is run

Figure 2-1 | Malware masquerading as the Facebook application

Figure 2-3 | Message informing that the uer’s account has been hacked

Page 11: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

11ASEC REPORT 83 | Security Trend

The relevant al ias ident i f ied by V3

products, AhnLab’s anti-virus program, is

as below:

<Alias identified by V3 products>

Trojan/Win32.Dynamer (2016.11.01.03)

U s e r s s h o u l d t a k e c a u t i o n t o av o i d

downloading programs from untrustworthy

web sites and sources to prevent infections

and subsequent damages from these types

of malware.

If an account is found to be compromised

due to malware or any other reasons, the

user should immediately change passwords

for his or her other Web services as soon

as the hijacking is discovered, in order to

prevent further damages.

Page 12: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

ASEC REPORT 83 | Security Trend

3Malware Exploiting MS Word User Forms Continues to Spread

IN-DEPTH ANALYSIS

Page 13: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

13

IN-DEPTH ANALYSIS

Malware Exploiting MS Word User Forms Continues to Spread

ASEC REPORT 83 | Security Trend

A type of malware that takes advantage of

the “user-defined form” within Microsoft

Office Word document files combined

with social engineering methods are

d istr ibuted v ia spam emai ls . Th is

malware uses macros of VBA (Visual

Basic for Application), a programming

language for Microsoft applications. User

forms are controls that are created by a

user, such as check boxes, radio buttons

and text boxes, for interaction between

the application and the user. Macros and

user forms can be confirmed by using

VBA project of VBA Editor.

This malware uses an encrypted shellcode

hidden in the Word document file’s user

form and a malicious application file,

activating after being injected in to a

normal Windows process.

When the user opens the Word document

containing the hidden malware, the

image shown in Figure 3-3 is displayed to

induce the user into running the macro.

Figure 3-1 | Macros and user-defined forms Figure 3-3 | Image contained in the malicious document file

Figure 3-2 | Flowchart for malware that uses Microsoft Word form objects

Page 14: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

14ASEC REPORT 83 | Security Trend

The macro accesses the TabStrip control

in the user form in order to decode the

encrypted shellcode before running it as

shown in Figure 3-4.

The data corresponding to the shellcode

can also be confirmed within the binary

f i le that is created when the Word

document file is uncompressed.

The macro uses the ‘RtlMoveMemory’,

‘VirtualAllocEx’ and ‘EnumTimeFormatsW’

A P I i n t h e m o d u le to r u n t h e n ow

decrypted shellcode, which identifies the

location of the malicious run file by using a

routine that compares certain markers in

the Word process memory area as shown

in Figure 3-7.

The macro code decrypts the data received

during the step shown in Figure 3-4.

Figure 3-4 | Macro using the TabStrip controlFigure 3-6 | Shellcode decryption process

Figure 3-5 | Encrypted shellcode

Figure 3-7 | Routine that searches for certain markers (top), data that contains the marker (bottom)

Page 15: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

15ASEC REPORT 83 | Security Trend

Once the shellcode discovers the memory

area that contains the marker, it uses the

code shown in Figure 3-8 to perform the

initial decryption of the data that is located

after the marker.

Then, the shellcode prepares for the

injection of the run file into the normal

Windows process. CreateProcessA API

is used to run "%windir%\explorer.

exe”, if the OS is 32-bit, and "%windir%\

SysWOW64\svchost.exe" for the 64-bit OS,

both in suspend mode, for the injection.

Once the injection to disguise the malware

as a normal process succeeds, the

malicious code transmits the infected

PC’s user and system information to the

C&C address, and receives instructions for

downloading files and additional injections.

The data created in Figure 3-8 undergoes

a Base64 decoding process for a second

decryption pass, at which point the actual

payload that performs the malicious act

can be seen.

Figure 3-9 | Part of the run file created following the Base64 decoding process

Figure 3-11 | Malicious activities performed by the injected file

Figure 3-8 | Primary decryption (top), data after decryption (bottom)

Figure 3-10 | Injection by process (64-bit (top), 32-bit (bottom))

Page 16: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

16ASEC REPORT 83 | Security Trend

The relevant al ias ident i f ied by V3

products, AhnLab’s anti-virus program, is

as below:

<Alias identified by V3 products>

W97M/Hancitor (2016.11.24.07)

The main vector for these malicious files

are spam email messages, and an image

disguised as official Microsoft content

is shown in the Word document files as

an added layer of deception to catch the

victim unaware.

To avoid such attacks, files attached to

email from suspicious sources should

not be run, and extra caution should be

exercised when running a macro in a

document whose origin is not absolutely

clear.

Page 17: REPORTglobal.ahnlab.com/global/upload/download/asecreport/ASEC... · 2018-11-21 · appears to be the regular Facebook login screen appears as shown in Figure 2-2, and asks for the

ASEC REPORT

Contributors ASEC Researchers Publisher AhnLab, Inc.

Editor Content Creatives Team Website www.ahnlab.com

Design Design Team Email [email protected]

VOL.83November, 2016

Disclosure to or reproduction for others without the specific written authorization of AhnLab is prohibited.

©AhnLab, Inc. All rights reserved.