German users targeted in Vodafone Spam Campaign

May 11, 2012

SonicWALL UTM Research team discovered a new spam campaign targeting users in Germany. The email pretending to be from Vodafone informs the recipient that their new Vodafone bill has been generated and is attached to the email. The PDF attachment is malicious and if opened attempts to exploit Adobe reader via heap spray which in turn downloads a Trojan and executes it.

The spam campaign is shown below:

screenshot
The spam email is in German and is translated below:

screenshot

We discovered the following on analysis of the attached PDF:

  • The PDF attachment contains an obfuscated malaicious javascript shown below:

    screenshot

  • The javascript when deobfuscated was found exploiting Adobe reader and using heap spray to load and execute shell code:

    screenshot

  • On inspecting the shell code being used in the heap spray we discovered that it was downloading and executing a Trojan from a remote URL:

    screenshot

The downloaded Trojan performs the following activities:

  • It injects code in to csrss.exe
  • It checks for connectivity to the internet by querying google.com
  • It creates the following file:
    • %windir%system32wink.exe (Copy of itself) [Detected as GAV: Inject.DCGC (Trojan)]
  • It creates to following registry entry to add itself as a debugger for the userinit.exe process. This ensures it is executed in the execution sequence of userinit.exe at windows logon:
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsuserinit.exe Debugger "wink.exe"
  • It posts data to a remote server:

    screenshot

SonicWALL Gateway AntiVirus provides protection against this threat with the following signatures:

  • GAV: Pidief.AWT (Exploit)
  • GAV: Inject.DCGC (Trojan)