Recently, a proof-of-concept emerged on how the filetype SettingContent can be abused when getting embedded in Microsoft Office Documents. SettingContent is a feature in Windows 10 which acts as a shortcut to different system settings. Legitimate examples of this can be found in %windir%\ImmersiveControlPanel\Settings (e.g. %windir%\ImmersiveControlPanel\Settings\CortanaSettings.settingcontent-ms will launch Microsoft's Cortana when double clicked). In response, Microsoft updated the Packager Activation list so that Office 365 can now block SettingContent within an OLE package.
As expected, malware authors found another way to utilize the same technique of delivering malicious files through the filetype SettingContent. However this time, they have it embedded in PDF files.
We recently came across PDF samples with embedded .SettingContent-ms getting spammed in the wild. Although the email body does contain any deceptive or luring pretext, the cleverly named attachment can mislead curious users to click on it thinking that the attachment is a legitimate invoice pdf.
Figure 1: Email sample containing a malicious PDF attachment
Figure 2: Security warning triggered when PDF attachment is opened
The object "downl.SettingContent-ms" is an XML file recognized in the system as filetype SettingContent. It contains a DeepLink element which will execute any code within the <DeepLink/> tag. In this case, the code invokes PowerShell to download a binary silently into the system, then execute as "%temp%\update12.exe".
Figure 4: The embedded object "downl.SettingContent-ms" extracted by SEG
The downloaded binary "%temp%\update12.exe" will connect to hxxp://18.104.22.168/sd87f67ds5gs7d5fs7df to fetch an encrypted blob and decrypt it as "%programdata%\Microsoft Help\wsus.exe". This is the final payload known as FlawedAmmyy version 3.
Figure 5: FlawedAmmy version 3
FlawedAmmyy is a remote access trojan that has the following features:
- View screen
- Remote control
- File manager
- Audio chat
- RDP sessions
It can also retrieve system information and send them to the C&C.
Figure 6: Screenshot of the parameters being sent to the FlawedAmmyy C&C
The exploitable component of SettingContent is its DeepLink element since any code in it will be executed without any warning to the user. As the misuse of SettingContent has been addressed by Microsoft, malware authors looked for another way to deliver their malicious intent using this filetype. Now, it's via PDF.