MALWARE WARNING: EMAILDOMAIN plus “_contract.doc” has a Malicious Word Macro – Analysis & Details

HTD-Word-Doc-Preview_full
Warning about a malicious Word macro that comes as an email attachment with "_contract.doc" as part of the file name. Also contains analysis about threat.

My email gets bombarded by viruses, phishing scams, hoaxes and malware on almost a daily basis. A majority of the time, my anti-virus software catches and quarantines them and most of these malicious files are Windows related (but Mac viruses are on the rise too). But in this particular case, I received an “innocent” looking email which had “Re: hightechdad.com contract” as the subject. It was, luckily, put into my Gmail spam folder but since I frequently have contracts with various companies, I thought perhaps it was legit. Long story short, it wasn’t. It contained a malicious Word macro appropriately named “hightechdad.com_contract.doc”. I didn’t get infected though. I decided to investigate and analyze it instead. And, I wanted to pass on a warning to others.

Malicious Word macro warning - watch out!

There were several things that raised my concern about this:

  • Gmail automatically put it into my Spam folder
  • I did not know the sender
  • Trying to preview the attachment revealed no details on a “contract”
  • The preview said I had to both enable Editing AND enable Content

And there were items that almost faked me out:

  • The subject had my domain in it
  • The attachment had my domain in it
  • The email itself looked somewhat legitimate
  • The company sender in the email actually exists

So I decided to carefully step into analyzing this seemingly legitimate Word document.

This is what the email looked like.

Malicious Word macro warning - email

It simply stated: “I have attached our contract. Please check it and let me know if you want to add any changes.” The writing was fine. In many cases with phishing scams, the grammar or punctuation is incorrect. In this case, it wasn’t.

There was a signature line. You can see it in the image above but this could be easily changed and may vary with other cases of this malware. And the signature matched the supposed sender’s domain. That all looked ok.

One way to possibly prevent Word macros from executing (and I am talking about on a Mac here) is to preview the document. If you save the document to your hard drive, you can click on it and then hit the Spacebar. This will usually bring up a preview. When I did that, this is what I saw.

Malicious Word macro warning - attachment preview

It did bring up a preview of the content of the file but not of the malicious Word macro. It said:

  1. Open the document in Microsoft Office. Previewing online is not available for protected documents.
  2. If this document was downloaded from your email, please click “Enable Editing” from the yellow bar above.
  3. Once you have enabled editing, please click “Enable Content” from the yellow bar above.

Hmm, my red flag warning went up right there. You should NEVER enable macros unless you completely trust the sender and the legitimacy of the document. Even then, you should be extremely careful!

Opening the attachment

Since I am on a Mac, I decided to actually open the document. I wouldn’t recommend this on a Windows machine. And I probably wouldn’t recommend it on a Mac either. But I wanted to learn more.

When I launched Microsoft Word, I was given the following warning:

Malicious Word macro warning - disable macros

This prompt will appear on both Windows and Mac versions of Microsoft Office. It is there to protect you so pay attention to that.

I clicked the “Disable Macros” button which is the default. This would obviously disable the macros but also allow me to view the macros.

Viewing the Malicious Word Macros

Once I had the Word doc open, I decided to take a look at the various macros within it. Be careful never to run a macro, just view them. In Microsoft Word for the Mac, you can access the macros from the View > Macros menu.

Malicious Word macro warning - view macros

Once I did that, I could seen there were a variety of macros within the document. Some looked legitimate in the first set of macros:

Malicious Word macro warning - macros #1

But scrolling down the list, I found some that looked like malicious Word macros:

Malicious Word macro warning - macros #2

Specifically, “pythium” and “trac” looked odd to me.

DON’T CLICK RUN! Click Edit instead if you want to view them.

Clicking on the Edit button brought up what to me looked like pretty complicated macro code. I normally can get a basic understanding of what a macro does because I have created some myself in the past. These looked very cryptic.

Below is a sample of the beginning of the malicious Word macro code.

Malicious Word macro warning - macros search string

Since I couldn’t understand what the macro was trying to do (I’m not a coder), I decided one way was to actually search for some of the lines of the macro itself. So you can see the lines I searched for highlighted above.

Malicious Word macros search & analysis results

I was actually happily surprised to find that my search actually produced some good results. And, on top of that, I discovered a very helpful free service that lets you analyze documents for viruses or malware.

The site is called Reverse.it and is provided by a company called Payload Security. There is another domain it uses called hybrid-analysis.com. All three of these are the same service which basically is an automated malware analysis system which runs protected virtual environments and sandboxes to analyze documents for threats. (Note: I have no affiliation with this company.)

So I uploaded the attachment for analysis and within a few minutes received a tremendously intricate report of the analysis. Below is the top section of the results.

Malicious Word macro warning - top of analysis

Just from reading the top portion, I knew the file was bad. It was flagged as “malicious” and had a threat score of 69/100. It was noted as a “Spyware/leak – POSTs files to a webserver” and “Network Behavior – Contacts 2 domains and 2 hosts”. That basically means that this malicious Word macro will upload your files to some foreign server somewhere. YOW!

That alone made me realize it was important for me to share this malicious Word macro warning.

If you want to see the Full Analysis of the file I received, you can view it here.

Also, I did a search of the Payload Security service for files that contained “_contract.doc” that were analyzed by there service and there were two pages of results. So, this particular malicious Word macro malware has been out there for a while, I’m guessing.

But if you have files you are concerned about that you have received as attachments, you can upload them to this service to see if they are dangerous or not.

The bottom line

There are lots of threats out there, especially in the form of legitimate looking emails and attachments. If you don’t know the sender, don’t open the attachment. If you aren’t expecting an attachment, don’t open it. If you don’t have anti-virus software, get some. If you received a message from your financial institution, don’t click on the link (go to the site directly instead). You get the picture. Be overly cautious.

HTD says: It is critical to be extremely cautious when it comes to digital files, email and your day-to-day activity. Just slow down and be careful!

- Advertisement -
- Advertisement -
- Advertisement -

1 Response

  1. What if I already opened and clicked enable!?!?!!? Realized the second I pressed it, this was malicious… UGH!?!?!?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Other articles of interest

Global Product Review Disclosure

Disclosure: This is a global disclosure for product review articles on HighTechDad. It does not apply to Automobile reviews and there are other exceptions. Therefore, it may or may not be applicable to this particular article. I may have a material connection because I may have received a sample of a product for consideration in preparing to review the product and write this or other content. I was/am not expected to return the item after my review period. All opinions within this and other articles are my own and are typically not subject to the editorial review from any 3rd party. Also, some of the links in the post above may be “affiliate” or “advertising” links. These may be automatically created or placed by me manually. This means if you click on the link and purchase the item (sometimes but not necessarily the product or service being reviewed), I will receive a small affiliate or advertising commission. More information can be found on my About page.

About HighTechDad

Michael Sheehan (“HighTechDad”) is an avid technologist, writer, journalist, content marketer, blogger, tech influencer, social media pundit, loving husband and father of 3 beautiful girls living in the San Francisco Bay Area. This site covers technology, consumer electronics, Parent Tech, SmartHomes, cloud computing, gadgets, software, hardware, parenting “hacks,” and other tips & tricks.

Recent Articles

Explore Categories

– Advertisement –

Shop Now!

My Favorite Setapp Apps

Affiliates

Wireless in Bulk? Genius! Shop Budget-Friendly, Unlimited Talk & Text Plans at MintSIM.
  • Mount18_July
  • Shop Mount-It!

– Advertisement –

Intellifluence Trusted Blogger
Shop HighTechDad-reviewed products
– Advertisement –