Malware Analysis Spotlight: The Return of EmotetJuly 22, 2020 |
After a long time of being inactive, the infamous malware delivery framework Emotet is back – the three Emotet botnets started pushing malicious spam on Friday, July 17. In this Malware Analysis Spotlight, we will take a look at one of the Microsoft Word documents used in the campaign (Figure 1).
The document uses a highly obfuscated macro (Figure 2) which upon the opening starts executing.
The macro starts a Powershell instance with encoded commands (Figure 3) as a program argument. These commands (Figure 3) then try to download Emotet from five hardcoded hosts and save it with a fixed name specified in the command itself (later moved to %AppData%\msvcr100\).
On success, a new process of Emotet is launched. (View the Full List of hosts)
To achieve persistence, Emotet uses the common registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
Emotet still uses third-party software by NirSoft to steal credentials and gather information. These modules are injected into newly created processes of their own (Figure 5).
In addition to the injection information, the modules are visible in VMRay’s extracted function strings file (Figure 6).
The spyware behavior of Emotet is well recognized by VMRay Analyzer (Figure 7).
Compared to previous Emotet campaigns, the ongoing campaign uses a new template for the Word document attached in the spam emails. Nonetheless, the behavior of Emotet and of the downloaded modules within this analysis remains the same compared to previous campaigns.
List of IOCs