Emotet Being Distributed Again via Excel Files After 6 Months

Emotet Being Distributed Again via Excel Files After 6 Months

Over multiple blog posts, the ASEC analysis team has released information on the distribution of Emotet which had been modified in many different ways.

It has recently been identified that the Emotet malware has become active again. Around six months have elapsed since the last active distribution. This post will examine the differences between the current Excel file and the one that had been distributed in the past.

Emotet Being Distributed Using Excel Files

Emotet Being Distributed in Korea via Excel Files

The common characteristics include the fact that it is distributed through an attachment on random emails, and that it disperses and hides multiple formulas with white text in the Excel sheet before hiding the sheet. An interesting point is that the recently distributed Excel files have some different characteristics from the files that have been distributed until now, which we will go over one by one below.

  1. A different method to prompt users to enable cell macro

A change has been made to the previous method which had directly induced users to enable cell macro. In the past files identified, Emotet used the message below to lead users to press the ‘Enable Content’ button. Now, it advises the user to copy the Excel file into the Microsoft Office Templates folder before relaunching it (See Figure 4).

It abuses the fact that the Templates folder is considered a trusted location according to Microsoft Office policy, which means that the macro is run immediately without a security warning.

[Previous]

  • Click “Enable Editing” from yellow bar above.
  • Most features are disabled. To view and edit document click Enable Editing and click Enable Content.

[Present]

  • RELAUNCH REQUIRED
    In accordance with the requirements of your security policy, to display the contents of the document, you need to copy the file to the following folder and run it again.

    for Microsoft Office 2013 x32 and earlier – C:\Program Files\Microsoft Office (x86)\Templates
    for Microsoft Office 2013 x64 and earlier – C:\Program Files\Microsoft Office\Templates
    for Microsoft Office 2016 x32 and later – C:\Program Files (x86)\Microsoft Office\root\Templates
    for Microsoft Office 2016 x64 and later – C:\Program Files\Microsoft Office\root\Templates

2. Addition of sheet protection feature

The threat operator dispersed and hid formulas in the sheet to use formula macro before hiding the sheet, and additionally undertook a sheet protection measure for the hidden sheet so that the user cannot view the included formula macro.

Our analysis showed that the password to disable sheet protection is ‘AABABAAABBB^‘. When the sheet protection is disabled, the dispersed and hidden data is found within the sheet, as in the previous cases. It is likely that this measure was taken to avoid analysis and detection of data within the sheet.

3. Changes to the execution method of Emotet binary

From executing the DLL file (Emotet binary) saved with an .ocx file extension through rundll32.exe, it switched to the method of executing a DLL file with an .ooccxx file extension through regsvr32.exe.

  • C:\Windows\System32\regsvr32.exe /S .. \oxnv1.ooccxx
  • C:\Windows\System32\regsvr32.exe /S .. \oxnv2.ooccxx
  • C:\Windows\System32\regsvr32.exe /S .. \oxnv3.ooccxx
  • C:\Windows\System32\regsvr32.exe /S .. \oxnv4.ooccxx

Users must update V3 to the latest version and refrain from opening document files from unknown sources.

[File Detection]
– Downloader/MSOffice.Generic (2022.11.04.00)
– Trojan/Win.Emotet.R532802 (2022.11.04.01)
– Malware/Win.Generic.C5291114 (2022.11.04.03)

[Behavior Detection]
Execution/MDP.Behavior.M3638

 

MD5

4aea7dd048106492a8c3d200924a3c39
64389305b712201a7dd0dc565f3f67e6
65d9d5c0a65355b62f967c57fa830348
87fdbba19c131e74fbe2f98b135751d5
URL

https[:]//aldina[.]jp/wp-admin/YvD46yh/
https[:]//andorsat[.]com/css/5xdvDtgW0H4SrZokxM/
https[:]//anguklaw[.]com/microsoft-clearscript/oVgMlzJ61/
https[:]//www[.]alliance-habitat[.]com/cache/lE8/

Gain access to related IOCs and detailed analysis by subscribing to AhnLab TIP. For subscription details, click the banner below.