Cyble – Recent Emotet Spam Campaign Utilizing New Tactics

Emotet Malware Adapts with OneNote Attachments to Deliver Payloads

Emotet is a sophisticated banking malware that usually spreads via email attachments. Its primary aim is to extract confidential data from its targets, including passwords and banking details, and send it to the Command and Control (C&C) server.

Cyble Research and Intelligence Labs (CRIL) is closely monitoring the Emotet campaign, which recently reappeared on March 7th after three months of dormancy.

Emotet is once again spreading malicious emails and infecting devices globally by rebuilding its network. During the previous week’s campaign, Emotet used malicious ZIP attachments containing DOC files. In this campaign, Emotet utilized a technique named “ZIP bombing,” compressing a very large DOC file into a small archive file.

However, in the most recent campaign, Emotet has shifted its tactics and now employs OneNote attachments instead of a ZIP archive with malicious document files in spam emails. OneNote is a powerful digital notebook software provided by Microsoft that enables users to efficiently store their ideas, thoughts, and notes in a centralized location, promoting organization.

OneNote software is widely used by people all around the world. There has been an observation of various malware families, such as Qakbot, utilizing OneNote attachments in their spam campaigns. Threat actors (TAs) regularly alter their techniques for infecting users to evade detection by anti-virus programs and increase the probability of successfully infiltrating targets. It is a primary motivation behind their adaptation of methods.

The delivery mechanism of Emotet malware via a spam email’s OneNote attachment is illustrated in the figure below.

Figure 1 – Emotet Delivery Mechanism
Figure 1 – Emotet Delivery Mechanism

Technical Analysis

In a recent campaign, it has been observed that the Emotet is being distributed via a malicious OneNote attachment, as shown in the figure below.

Figure 2 – Initial Spam email containing OneNote file
Figure 2 – Initial Spam email containing OneNote file

When a user opens the spam email attachment that appears to be a OneNote document, a fake OneNote page is displayed, deceiving the user into double-clicking to view the document. This action triggers the Emotet infection process.

The below figure shows the fake OneNote document.

Figure 3 – Fake OneNote Page
Figure 3 – Fake OneNote Page

An obfuscated script file is inserted in the “view” button within the OneNote document. When clicking the “View” button on a OneNote page triggers a hidden action that involves dropping and executing a .wsf file (Windows Script File) called “click.wsf” using “wscript.exe” from the below location.

  • C:Users [user-name]AppDataLocalTempOneNote16.0Exported{26E0D824-BE38-4186-AF90-9A9C389A36B0}NTclick.wsf

The below figure shows the content of the dropped obfuscated .wsf file.

Figure 4 Obfuscated WSF file content
Figure 4 – Obfuscated WSF file content

After de-obfuscation, the contents of the .wsf file reveal a list of URLs and contains code that constructs strings such as file name and “regsvr32” which are later used to execute the Emotet payload as illustrated in the below figure.

Figure 5 – Content of De obfuscated .wsf file
Figure 5 – Content of De-obfuscated .wsf file

The de-obfuscated content also includes the code to download an Emotet payload from a predetermined set of URLs. After downloading the payload, the malware verifies its size by comparing it to 150 KB.

If the file content size exceeds 150 KB, the script ends any additional download attempts from the remaining URLs, and the payload is saved to the directory where the .wsf file was initially dropped. The payload file is given a random name, such as “rad59f5c.tmp.dll” and subsequently executed using regsvr32.exe.

On the other hand, If the file size is less than or equal to 150 KB, the malware repeatedly attempts to download the Emotet from the remaining URLs. This verification ensures that the Emotet payload is retrieved from various URLs, even if any one of them is unavailable.

The figure below illustrates a code snippet demonstrating how the Emotet payload size is verified and executed.

Figure 6 –Code to check payload size and its execution
Figure 6 –Code to check payload size and its execution

The below figure shows the process chain of Emotet DLL launched using “regsvr32.exe” from the OneNote document.

Figure 7 – Emotet Process tree

Figure 7 – Emotet Process tree

Upon execution, the Emotet malware operates discreetly in the background and creates a connection with a Command and Control (C&C) server to receive additional instructions or install extra payloads.

The following image depicts the most frequently utilized OneNote filenames employed by the Emotet spam campaign.

Figure 8 Top OneNote filenames used by the Emotet spam campaign
Figure 8 – Top OneNote filenames used by the Emotet spam campaign

Conclusion

Emotet is a complex and persistent banking malware that has had a global impact on users. Threat Actors continually modify their tactics to keep ahead of cybersecurity organizations, and Emotet is a prime example.

In previous campaigns, TAs employed the zip bombing technique to distribute Emotet, but they have now shifted to utilizing OneNote attachments using WSF to deliver the Emotet payload. Although the latest Emotet campaign utilizes a new approach to infecting victims through OneNote, the malware’s behavior has not changed significantly.

CRIL is closely monitoring the activity of the Emotet malware campaign and will continue to update readers as the campaign evolves. The campaign is anticipated to use new tactics, techniques, and procedures to distribute malware after a hiatus of quite a few months.

Our Recommendations

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices as mentioned below: 

Safety Measures Needed to Prevent Attacks From Similar Threats And Reduce The Impact

  • Use strong passwords and enforce multi-factor authentication wherever possible.
  • ​Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic.
  • ​Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.   
  • ​Refrain from opening untrusted links and email attachments without verifying their authenticity.
  • ​Conduct regular backup practices and keep those backups offline or in a separate network.
  • Don’t keep important files in common locations such as the Desktop, My Documents, etc.
Tactic  Technique ID  Technique Name 
Initial Access  T1566 Spearphishing Attachment
Execution  T1204 
T1059
T1218
User Execution
Command and Scripting Interpreter
Regsvr32
Defense Evasion  T1140
T1564
T1112
Deobfuscate/Decode Files or Information
Hidden Window
Modify Registry
Persistence T1547 Registry Run Keys / Startup Folder
Discovery    T1082
T1083
T1007
System Information Discovery
File and Directory Discovery
System Service Discovery   
Command and
Control   
T1071
T1105
Application Layer Protocol   
Ingress Tool Transfer
Indicators Indicator Type Description
9708680347a58e18f41c0e211032e563
81c8b1069382ea1dcd1afe7283c28e4de73b339d
a1a3160e424b860659a73a579a5f01fe0caeb14517da015b3095a86231642b0f
MD5
SHA1
SHA256
Spam Email
9313a883ff85f0384ac4276bdab8937b
8638c0f0ed7905ab7e7ad5eada3d9d621bb5a7e0
5eeb3c3ae69941127e6c03581fc6274614e2d934631cca6c82cda688fb1ebadc
MD5
SHA1
SHA256
OneNote Attachment
ae25f2104967b2708ac9dba80aac52fd
7ac0150b43cbb5eeba9a0f956e1291df6790f3bf
11b3d1564b12934489281250c9a683f076fe10254bfdd7da72307e538838ec56
MD5
SHA1
SHA256
WSF file
bfc060937dc90b273eccb6825145f298
c156c00c7e918f0cb7363614fb1f177c90d8108a 2f39c2879989ddd7f9ecf52b6232598e5595f8bf367846ff188c9dfbf1251253
MD5
SHA1
SHA256
Emotet Dll File
hxxp[:]//malli[.]su[:]80/img/PXN5J/
hxxps[:]//kts[.]group/35ccbf2003/jKgk8/
hxxps[:]//olgaperezporro[.]com/js/ExGBiCZdkkw0GBAuHNZ/
hxxps[:]//4fly[.]su[:]443/search/OfGA/
hxxp[:]//staging-demo[.]com/public_html/wTG/
hxxp[:]//semedacara[.]com[.]br/ava/ahhz/
hxxp[:]//hypernite[.]5v[.]pl/vendor/hvlVMsI9jGafBBTa/
hxxp[:]//www[.]polarkh-crewing[.]com/aboutus/EUzMzX7yXpP/
hxxp[:]//efirma[.]sglwebs[.]com/img/2mmLuv7SxhhYFRVn/
hxxp[:]//uk-eurodom[.]com/bitrix/9HrzPY66D1F/
hxxp[:]//1it[.]fit/site_vp/4PwK3s6Bf9K7TEA/
hxxps[:]//thailandcan[.]org/assets/ulRa/
URL Emotet
payload
URLs

Source: https://blog.cyble.com/2023/03/17/recent-emotet-spam-campaign-utilizing-new-tactics/