The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them.
On Sunday, November 14, at around 9:26 pm UTC, security researcher Luca Ebach (@lucebac) and a team at G DATA Advanced Analytics GmbH (@gdata_adan) began seeing evidence of a bot attempting to download a DLL that the team identified as a potential Emotet vector.
On November 15, at 12:25 AM UTC, malware research group Cryptolaemus (@Cryptolaemus1) began reporting observations of a worldwide malspam campaign containing docm, xlsm, or password protected zip file attachments that download the Emotet payload.
Since the first Twitter post about this discovery, the team at G DATA and the Cybereason SOC team have seen multiple Emotet samples in the wild, particularly between November 21 and 23, confirming that Emotet appears to be reemerging.
Our sample came in the form of a typical Emotet malicious document, a macro enabled template file, 1911.doc, MD5 - e613de7a49077fb6459a272c93ef35bd:
Emotet malicious document
When the sample was executed, the sample created a child process of cmd.exe and then executed a PowerShell one-liner:
Cleaned up and re-formatted, this PowerShell command is a classic ‘round robin’, where the script iterates through a list of seven comma-separated URLs:
When the malware connected with one of the URLs, the sample named the payload randomly and dropped the payload into the C:\ProgramData\ directory:
After the malware verified that the malware had created the path successfully, the malware called rundll32.exe from SysWow64 to execute the payload:
As we describe in more detail below, the dropped DLL creates a copy of itself in the user’s \AppData\Local\ directory, loads a floating module observed from other Emotet infections, and attempts network connections:
We obtained a sample of an Emotet DLL, Loader_90563_1.dll, with an MD5 hash of bc3532085a0b4febd9eed51aac2180d0. We executed the sample in a lab environment. Like previous Emotet samples, the module requires the parameter Control_RunDLL to execute:
When the sample executed, the sample created a randomly named copy of itself in the \AppData\Local\ directory, and then used the rundll32 file from the SysWOW64 directory to execute, using the Control_RunDLL parameter and one or more randomly named parameters:
rundll32.exe executes the Emotet malware
The malware then loaded a floating module, X.dll, into memory. This module has been part of previous Emotet infections:
The malware made 20 network callouts over ports 443, 80, 8080, and 7080 to the following IP addresses:
The Cybereason SOC team observed no other behavior after the network callouts. The team believes that the sample tried to connect to one of these hosts as a command and control (C2) server and download the next stage of the infection.
Cybereason has updated the detection capabilities of the Cybereason platform to identify this malicious behavior. Additional recommendations are as follows:
Note: For Cybereason MDR customers, the Cybereason team will continue to monitor and triage the environment and will help mitigate potential infections. |
Derrick Masters is a Senior Security Analyst with the Cybereason Global SOC team. He is involved with threat hunting and purple teaming. Derrick's professional certifications include GCFA, GCDA, GPEN, GPYC, and GSEC.