Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Excel Malspam: Password Protected … Not!

Early March of this year, we blogged about multiple malspam campaigns utilizing Excel 4.0 Macros in .xls 97-2003 binary format. In this blog, we will present one more Excel 4.0 Macro spam campaign in the same format crafted with another old MS Excel feature to evade detection.

The Malspam

Different themes were used in this campaign – ranging from generic themes like fake invoices to the hottest theme nowadays, Coronavirus. The subjects of the spam are composed of a word related to the theme and a series of numbers.

Email samples
Figure 1: Some of the malspams

 

The spam in this campaign have a one-liner email body and one attachment, and they both contain the series of numbers found in the Subject. The text in the email body just directs the recipient’s attention to the attachment which is an Excel file. The filename of the attached Excel file includes the local part of the recipient’s email address.

Malspam sample
Figure 2: Security Email Gateway (SEG) displaying the first spam shown in Figure 1

 

The “Password Protected“ Attachment

The XLS attachments from the spams shown in Figure 1 were encrypted through password protection. A password has been applied to the Excel files, which used the Microsoft Enhanced Cryptographic Provider v1.0 algorithm to encrypt the attachments. Password-protected documents can only be opened with the correct password as this is the key needed in the decryption process.

Malspam sample in Hiew
Figure 3: The tool Hiew reveals that the attachment shown in Figure 2 is encrypted with algorithm Microsoft Enhanced Cryptographic Provider v1.0 and contains Excel 4.0 Macro sheets

 

In MS Excel with macros disabled, we tried opening the attachments obtained from Figure 1. However, the Excel application did not display the password prompt as expected. Since their file structures indicate the XLS files are password protected, we used Didier Stevens’ msoffcrypto-crack tool to obtain their passwords. All the XLS attachments have the password “VelvetSweatshop”.

The XLS attachments password revealed
Figure 4: The XLS files attached from the emails in Figure 1 have the same password

 

Excel first attempts to open a password protected Excel file using its default password “VelvetSweatshop” in read-only mode. If this default password fails to open the encrypted Excel file, then the application will launch the password prompt and ask the user for the password. This read-only technique has been known about for over 10 years and is now being leveraged by spammers recently.

Since the XLS files were encrypted using the default password, they ran in Excel as if they were not password protected. In the background, Excel already opened them using the default password. Hence, no password input was required from the user nor was a warning from the application prompted. The content of the XLS files was immediately displayed.

The XLS attachment
Figure 5: The attachment jack_697121_.xls contains a worksheet and the autorun points to a cell from one of the hidden Excel 4.0 macro sheets

 

All the Excel files in this campaign had macro downloaders. They contain a worksheet which acts as a lure for the victim to enable the macro setting, and multiple hidden Excel 4.0 macro sheets. Although the number of hidden macro sheets varies between the samples, the characteristics of their filenames are consistent. Two of the macro sheets have randomized filenames and the rest start with “Macro” then followed by a number.

The malicious behavior of the XLS files arises from one of the hidden macro sheets with a randomized name - this is always the one referenced by the autorun as shown in figure 5. The macro will download a binary from a compromised site, save it on disk under C drive, and execute them.

Each set of spams shown in Figure 1 leads to a compromised site that hosts malware Gozi, a banking trojan. The first download URL is already inaccessible at the time of investigation however the site was known to host the said malware.

The compromised site
Figure 6: The download URL of the from the first wave spams

 

As for the second URL, we were able to download a GOZI malware Sha1: c42006626c38640404ca4e0b0402bf7ffa0d53b0. Its C&C is dropshipbear[.]xyz.

Sample spammed from the 2nd wave
Figure 7: A sample from the 2nd wave of spams downloads a Gozi malware

 

Summary

Usually, the major component to the success of delivering malware via a password protected attachment is the email recipient’s intuition. The user must be enticed enough to open the attachment using the password provided in the email. But with the campaign presented here, the spammers found a way to eliminate this step. Using Excel’s own feature, the spammers were able to bypass the user input for the password protected Excel files. 

We are observing an increasing number of malspam leveraging these password protected Excel 4.0 macro likely because the malware authors found it effective in evading email gateway and other scanners. One of the Excel files we have seen from the campaign above has a VT score of 2/59 as of this writing.  The Trustwave Secure Email Gateway is currently blocking this threat.

Note: Malware crafted using the two old Excel features shown in this blog are still macros and are still ineffective if Trust Center settings are set to at least medium security which will prevent macros from automatically running.

 

IOC

jack_697121_.xls SHA1: ec7ebd1e4acfb2aae63f79e85084937c18f17f0b
vish_362106_.xls SHA1: 9296d886c0d2f1254df234507301409990fa34a9
dmitry.nosickow_283615_.xls SHA1: 29cd551c40014f93792c47dc4766abc85857bd92
jason_961079_.xls SHA1: ee819a9d0a467deaf1c2855ed441ad52029118fc
jbishop_737231_.xls SHA1: 358e5086c38aa2e67add6a14bfc89cffec06af37
lindsay.polkinghorne_577859_.xls SHA1: 6d1d801d856cd363f2e6b058c141c31e7f9d1628
dmitry.nosickow_831493_.xls SHA1: 4192ace9a8d9c5b905db4cdc18a1628633cf18f5
dmitry.nosickow_612949_.xls SHA1: 7029603deebdd8c4a15a3bd2cc23a719dadc194b
dmitry.nosickow_487325_.xls SHA1: bab3fc09504f73f177cb9005be1b732e9118dde3
katie_366948_.xls SHA1: 5f4c8cc1ee2953d52894d1f2e44f0e2d406f9249
teresa-646071021.xls SHA1: 5ADB73196A8511561A0ACD130C80F02A8698F059

Latest SpiderLabs Blogs

Clockwork Blue: Automating Security Defenses with SOAR and AI

It’s impractical to operate security operations alone, using manual human processes. Finding opportunities to automate SecOps is an underlying foundation of Zero Trust and an essential architecture...

Read More

Professional Services Sector Under Attack - Trustwave SpiderLabs Report 2024

Recent research by Trustwave SpiderLabs, detailed in their newly published report "2024 Professional Services Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies,"...

Read More

Atlas Oil: The Consequences of a Ransomware Attack

Overview Atlas Oil, a major player in the oil and fuel distribution industry, fell victim to a ransomware attack orchestrated by the Black Basta group. This attack not only compromised sensitive...

Read More