Historically targeting the financial sector, and first observed in 2014 as a banking trojan, Emotet remains an active and credible threat to organizations across all industries worldwide and, whilst retaining some core data stealing capabilities, has evolved to act as a downloader for secondary malicious payloads.
Whilst these secondary payloads can include threats developed by the operators of Emotet themselves, campaigns observed since July 2020 have seen the delivery of third-party threats such as banking trojans ‘Qbot’ and ‘Trickbot’, used to steal personal and financial data, or the ransomware threat ‘Ryuk’, typically used to target enterprise networks.
Primarily delivered via email lures containing a weaponized Microsoft Word document attachment, those falling victim are encouraged to disable the security settings within Microsoft Word to ‘Enable Content’ that in turn allows a malicious PowerShell script to download and execute the primary Emotet payload.
Subsequently, the victim host will join the Emotet botnet and can be instructed to download and execute additional malicious payloads as well as being abused to send malicious emails to other potential victims.
Utilizing the tried-and-tested technique of creating lures based on topical events, it is unsurprising that high-volume Emotet malspam campaigns during the first half of 2020 exploited interest in the pandemic through the use of COVID-19 themed emails that on occasions included content that was seemingly stolen from other victims in an attempt to appear more convincing.
Likely due to interest in the protracted pandemic waning, Emotet campaigns have returned to using traditional business topic themes, such as delivery notices, invoices, resumes and scanned documents, although there is potential for upcoming topical events, such as the United States Presidential Election, to be exploited. Additionally, email lures have been observed in multiple languages, potentially due to the reuse of email content stolen from previous victims, and therefore can be used to target non-English speaking regions.
Whilst the delivery of weaponized Microsoft Word document attachments remains the primary delivery method for Emotet, September 2020 saw a shift in tactics with campaigns distributing these documents within password-protected Zip archive attachments. This tactic follows a similar shift by threat actors distributing TrickBot albeit they added password-protection directly to their malicious documents.
The use of a password-protected archive or document can allow threats of this nature to bypass email security controls, due to their inability to analyze the content, although many solutions offer the ability to block password-protected attachments.
Victims opening an Emotet malicious Microsoft Word document, having first decompressed it from a password-protected archive in recent campaigns, are presented with content that mimics a dialog box and encourages them to disable the default security measures within Microsoft Office.
Demonstrating that those behind the campaigns are maintaining their threat to remain ‘fresh’ and avoid detection, likely as a result of publicity, the document content has been updated numerous times over the past few months:
Observed in early August 2020, a black Microsoft Office 365 theme was used to mimic a dialog box with ungrammatical text claiming that the document was created on an Apple iOS device (Figure 1).
Figure 1 – Microsoft Office 365 / Apple iOS Theme
Seemingly correcting their ‘Enable Edition’ mistake, a fixed version (Figure 2) was observed during August 2020 prior to the next update.
Figure 2 – Microsoft Office 365 / Apple iOS Theme
Dubbed ‘red dawn’ and observed in late August 2020, a red version of the Microsoft Office 365 theme is used and indicates that the ‘document is protected’ (Figure 3).
Figure 3 – ‘Red dawn’ Microsoft Office 365 / Protected Document Theme
Returning to the mobile device theme, campaigns observed in early September 2020 used a Microsoft Word theme and claimed that the document was created on a Windows 10 Mobile device (Figure 4).
Figure 4 – Microsoft Word / Windows 10 Mobile Theme
Windows 10 Mobile is, as of January 2020, an end-of-life product and as such has a reportedly low number of active users.
First observed in late September 2020, and still in use as of October 2020, a Microsoft Office Wizard is mimicked and claims that the document was created on an Android device (Figure 5).
Figure 5 – Microsoft Office Wizard / Android Theme
Additionally, observed in October 2020, a somewhat less convincing theme is used to suggest that the document was created in an earlier version of Microsoft Office (Figure 6).
Figure 6 – My Office / Earlier Version Theme
Assuming the victim falls for the ruse, enabling editing and content for the weaponized Microsoft Word document, Emotet tactics remain consistent with countless previous campaigns and a macro runs to construct, then execute, PowerShell with a parameter containing a base64-encoded script (Figure 7).
Figure 7 – PowerShell base64-encoded payload
Decoding this base64-encoded payload allows an obfuscated PowerShell script to be viewed (Figure 8) which, when de-obfuscated, shows the basic downloader functionality including Emotet payload download sources and a simple file size check (Figure 9).
Figure 8 – Obfuscated PowerShell script
Figure 9 – Deobfuscated, cleaned and commented PowerShell script
Subsequently the downloaded Emotet payload is executed from the created directory structure within the victim’s %USERPROFILE% directory (typically C:\Users\<Username>\) and will, as well documented, initiate call home communications using HTTP POST requests sent via common ports to its command and control (C2) infrastructure.
In addition to downloading additional malicious payloads, Emotet attempts to acquire credentials which can be abused to allow the threat to move laterally across a network. Furthermore, reports of ’email thread hijacking’ suggest that an existing email chain identified on an infected host could be used to impersonate the victim and encourage others to access a malicious file or link.
Whilst Emotet is a well-established threat, the fact that it remains active and credible is due to the fact that individuals and organizations are still falling victim to their tactics, techniques and procedures (TTP). In addition to following cybersecurity best practices, the following specific recommendations should be considered to reduce the risk of Emotet and similar threats:
- Block, or quarantine, password-protected email attachments including archive and office productivity files;
- Disable administrative tools and script interpreters, such as PowerShell, to prevent their misuse by malicious payloads;
- Use Group Policy to disable macros from running in Microsoft Office applications (legitimate macros should be digitally signed to allow for an exception to the disable rule);
- Educate users on the common TTP used and reinforce the message that documents encouraging them to ‘Enable Editing’, ‘Enable Content’ or disable any other security setting are almost certainly malicious.
Indicators Of Compromise
Whilst indicators of compromise (IOC) such as file hashes and URLs rapidly change across campaigns, the following samples were analyzed to generate content for this bulletin:
- Initial Document Lures (SHA256):
- Emotet Payload URLs:
- Command & Control (C2) URLs:
- Emotet Executable Payloads:
- User-agent strings used during call-home communications (HTTP POST):
- Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; .NET CLR
- Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
|T1027 – Obfuscated Files or Information||Defense Evasion|
|T1027.002 – Obfuscated Files or Information: Software Packing||Defense Evasion|
|T1047 – Windows Management Instrumentation||Execution|
|T1059.001 – Command & Scripting Interpreter: PowerShell||Execution|
|T1071 – Application Layer Protocol: Web Protocols||Command & Control|
|T1140 – Deobfuscate/Decode Files or Information||Defense Evasion|