
The SonicWall Capture Labs Threat Research Team has observed that a fake Space Starbase Invite is being circulated over email with a malicious excel document as an attachment. On opening the attachment, it will execute VBA macro code to infect the system with Dridex malware.
Infection Cycle
Upon opening the attachment, the user is displayed instructions to enable content as shown below:
The malicious excel file has obfuscated macro and a workbook_open method, which gets executed upon opening the document. The VBA Macro drops an XSL file into %appdata%\<random>.xsl. The dropped XSL is then executed by passing it as an argument to WMIC (Windows Management Instrumentation Command-line utility).

Fig-2: VBA Macro creating XSL file
XSL file
XSL files are style sheets to process data in XLM files which also supports script embedding and execution. This old technique has been assigned Mitre ATT &CK ID: T1220.
The XSL file contains JScript code to download and execute the payload. The payload takes "validateLog" as an argument as shown below:
SonicWall Capture ATP protects against this threat as shown below:
Indicators of Compromise
SHA256 of malicious excel files:
Network Connections:
SHA256 of Dridex payload:
Dropped Files:
Share This Article

An Article By
An Article By
Security News
Security News