
SonicWall Capture Labs Threat Research Team identified a new wave of malicious Office files being used to distribute Remote Administration Tool belonging to FlawedAmmyy family. It has been observed that both MS-Excel and MS-Word files containing VBA Macro code are used to download and execute the FlawedAmmyy malware.
Infection cycle
Macro code is executed upon enabling macros when the Office file that comes as an email attachment is opened, its purpose is to download a Windows Installer file (MSI file) and execute it.
MSI file on execution further drops a file in folder "%systemdrive%\programData\". Dropped filename observed to be either WSUS.exe or hkmoov.exe and belongs to FlawedAmmyy family. MSI file and dropped file have a valid digital signature.
Different variants of Office files that have this behavior are spotted in the wild.
Variant 1
The first variant was spotted on 20-May-2019. Upon opening the malicious Office attachment, an image is displayed with a message in the Korean language to enable Macros as shown below:

Fig-1: image displaying message to enable macros
This variant contains malicious code in a single subroutine which is executed as soon as the macros are enabled after opening the file as shown below:
As can be seen in the above image, the tag part of UserForm in Macro contains a URL from where the payload is downloaded.
Variant 2
The second variant was first observed on 27-May-2019. The only change observed in this variant is that the malicious code was moved into multiple modules as shown below:

Fig-3: Macro Code moved into multiple modules
Variant 3
The third variant was first observed on 18-June-2019. With this variant we observed a number of changes as mentioned below:

Fig-4: Text in English language

Fig-5: Macro Code using msiexec to execute the downloaded payload
Variant 4
The fourth variant was first observed on 19-June-2019. This variant moved back to use MS-Excel files and displays the message in the Korean language.
The malware is using a number of images in each variant having the same message as shown below:
Image1
SonicWall Capture Labs provides protection against this threat via the following signatures:
This threat is detected pro-actively by Capture ATP w/RTDMI
Indicators Of Compromise
Network Connections
Payload SHA-256:
Share This Article

An Article By
An Article By
Security News
Security News