Saturday, January 25, 2025
HomeMalwareEMOTET Malware Hijacking the Windows API & Evade the Sandbox Analysis

EMOTET Malware Hijacking the Windows API & Evade the Sandbox Analysis

Published on

SIEM as a Service

Follow Us on Google News

A wide Spread EMOTET malware emerging again with new stealthy capabilities to hijack the Windows API and evade the sandbox detection which also gives more pain for Malware analysis.

Previous future called RunPE that is used for hiding malware into the Legitimate process to evade the security scanners and inject its code into windows executable process.

In this case, EMOTET Changed from RunPE to exploiting the Windows Application programming Interface(API) that is used to create the queue for timers.

Also Read New Terdot Malware operate as a MITM Proxy & Take over FB and Twitter by Steal Browsing Information

Timers Main Function enables the selection of a callback function at a specified time.To add a timer to the queue, call the CreateTimerQueueTimer function. To update a timer-queue timer, call the ChangeTimerQueueTimer function.

In this callback function completely replaced by EMOTET’s actual payload and RunPE also used for Windows API exploitation and making it harder and more difficult to detect by the security scanners.

Evade the Sandbox Techniques

Some Sophisticated malware has an ability to sleep for some periods of time to avoid the detection.Malware scanners have changed the sleeping periods into very short time to wake up the malware to identifying the malicious activities.

Here EMOTET monitoring the anti-malware scanners activities about the sleeping time change character and using CreateTimerQueueTimer, EMOTET keep checking the scanners activities for each and every 0x3E8 milliseconds.

According to Trend Micro Report, This variant has the ability to check if it’s inside a sandbox environment at the second stage of its payload. The EMOTET loader will not proceed if it sees that it’s running inside a sandbox environment.

How Does EMOTET Malware Works

Initially, steps of infection chain start through phishing email campaigns along with malicious URL link and it will drop a document file that contains malicious Macro.

Later it will communicate with Command and control server (hxxp://bonn-medien[.]de/RfThRpWC/) and will execute the dropper PE payload from the malicious site.

Later it will be unpacking the EMOTET Variant and run itself through another process if it does not have admin privilege.

According to Trend Micro. If the process has admin privilege, it will proceed with the following:

  1. Create new service as an auto start to make malware persistent
  2. Change the service description to “Provides support for 3rd party protocol plug-ins for Internet Connection Sharing.”
  3. Start the service.
  4. Collect system information such as process name and system information
  5. Encrypt the collected information via the AES-128 algorithm and SHA1 hash algorithm.
  6. Encrypt the information and POST at the C&C server.

Most companies will not ask for sensitive data from its customers. When in doubt, users should verify with the company to avoid any potential issues. Users should also avoid clicking links or downloading files even if they come from seemingly “trustworthy” sources.Trend Micro said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Researchers have identified an active malware campaign involving a Mirai botnet variant, dubbed Murdoc,...