Categories: Malware

EMOTET Malware Hijacking the Windows API & Evade the Sandbox Analysis

A wide Spread EMOTET malware emerging again with new stealthy capabilities to hijack the Windows API and evade the sandbox detection which also gives more pain for Malware analysis.

Previous future called RunPE that is used for hiding malware into the Legitimate process to evade the security scanners and inject its code into windows executable process.

In this case, EMOTET Changed from RunPE to exploiting the Windows Application programming Interface(API) that is used to create the queue for timers.

Also Read New Terdot Malware operate as a MITM Proxy & Take over FB and Twitter by Steal Browsing Information

Timers Main Function enables the selection of a callback function at a specified time.To add a timer to the queue, call the CreateTimerQueueTimer function. To update a timer-queue timer, call the ChangeTimerQueueTimer function.

In this callback function completely replaced by EMOTET’s actual payload and RunPE also used for Windows API exploitation and making it harder and more difficult to detect by the security scanners.

Evade the Sandbox Techniques

Some Sophisticated malware has an ability to sleep for some periods of time to avoid the detection.Malware scanners have changed the sleeping periods into very short time to wake up the malware to identifying the malicious activities.

Here EMOTET monitoring the anti-malware scanners activities about the sleeping time change character and using CreateTimerQueueTimer, EMOTET keep checking the scanners activities for each and every 0x3E8 milliseconds.

According to Trend Micro Report, This variant has the ability to check if it’s inside a sandbox environment at the second stage of its payload. The EMOTET loader will not proceed if it sees that it’s running inside a sandbox environment.

How Does EMOTET Malware Works

Initially, steps of infection chain start through phishing email campaigns along with malicious URL link and it will drop a document file that contains malicious Macro.

Later it will communicate with Command and control server (hxxp://bonn-medien[.]de/RfThRpWC/) and will execute the dropper PE payload from the malicious site.

Later it will be unpacking the EMOTET Variant and run itself through another process if it does not have admin privilege.

According to Trend Micro. If the process has admin privilege, it will proceed with the following:

  1. Create new service as an auto start to make malware persistent
  2. Change the service description to “Provides support for 3rd party protocol plug-ins for Internet Connection Sharing.”
  3. Start the service.
  4. Collect system information such as process name and system information
  5. Encrypt the collected information via the AES-128 algorithm and SHA1 hash algorithm.
  6. Encrypt the information and POST at the C&C server.

Most companies will not ask for sensitive data from its customers. When in doubt, users should verify with the company to avoid any potential issues. Users should also avoid clicking links or downloading files even if they come from seemingly “trustworthy” sources.Trend Micro said.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

17 hours ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

19 hours ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

23 hours ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits…

2 days ago

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…

2 days ago