{"id":87557,"date":"2019-02-15T15:33:57","date_gmt":"2019-02-15T10:03:57","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87557"},"modified":"2019-02-15T15:33:57","modified_gmt":"2019-02-15T10:03:57","slug":"gandcrab-riding-emotets-bus","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/gandcrab-riding-emotets-bus\/","title":{"rendered":"GandCrab Riding Emotet\u2019s Bus!"},"content":{"rendered":"<p>Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even\u00a0<a href=\"https:\/\/blogs.quickheal.com\/gandcrab-ransomware-along-monero-miner-spammer\/\">Malicious JS files<\/a>. It compromised a very high number of websites on the internet. <a href=\"https:\/\/blogs.quickheal.com\/beware-your-website-might-be-delivering-emotet-malware\">Emotet<\/a> malware campaign has existed since 2014. It comes frequently in intervals with different techniques and variants to deliver malware on a victim\u2019s machine. Most of the websites are genuine but somehow tricked into delivering Emotet. But this time, some of these websites were seen delivering <strong>GandCrab Ransomware V 5.1<\/strong> for some time.<\/p>\n<p>The payload was downloaded through a malicious doc on the victim\u2019s computer using VBA macro. The PowerShell script from macro connected to the compromised website and downloaded GandCrab Ransomware from the URL. It is observed that the same website was used in other malicious campaigns and served different purposes over time.<\/p>\n<p><strong>Infection Vector:<\/strong><\/p>\n<figure id=\"attachment_87559\" aria-describedby=\"caption-attachment-87559\" style=\"width: 538px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87559\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig_1._Attack_Chain-538x390.jpg\" alt=\"\" width=\"538\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_1._Attack_Chain-538x390.jpg 538w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_1._Attack_Chain-300x217.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_1._Attack_Chain-768x557.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_1._Attack_Chain-789x572.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_1._Attack_Chain.jpg 829w\" sizes=\"(max-width: 538px) 100vw, 538px\" \/><figcaption id=\"caption-attachment-87559\" class=\"wp-caption-text\">Fig. 1 Attack Chain<\/figcaption><\/figure>\n<p><strong>Technical Analysis:<\/strong><\/p>\n<p>The Microsoft Office Doc file was named \u2018Urgent notice.doc\u2019 and had only text \u2018Urgent notice\u2019.<\/p>\n<figure id=\"attachment_87560\" aria-describedby=\"caption-attachment-87560\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87560\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig_2._Document_File-650x349.jpg\" alt=\"\" width=\"650\" height=\"349\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_2._Document_File-650x349.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_2._Document_File-300x161.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_2._Document_File-768x412.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_2._Document_File-789x423.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_2._Document_File.jpg 1359w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87560\" class=\"wp-caption-text\">Fig. 2 Document File<\/figcaption><\/figure>\n<p>After opening the file, it asks to enable macros to perform downloading tasks.<\/p>\n<p><strong>Macro:<\/strong><\/p>\n<p>The Malicious Macro contained 3 modules and one form. Form named \u2018f\u2019 contains the obfuscated PowerShell data and 3 modules having random names like cBbOFw, BJXTRQZOY, lC0gFL58m contain code to execute de-obfuscated PowerShell script.<\/p>\n<figure id=\"attachment_87561\" aria-describedby=\"caption-attachment-87561\" style=\"width: 636px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87561\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig_3._Modules_and_Form-636x390.jpg\" alt=\"\" width=\"636\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_3._Modules_and_Form-636x390.jpg 636w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_3._Modules_and_Form-300x184.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_3._Modules_and_Form.jpg 674w\" sizes=\"(max-width: 636px) 100vw, 636px\" \/><figcaption id=\"caption-attachment-87561\" class=\"wp-caption-text\">Fig. 3 Modules and Form<\/figcaption><\/figure>\n<p><strong>Form:<\/strong><\/p>\n<figure id=\"attachment_87562\" aria-describedby=\"caption-attachment-87562\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87562\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig_4._Obfuscated_Macro-650x190.jpg\" alt=\"\" width=\"650\" height=\"190\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_4._Obfuscated_Macro-650x190.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_4._Obfuscated_Macro-300x87.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_4._Obfuscated_Macro-768x224.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_4._Obfuscated_Macro-789x230.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig_4._Obfuscated_Macro.jpg 998w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87562\" class=\"wp-caption-text\">Fig. 4 Obfuscated Macro<\/figcaption><\/figure>\n<p>This can be de-obfuscated by simply replacing \u20185820.5840869546\u2019 with null (i.e. removing &#8216;5820.5840869546&#8217; from the string)<\/p>\n<p><strong>Output:<\/strong><\/p>\n<figure id=\"attachment_87563\" aria-describedby=\"caption-attachment-87563\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87563\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig._5_Deobfuscated_Macro-650x44.jpg\" alt=\"\" width=\"650\" height=\"44\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._5_Deobfuscated_Macro-650x44.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._5_Deobfuscated_Macro-300x20.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._5_Deobfuscated_Macro-768x52.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._5_Deobfuscated_Macro-789x53.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._5_Deobfuscated_Macro.jpg 933w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87563\" class=\"wp-caption-text\">Fig. 5 De-obfuscated Macro<\/figcaption><\/figure>\n<p>This output is prepended by the first three characters \u2018P\u2019, \u2019o\u2019 and \u2018w\u2019 using variables at the start of it. Hence, this forms initial word PowerShell then used by function love () and is executed to download and launch the payload.<\/p>\n<figure id=\"attachment_87564\" aria-describedby=\"caption-attachment-87564\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87564\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig._-6_PowerShell_Execution-650x298.jpg\" alt=\"\" width=\"650\" height=\"298\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._-6_PowerShell_Execution-650x298.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._-6_PowerShell_Execution-300x137.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._-6_PowerShell_Execution-768x352.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._-6_PowerShell_Execution-789x362.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._-6_PowerShell_Execution.jpg 1366w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87564\" class=\"wp-caption-text\">Fig. 6 PowerShell Execution<\/figcaption><\/figure>\n<p>After execution of this PowerShell script, putty.exe which is the GandCrab payload was downloaded to \u2018C: \\Windows\\Temp\u2019 directory of victim\u2019s machine and same was executed.<\/p>\n<p><strong>\u00a0<\/strong><strong>GandCrab<\/strong><strong> Payload:<\/strong><\/p>\n<p>On execution, it encrypted all files and showed the GandCrab wallpaper. From ransom note, it is clear that the payload was of GandCrab V 5.1 ransomware.<\/p>\n<figure id=\"attachment_87565\" aria-describedby=\"caption-attachment-87565\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87565\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig.7_Ransom_Note-650x351.jpg\" alt=\"\" width=\"650\" height=\"351\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig.7_Ransom_Note-650x351.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig.7_Ransom_Note-300x162.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig.7_Ransom_Note-768x415.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig.7_Ransom_Note-789x426.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig.7_Ransom_Note.jpg 1366w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87565\" class=\"wp-caption-text\">Fig. 7 Ransom Note<\/figcaption><\/figure>\n<p>GandCrab finds AV processes on victim\u2019s computer, also it tries to kill other running processes like SQL database servers to ensure encryption of important files. GandCrab then encrypts all files with Salsa20 Encryption Algorithm and this Salsa20 key is encrypted with RSA-2048 and appended to file after data. It is not feasible to decrypt the data without the private key. It is observed that it collects all data related to the user like username, computer name, workgroup, IP address. This data is encrypted with the RC4 encryption algorithm and sends to the C&amp;C server.<\/p>\n<p>The GandCrab v5 ransomware has started using Task Scheduler ALPC vulnerability to gain System privileges on an infected computer.<\/p>\n<p>After encryption, it asks for $700 in dash\/bitcoin cryptocurrency; also 10% charges are applicable for miner fees\/commission. In the past, if the victim could not pay the full ransom amount, he\/she was offered some discount to decrypt the files.<\/p>\n<figure id=\"attachment_87566\" aria-describedby=\"caption-attachment-87566\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87566\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/02\/Fig._8_GandCrab_Ransom_Page-650x383.jpg\" alt=\"\" width=\"650\" height=\"383\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._8_GandCrab_Ransom_Page-650x383.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._8_GandCrab_Ransom_Page-300x177.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._8_GandCrab_Ransom_Page-768x453.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._8_GandCrab_Ransom_Page-789x465.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/02\/Fig._8_GandCrab_Ransom_Page.jpg 1273w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87566\" class=\"wp-caption-text\">Fig. 8 GandCrab Ransom Page<\/figcaption><\/figure>\n<p>It is observed that in the end, GandCrab tries to connect with the number of compromised domains having a particular URL formation algorithm as discussed <a href=\"https:\/\/blogs.quickheal.com\/gandcrab-says-will-become-back-soon\/\">previously<\/a>. This behavior shows a similarity with <a href=\"https:\/\/blogs.quickheal.com\/evolution-4-year-old-threat-emotet-infamous-trojan-complex-threat-distributer\/\">Emotet campaign<\/a>.<\/p>\n<p>After a few hours, the same domain started serving pornographic phishing content.<\/p>\n<p><strong>Indicator of Compromise:<\/strong><\/p>\n<p>Doc File (Urgent notice.doc): 64F3F3CC1E121B295DA1FF74CC180473<\/p>\n<p>Exe File (Putty.exe): 5B1B6AF59E29D9A2AA120277CAB14D0C<\/p>\n<p><strong>Precautions:<\/strong><\/p>\n<ul>\n<li>Do not open emails from unknown sources.<\/li>\n<li>Do not download attachments received from an untrusted source.<\/li>\n<li>Validate sender\u2019s email id before clicking URLs mentioned in the mail.<\/li>\n<li>Do not enable macros\/editing mode by default.<\/li>\n<\/ul>\n<p><strong>We recommend our users to apply the latest Microsoft update packages and keep their antivirus up-to-date <\/strong><strong>with active email protection. <\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>Subject Matter Experts<\/strong><\/p>\n<p>Jayesh Kulkarni, Amit Gadhave | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even\u00a0Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes frequently in intervals with different techniques and variants to deliver malware on a victim\u2019s machine. Most [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":87567,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24,910,293],"tags":[1652,1615,1646],"class_list":["post-87557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-malware","category-ransomware","category-spam","tag-bot","tag-emotet","tag-gandcrab"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87557"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87557"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87557\/revisions"}],"predecessor-version":[{"id":87568,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87557\/revisions\/87568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87567"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}