Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Researchers Dive Into Evolution of Malicious Excel 4.0 Macros

For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

A central part of many organizations’ productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.

During their five-month research, Lastline observed thousands of malicious samples, clustered into waves that provide a comprehensive picture of how the threat has evolved in both sophistication and evasiveness.

The identified techniques, the cybersecurity firm says, include the ability to evade automated sandbox analysis and signature-based detection, but also hands-on analysis by researchers. Each new wave would introduce new techniques, building on the previous wave or cluster, but old methods continue to be used even in current samples.

New waves would emerge every one or two weeks, each one more evasive and sophisticated, extending previous functionality with new techniques. The samples appear generated by a toolkit or document generator, and closely resemble one another.

The malware authors, Lastline says, mainly focused on evasion and obfuscation, leaving the base functionality of the observed samples unmodified: they were created to download and execute a payload such as an EXE or DLL file.

“These macros are very straightforward and easy to create, thus easy to modify to bypass signature-based detection. Security vendors are having difficulty detecting this threat, likely due to not having solutions in place to properly assess and parse the format and structure of how these macros are stored in Excel documents,” Lastline notes.

The first wave of weaponized Excel documents contained a hidden macro holding the payload, along with an image to trick the victim into enabling the macro code, and the ability to perform sandbox and OS checks.

Advertisement. Scroll to continue reading.

Almost all of the following waves build on this functionality, while adding novelty to evasion, payload delivery, and payload execution timing, while also including additional checks, as Lastline explains in their detailed blog.

The researchers also point out that Excel 4.0 macros provide malware authors with “near endless” possibilities, especially since they are quickly evolving, while security companies struggle to keep pace with them.

“Excel 4.0 macros continue to prove their value to attackers, providing a reliable method to get their code to run on a target. In many environments, Excel worksheets with macros are used too heavily for legitimate business purposes to disable or blacklist, thus analysts and security vendors will have to get used to consistently updating tooling and signatures as attacks continue to evolve,” Lastline concludes.

Related: Microsoft Office for Mac Users Exposed to Macro-Based Attacks

Related: Malicious RTF Persistently Asks Users to Enable Macros

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.