Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Researchers Dive Into Evolution of Malicious Excel 4.0 Macros

For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

A central part of many organizations’ productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.

During their five-month research, Lastline observed thousands of malicious samples, clustered into waves that provide a comprehensive picture of how the threat has evolved in both sophistication and evasiveness.

The identified techniques, the cybersecurity firm says, include the ability to evade automated sandbox analysis and signature-based detection, but also hands-on analysis by researchers. Each new wave would introduce new techniques, building on the previous wave or cluster, but old methods continue to be used even in current samples.

New waves would emerge every one or two weeks, each one more evasive and sophisticated, extending previous functionality with new techniques. The samples appear generated by a toolkit or document generator, and closely resemble one another.

The malware authors, Lastline says, mainly focused on evasion and obfuscation, leaving the base functionality of the observed samples unmodified: they were created to download and execute a payload such as an EXE or DLL file.

“These macros are very straightforward and easy to create, thus easy to modify to bypass signature-based detection. Security vendors are having difficulty detecting this threat, likely due to not having solutions in place to properly assess and parse the format and structure of how these macros are stored in Excel documents,” Lastline notes.

The first wave of weaponized Excel documents contained a hidden macro holding the payload, along with an image to trick the victim into enabling the macro code, and the ability to perform sandbox and OS checks.

Almost all of the following waves build on this functionality, while adding novelty to evasion, payload delivery, and payload execution timing, while also including additional checks, as Lastline explains in their detailed blog.

The researchers also point out that Excel 4.0 macros provide malware authors with “near endless” possibilities, especially since they are quickly evolving, while security companies struggle to keep pace with them.

“Excel 4.0 macros continue to prove their value to attackers, providing a reliable method to get their code to run on a target. In many environments, Excel worksheets with macros are used too heavily for legitimate business purposes to disable or blacklist, thus analysts and security vendors will have to get used to consistently updating tooling and signatures as attacks continue to evolve,” Lastline concludes.

Related: Microsoft Office for Mac Users Exposed to Macro-Based Attacks

Related: Malicious RTF Persistently Asks Users to Enable Macros

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.