Malware gang uses .NET library to generate Excel docs that bypass security checks

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,151
A newly discovered malware gang is using a clever trick to create malicious Excel files that have low detection rates and a higher chance of evading security systems.

Discovered by security researchers from NVISO Labs, this malware gang — which they named Epic Manchego — has been active since June, targeting companies all over the world with phishing emails that carry a malicious Excel document.

But NVISO said these weren't your standard Excel spreadsheets. The malicious Excel files were bypassing security scanners and had low detection rates.
According to NVISO, this was because the documents weren't compiled in the standard Microsoft Office software, but with a .NET library called EPPlus.
Indicators of compromise and a technical breakdown of the malicious EPPlus-rendered Excel files are available in NVISO Labs' Epic Manchego report.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,118
Unfortunately, MS Office applications allow so many document formats and their variations, that it is very hard to close all vulnerabilities. Furthermore, Microsoft is still expanding the abilities of MS Office applications. So the recent security improvement based on sandboxing (Application Guard for Office) is welcome, although not available yet for non-enterprise consumers.
 

upnorth

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
Your very correct Andy, and at least most of the reported IOC's ( payloads ) that I checked is pretty high detected by most AV vendors, including Microsoft Defender.
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
The article says these malicious docs contain VBA macros.
Does Windows Defender Attack surface reduction (ASR) block this?
Does Hard_Configurator block this?
I am not clear on the difference between VBA and VBS.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,118
The article says these malicious docs contain VBA macros.
Does Windows Defender Attack surface reduction (ASR) block this?
Does Hard_Configurator block this?
I am not clear on the difference between VBA and VBS.
The MS Office applications can still see the macro embedded in such weaponized documents (the yellow bar is not bypassed). So, the macros will be blocked/mitigated by ASR rules, H_C, SWH, and SysHardener as usual. The problem can have security applications (such as AVs) that detect macros by examining the weaponized documents, but do not restrict the MS Office applications (by child processes, anti-exploit mitigations, etc.).

The main difference between VBScript and VBA is that VBScript is a scripting language (requires an interpreter) as compared to VBA which is a programming language (the code can be compiled) - both are based on Visual Basic. The VBA has got also more features:
 
Last edited:

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
The MS Office applications can still see the macro embedded in such weaponized documents (the yellow bar is not bypassed). So, the macros will be blocked/mitigated by ASR rules, H_C, SWH, and SysHardener as usual. The problem can have security applications (such as AVs) that detect macros by examining the weaponized documents, but do not restrict the MS Office applications (by child processes, anti-exploit mitigations, etc.).

The main difference between VBScript and VBA is that VBScript is a scripting language (requires an interpreter) as compared to VBA which is a programming language (the code can be compiled) - both are based on Visual Basic. The VBA has got also more features:
Thanks Andy!
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top