Yes. The new version 1.0.1.1 will be pushed in a few weeks.Installed v1.0.1.0 and SUMo doesn't show anything later is available... which is correct as far as I'm aware.
Yes. The new version 1.0.1.1 will be pushed in a few weeks.Installed v1.0.1.0 and SUMo doesn't show anything later is available... which is correct as far as I'm aware.
malwaretips.com
malwaretips.com
In the infection chain Windows Script Host is used by the malware. What is the main reason why you decided not to restrict it in the recommended settings?SWH vs. Warzone (aka AveMaria) and AgentTesla campaigns
As a supplement to my previous post, here are examples of recent campaigns with VBA macros (blocked by SWH).
![]()
Malicious PowerPoint files used to push remote access trojans
Since December 2021, a growing trend in phishing campaigns has emerged that uses malicious PowerPoint documents to distribute various types of malware, including remote access and information-stealing trojans. According to a report by Netskope’s Threat Labs shared with Bleeping Computer before...malwaretips.com
![]()
Phishing campaign uses PowerPoint macros to drop Agent Tesla
A new variant of the Agent Tesla malware has been spotted in an ongoing phishing campaign that relies on Microsoft PowerPoint documents laced with malicious macro code.www.bleepingcomputer.com
In these examples, the PowerPoint document is used instead of Excel.
Spam email --> PowerPoint document --> VBA macro --> wscript[.]exe --> PowerShell and Mshta LOLBins download/execute the paylods
PowerPoint and Word use VBA macros (cannot use directly Excel 4.0 macros).
SWH will block VBA code, so the malicious code will not be executed at all.
When one uses other tools adding the DocumentsAntiExploit tool would be sufficient to stop these attacks?SWH vs. Emotet spam campaigns
![]()
Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware
www.trendmicro.com
![]()
Emotet Now Using Unconventional IP Address Formats to Evade Detection
Social engineering campaigns involving the deployment of the Emotet malware botnet have been observed using "unconventional" IP address formats for the first time in a bid to sidestep detection by security solutions. This involves the use of hexadecimal and octal representations of the IP...malwaretips.com
I posted several examples of attacks in the wild that could be easily prevented by SWH. So, it is time to post an example that could bypass SWH alone (but not with ConfigureDefender HIGH settings, or FirewallHardening, or DocumentsAntiExploit tool).
Infection chain:
Spam email --> Excel document --> Excel 4.0 macro --> cmd[.]exe --> Mshta LOLBin downloads/executes the paylod
What is a problem for SWH?
SWH uses system-wide features to harden the system and Microsoft Office applications. Unfortunately, Microsoft adopted the system-wide policy only to disable the VBA support in MS Office (including VBA macros), but there are only non-system-wide policies to disable Excel 4.0 macros. So, Excel 4.0 macros are not blocked by SWH. If the user will be fooled by the attacker to allow macros (blocked by default in MS Office) then the malicious macro will be executed.
Why this is not a problem for ConfigureDefender, FirewallHardening, or DocumentsAntiExploit tools?
Conclusion.
- ConfigureDefender settings will block the child process (cmd[.]exe) via ASR rule,
- FirewallHardening will prevent Mshta LOLBin from downloading the payload,
- DocumentsAntiExploit tool can harden MS Office applications via non-system-wide policies and Excel 4.0 macros will be blocked.
If one does not use Defender with ConfigureDefender settings or other tools, then it would be necessary to check if Excel is configured to block macros without notification, or be cautious with macros in Excel documents.
When one uses other tools adding the DocumentsAntiExploit tool would be sufficient to stop these attacks?
I posted several examples of attacks in the wild that could be easily prevented by SWH. So, it is time to post an example that could bypass SWH alone (but not with ConfigureDefender HIGH settings, or FirewallHardening, or DocumentsAntiExploit tool).
Windows Script Host is restricted in SWH by default (via SRP). Simply, in those examples, the infection chain was stopped before wscript.exe could be executed.In the infection chain Windows Script Host is used by the malware. What is the main reason why you decided not to restrict it in the recommended settings?
Yes, it will prevent running the Excel 4.0 macros. DocumentsAntiExploit tool applies several restrictions and can be used when Defender is not configured with advanced settings or when another AV is used. The user has to use DocumentsAntiExploit on each account, because configuring the restrictions for one particular user does not have an impact to other user accounts.When one uses other tools adding the DocumentsAntiExploit tool would be sufficient to stop these attacks?
malwaretips.com
The intrusions commence with an email message containing an HTML attachment that's disguised as an order confirmation receipt (e.g., Receipt-<digits>.html). Opening the decoy file redirects the message recipient to a web page prompting the user to save an ISO file.
But unlike other attacks that route the victim to a phishing domain set up explicitly for downloading the next-stage malware, the latest RAT campaign cleverly uses JavaScript to locally create the ISO file from a Base64-encoded string and mimic the download process.
Morphisec also pointed out the campaign's advanced tactics, which it said allowed the malware to slip through virtually undetected by most antimalware engines despite the operation being in effect for close to five months.
Would Configure Defender on Max setting also have stopped the attack?
STAGE 2: REFLECTIVE .NET INJECTION
The PowerShell file code that's executed is responsible for:
- Creating persistancy through Schedule Task
- Executing a dropped .vbs file, usually at %ProgramData%
- Unpacking an Base64 encoded and deflate compressed .NET module
- Injecting the .NET module payload in-memory(dropper)
Configure Defender set at MAX does seem to offer very strong protection -
In Q4 2021, HP Wolf Security detected a near sixfold increase (588%) in malware campaigns using malicious Microsoft Excel add-in (XLL) files to infect systems compared to Q3. This technique is tracked in MITRE ATT&CK as T1137.006.2 The purpose of add-ins is that they contain high-performance functions called from an Excel worksheet via an application programming interface (API). This feature enables users to extend the functionality of Excel beyond other scripting interfaces like Visual Basic for Applications (VBA) because it supports more capabilities, such as multithreading. Attackers taking advantage of legitimate APIs and scripting features is not new, but the growing popularity of this technique illustrates how threat actors are continually looking for ways to abuse legitimate features in software to achieve their goals.
This was the first thing I noticed. His tests are clickbait, like so many others: pretty useless.Furthermore, only EXE files were tested.
This was the first thing I noticed. His tests are clickbait, like so many others: pretty useless.
| Added the option <AppInstaller> to restrict the installation of UWP apps via the web browser or downloaded packages: .msix, .appx, .msibundle, .appxbundle |
blog.talosintelligence.com
malwaretips.com