{"id":93314,"date":"2021-04-09T09:31:05","date_gmt":"2021-04-09T16:31:05","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=93314"},"modified":"2023-08-10T13:31:13","modified_gmt":"2023-08-10T20:31:13","slug":"investigating-a-unique-form-of-email-delivery-for-icedid-malware","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/09\/investigating-a-unique-form-of-email-delivery-for-icedid-malware\/","title":{"rendered":"Investigating a unique “form” of email delivery for IcedID malware"},"content":{"rendered":"

Microsoft threat analysts have been tracking activity where contact forms published on websites are abused to deliver malicious links to enterprises using emails with fake legal threats. The emails instruct recipients to click a link to review supposed evidence behind their allegations, but are instead led to the download of IcedID, an info-stealing malware. Microsoft Defender for Office 365 detects and blocks these emails and protects organizations from this threat.<\/p>\n

In this blog, we showcase our analysis on this unique attack and how the techniques behind it help attackers with their malicious goals of finding new ways to infect systems. This threat is notable because:<\/p>\n

    \n
  1. Attackers are abusing legitimate infrastructure, such as websites\u2019 contact forms, to bypass protections, making this threat highly evasive. In addition, attackers use legitimate URLs, in this case Google URLs that require targets to sign in with their Google credentials.<\/li>\n
  2. The emails are being used to deliver the IcedID malware, which can be used for reconnaissance and data exfiltration, and can lead to additional malware payloads, including ransomware.<\/li>\n
  3. This threat shows attackers are always on the hunt for attack paths for infiltrating networks, and they often target services exposed to the internet. Organizations must ensure they have protections against such threats.<\/li>\n<\/ol>\n

    While this specific campaign delivers the IcedID malware, the delivery method can be used to distribute a wide range of other malware, which can in turn introduce other threats to the enterprise. IcedID itself is a banking trojan that has evolved to become an entry point for more sophisticated threats, including human-operated ransomware. It connects to a command-and-control server and downloads additional implants and tools that allow attackers to perform hands-on-keyboard attacks, steal credentials, and move laterally across affected networks to delivering additional payloads.<\/p>\n

    We continue to actively investigate this threat and work with partners to ensure that customers are protected. We have already alerted security groups at Google to bring attention to this threat as it takes advantage of Google URLs.<\/p>\n

    Microsoft 365 Defender<\/a> defends organizations by using advanced technologies informed by Microsoft Defender for Office 365<\/a> and backed by security experts. Microsoft 365 Defender correlates signals on malicious emails, URLs, and files to deliver coordinated defense against evasive threats, their payloads, and their spread across networks.<\/p>\n

    Microsoft Defender for Office 365 supports organizations throughout an attack\u2019s lifecycle, from prevention and detection to investigation, hunting, and remediation\u2013effectively protecting users through a coordinated defense framework.<\/p>\n

    Tracking malicious content in contact forms<\/h2>\n

    Websites typically contain contact form pages as a way to allow site visitors to communicate with site owners, removing the necessity to reveal their email address to potential spammers.<\/p>\n

    However, in this campaign, we observed an influx of contact form emails targeted at enterprises by means of abusing companies\u2019 contact forms. This indicates that attackers may have used a tool that automates this process while circumventing CAPTCHA protections.<\/p>\n

    \"\"<\/p>\n

    Figure 1. Sample contact form that attackers take advantage of by filling in malicious content, which gets delivered to the target enterprises<\/em><\/p>\n

    In this campaign, we tracked that the malicious email that arrives in the recipient\u2019s inbox from the contact form query appears trustworthy as it was sent from trusted email marketing systems, further confirming its legitimacy while evading detection. As the emails are originating from the recipient\u2019s own contact form on their website, the email templates match what they would expect from an actual customer interaction or inquiry.<\/p>\n

    As attackers fill out and submit the web-based form, an email message is generated to the associated contact form recipient or targeted enterprise, containing the attacker-generated message. The message uses strong and urgent language (“Download it right now and check this out for yourself”), and pressures the recipient to act immediately, ultimately compelling recipients to click the links to avoid supposed legal action.<\/p>\n

    \"\"<\/p>\n

    Figure 2. A sample email delivered via contact forms that contain malicious content added by attackers<\/em><\/p>\n

    Along with the fake legal threats written in the comments, the message content also includes a link to a sites.google.com<\/em> page to view the alleged stolen photos for the recipient to view.<\/p>\n

    Clicking the link brings the recipient to a Google page that requires them to sign in with their Google credentials. Because of this added authentication layer, detection technologies may fail in identifying the email as malicious altogether.<\/p>\n

    After the email recipient signs in, the sites.google.com<\/em> page automatically downloads a malicious ZIP file, which contains a heavily obfuscated .js file. The malicious .js file is executed via WScript to create a shell object for launching PowerShell to download the IcedID payload (a .dat file), which is decrypted by a dropped DLL loader, as well as a Cobalt Strike beacon in the form of a stageless DLL, allowing attackers to remotely control the compromised device.<\/p>\n

    The downloaded .dat file loads via the rundll32 executable. The rundll32 executable then launches numerous commands related to the following info-stealing capabilities:<\/p>\n