{"id":153472,"date":"2022-06-07T21:29:40","date_gmt":"2022-06-08T04:29:40","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=153472"},"modified":"2023-07-12T12:28:07","modified_gmt":"2023-07-12T19:28:07","slug":"phishing-campaigns-featuring-ursnif-trojan","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/","title":{"rendered":"Phishing Campaigns featuring Ursnif Trojan on the Rise"},"content":{"rendered":"<p>Authored by Jyothi Naveen and Kiran Raj<\/p>\n<p>McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities. These malicious documents reach victims via mass spam E-mail campaigns and generally invoke urgency, fear, or similar emotions, leading unsuspecting users to promptly open them. The purpose of these spam operations is to deliver malicious payloads to as many people as possible.<\/p>\n<p>A recent spam campaign was using malicious word documents to download and execute the Ursnif trojan. Ursnif is a high-risk trojan designed to record various sensitive information. It typically archives this sensitive data and sends it back to a command-and-control server.<\/p>\n<p>This blog describes how attackers use document properties and a few other techniques to download and execute the Ursnif trojan.<\/p>\n<h2>Threat Summary<\/h2>\n<ul>\n<li>The initial attack vector is a phishing email with a Microsoft Word document attachment.<\/li>\n<li>Upon opening the document, VBA executes a malicious shellcode<\/li>\n<li>Shellcode downloads the remote payload, Ursnif, and invokes rundll32.exe to execute it.<\/li>\n<\/ul>\n<h2><em>Infection Chain<\/em><\/h2>\n<p>The malware arrives through a phishing email containing a Microsoft Word document as an attachment. When the document is opened and macros are enabled, Word downloads a DLL (Ursnif payload). The Ursnif payload is then executed using rundll32.exe<\/p>\n<figure id=\"attachment_153669\" aria-describedby=\"caption-attachment-153669\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-153669 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure1-flowchart-of-infection-chain.png\" alt=\"Figure 1- flowchart of infection chain\" width=\"650\" height=\"266\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure1-flowchart-of-infection-chain.png 650w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure1-flowchart-of-infection-chain-300x123.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure1-flowchart-of-infection-chain-205x84.png 205w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-153669\" class=\"wp-caption-text\">Figure 1- flowchart of infection chain<\/figcaption><\/figure>\n<h2><em>Word Analysis<\/em><\/h2>\n<p>Macros are disabled by default and the malware authors are aware of this and hence present an image to entice the victims into enabling them.<\/p>\n<figure id=\"attachment_153655\" aria-describedby=\"caption-attachment-153655\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-153655 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-2-Image-of-what-the-user-sees-upon-opening-the-document-1024x527.png\" alt=\"Figure 2- Image of what the user sees upon opening the document\" width=\"1024\" height=\"527\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-2-Image-of-what-the-user-sees-upon-opening-the-document-1024x527.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-2-Image-of-what-the-user-sees-upon-opening-the-document-300x154.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-2-Image-of-what-the-user-sees-upon-opening-the-document-768x395.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-2-Image-of-what-the-user-sees-upon-opening-the-document-205x106.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-2-Image-of-what-the-user-sees-upon-opening-the-document.png 1476w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-153655\" class=\"wp-caption-text\">Figure 2- Image of what the user sees upon opening the document<\/figcaption><\/figure>\n<h2>VBA Macro Analysis of Word Document<\/h2>\n<p>Analyzing the sample statically with \u2018oleId\u2019 and \u2018olevba\u2019 indicates the suspicious vectors..<\/p>\n<figure id=\"attachment_153641\" aria-describedby=\"caption-attachment-153641\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153641\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-3-Oleid-output.png\" alt=\"Figure 3- Oleid output\" width=\"624\" height=\"400\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-3-Oleid-output.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-3-Oleid-output-300x192.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-3-Oleid-output-201x129.png 201w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><figcaption id=\"caption-attachment-153641\" class=\"wp-caption-text\">Figure 3- Oleid output<\/figcaption><\/figure>\n<figure id=\"attachment_153627\" aria-describedby=\"caption-attachment-153627\" style=\"width: 613px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153627\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-4-Olevba-output.png\" alt=\"Figure 4- Olevba output\" width=\"613\" height=\"253\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-4-Olevba-output.png 613w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-4-Olevba-output-300x124.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-4-Olevba-output-205x85.png 205w\" sizes=\"auto, (max-width: 613px) 100vw, 613px\" \/><figcaption id=\"caption-attachment-153627\" class=\"wp-caption-text\">Figure 4- Olevba output<\/figcaption><\/figure>\n<p>The VBA Macro is compatible with x32 and x64 architectures and is highly obfuscated as seen in Figure-5<\/p>\n<figure id=\"attachment_153613\" aria-describedby=\"caption-attachment-153613\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-153613 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro-1024x487.png\" alt=\"Figure 5- Obfuscated VBA macro\" width=\"1024\" height=\"487\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro-1024x487.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro-300x143.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro-768x366.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro-1536x731.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro-205x98.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-5-Obfuscated-VBA-macro.png 1794w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-153613\" class=\"wp-caption-text\">Figure 5- Obfuscated VBA macro<\/figcaption><\/figure>\n<p>To get a better understanding of the functionality, we have de-obfuscated the contents in the 2 figures shown below.<\/p>\n<figure id=\"attachment_153599\" aria-describedby=\"caption-attachment-153599\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-153599 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1-1024x358.png\" alt=\"Figure 6- De-obfuscated VBA macro (stage 1)\" width=\"1024\" height=\"358\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1-1024x358.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1-300x105.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1-768x268.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1-1536x536.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1-205x72.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-6-De-obfuscated-VBA-macro-stage-1.png 1807w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-153599\" class=\"wp-caption-text\">Figure 6- De-obfuscated VBA macro (stage 1)<\/figcaption><\/figure>\n<figure id=\"attachment_153585\" aria-describedby=\"caption-attachment-153585\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-153585 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2-1024x401.png\" alt=\"Figure 7- De-obfuscated VBA macro (stage 2)\" width=\"1024\" height=\"401\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2-1024x401.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2-300x117.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2-768x301.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2-1536x601.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2-205x80.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-7-De-obfuscated-VBA-macro-stage-2.png 1812w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-153585\" class=\"wp-caption-text\">Figure 7- De-obfuscated VBA macro (stage 2)<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">An interesting characteristic of this sample is that some of the strings like CLSID, URL for downloading Ursnif, and environment variables names are stored in custom document properties in reverse. As shown in Figure-7, VBA function \u201cActiveDocument.CustomDocumentProperties()&#8221; is used to retrieve the properties and uses &#8220;StrReverse&#8221; to reverse the contents.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We can see the document properties in Figure-8\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-153683\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/img.png\" alt=\"\" width=\"497\" height=\"354\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/img.png 497w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/img-300x214.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/img-181x129.png 181w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\" \/><\/p>\n<figure id=\"attachment_153571\" aria-describedby=\"caption-attachment-153571\" style=\"width: 501px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153571\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-8-Document-properties.png\" alt=\"Figure 8- Document properties\" width=\"501\" height=\"354\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-8-Document-properties.png 501w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-8-Document-properties-300x212.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-8-Document-properties-183x129.png 183w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><figcaption id=\"caption-attachment-153571\" class=\"wp-caption-text\">Figure 8- Document properties<\/figcaption><\/figure>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Payload Download and Execution:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The malicious macro retrieves hidden shellcode from a custom property named &#8220;Company&#8221; using the &#8220;cdec&#8221; function that converts the shellcode from string to decimal\/hex value and executes it. The shellcode is shown below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_153557\" aria-describedby=\"caption-attachment-153557\" style=\"width: 566px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153557\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-9-Raw-Company-property.png\" alt=\"Figure 9- Raw Company property\" width=\"566\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-9-Raw-Company-property.png 566w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-9-Raw-Company-property-300x153.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-9-Raw-Company-property-205x104.png 205w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\" \/><figcaption id=\"caption-attachment-153557\" class=\"wp-caption-text\">Figure 9- Raw Company property<\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW245930350 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW245930350 BCX0\">The<\/span><span class=\"NormalTextRun SCXW245930350 BCX0\"> shellcode <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW245930350 BCX0\">is <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW245930350 BCX0\">written<\/span><span class=\"NormalTextRun SCXW245930350 BCX0\"> to <\/span><span class=\"NormalTextRun SCXW245930350 BCX0\">memory and the<\/span> <span class=\"NormalTextRun SCXW245930350 BCX0\">access protection<\/span><span class=\"NormalTextRun SCXW245930350 BCX0\"> is changed to <\/span><span class=\"NormalTextRun SCXW245930350 BCX0\">PAGE_<\/span><span class=\"NormalTextRun SCXW245930350 BCX0\">EXECUTE_READWRITE<\/span><\/span><span class=\"TextRun SCXW245930350 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW245930350 BCX0\">.<\/span><\/span><span class=\"EOP SCXW245930350 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_153543\" aria-describedby=\"caption-attachment-153543\" style=\"width: 805px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153543\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-10-Code-of-VirtualProtect.png\" alt=\"Figure 10- Code of VirtualProtect\" width=\"805\" height=\"90\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-10-Code-of-VirtualProtect.png 805w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-10-Code-of-VirtualProtect-300x34.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-10-Code-of-VirtualProtect-768x86.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-10-Code-of-VirtualProtect-205x23.png 205w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/><figcaption id=\"caption-attachment-153543\" class=\"wp-caption-text\">Figure 10- Code of VirtualProtect<\/figcaption><\/figure>\n<figure id=\"attachment_153529\" aria-describedby=\"caption-attachment-153529\" style=\"width: 657px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153529\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-11-Shellcodes-memory-and-protection-after-calling-VirtualProtect.png\" alt=\"Figure 11- Shellcode\u2019s memory and protection after calling VirtualProtect()\" width=\"657\" height=\"292\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-11-Shellcodes-memory-and-protection-after-calling-VirtualProtect.png 657w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-11-Shellcodes-memory-and-protection-after-calling-VirtualProtect-300x133.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-11-Shellcodes-memory-and-protection-after-calling-VirtualProtect-205x91.png 205w\" sizes=\"auto, (max-width: 657px) 100vw, 657px\" \/><figcaption id=\"caption-attachment-153529\" class=\"wp-caption-text\">Figure 11- Shellcode\u2019s memory and protection after calling VirtualProtect()<\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW223560826 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW223560826 BCX0\">After <\/span><span class=\"NormalTextRun SCXW223560826 BCX0\">adding<\/span><span class=\"NormalTextRun SCXW223560826 BCX0\"> the shellcode in memory, <\/span><span class=\"NormalTextRun SCXW223560826 BCX0\">the <\/span><span class=\"NormalTextRun SCXW223560826 BCX0\">environment variable containing the malicious <\/span><span class=\"NormalTextRun SCXW223560826 BCX0\">URL of <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW223560826 BCX0\">Ursnif<\/span><span class=\"NormalTextRun SCXW223560826 BCX0\"> payload is created.<\/span><span class=\"NormalTextRun SCXW223560826 BCX0\"> This Environment variable will be <\/span><span class=\"NormalTextRun SCXW223560826 BCX0\">later used by the shellcode<\/span><span class=\"NormalTextRun SCXW223560826 BCX0\">.<\/span><\/span><span class=\"EOP SCXW223560826 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_153515\" aria-describedby=\"caption-attachment-153515\" style=\"width: 805px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153515\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-12-Environment-variable-set-in-Winword.exe-space.png\" alt=\"Figure 12- Environment variable set in Winword.exe space\" width=\"805\" height=\"133\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-12-Environment-variable-set-in-Winword.exe-space.png 805w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-12-Environment-variable-set-in-Winword.exe-space-300x50.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-12-Environment-variable-set-in-Winword.exe-space-768x127.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-12-Environment-variable-set-in-Winword.exe-space-205x34.png 205w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/><figcaption id=\"caption-attachment-153515\" class=\"wp-caption-text\">Figure 12- Environment variable set in Winword.exe space<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">The shellcode is executed with the use of the SetTimer API. SetTimer creates a timer with the specified time-out value mentioned and notifies a function when the time is elapsed. The 4<\/span><span data-contrast=\"auto\">th<\/span><span data-contrast=\"auto\"> parameter used to call SetTimer is the pointer to the shellcode in memory which will be invoked when the mentioned time is elapsed.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_153501\" aria-describedby=\"caption-attachment-153501\" style=\"width: 805px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153501\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-13-SetTimer-function-Execution-of-shellCode.png\" alt=\"Figure 13- SetTimer function (Execution of shellCode)\" width=\"805\" height=\"112\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-13-SetTimer-function-Execution-of-shellCode.png 805w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-13-SetTimer-function-Execution-of-shellCode-300x42.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-13-SetTimer-function-Execution-of-shellCode-768x107.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-13-SetTimer-function-Execution-of-shellCode-205x29.png 205w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/><figcaption id=\"caption-attachment-153501\" class=\"wp-caption-text\">Figure 13- SetTimer function (Execution of shellCode)<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">The shellcode downloads the file from the URL stored in the environmental variable and stores it as &#8221; y9C4A.tmp.dll &#8221; and executes it with rundll32.exe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"2\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">URL<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">hxxp:\/\/docmasterpassb.top\/kdv\/x7t1QUUADWPEIQyxM6DT3vtrornV4uJcP4GvD9vM\/<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">CMD<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">rundll32 &#8220;C:\\Users\\user\\AppData\\Local\\Temp\\y9C4A.tmp.dll&#8221;,DllRegisterServer<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_153487\" aria-describedby=\"caption-attachment-153487\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-153487 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-14-Exports-of-Downloaded-DLL-1024x867.png\" alt=\"Figure 14- Exports of Downloaded DLL\" width=\"1024\" height=\"867\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-14-Exports-of-Downloaded-DLL-1024x867.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-14-Exports-of-Downloaded-DLL-300x254.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-14-Exports-of-Downloaded-DLL-768x650.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-14-Exports-of-Downloaded-DLL-152x129.png 152w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-14-Exports-of-Downloaded-DLL.png 1115w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-153487\" class=\"wp-caption-text\">Figure 14- Exports of Downloaded DLL<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">After successful execution of the shellcode, the environment variable is removed.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_153473\" aria-describedby=\"caption-attachment-153473\" style=\"width: 805px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-153473\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-15-Removal-of-Environment-Variable.png\" alt=\"Figure 15- Removal of Environment Variable\" width=\"805\" height=\"119\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-15-Removal-of-Environment-Variable.png 805w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-15-Removal-of-Environment-Variable-300x44.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-15-Removal-of-Environment-Variable-768x114.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/Figure-15-Removal-of-Environment-Variable-205x30.png 205w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/><figcaption id=\"caption-attachment-153473\" class=\"wp-caption-text\">Figure 15- Removal of Environment Variable<\/figcaption><\/figure>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">IOC<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"4\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">TYPE<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">VALUE<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">PRODUCT<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">DETECTION NAME<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"none\">Main Word Document<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">6cf97570d317b42ef8bfd4ee4df21d217d5f27b73ff236049d70c37c5337909f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">McAfee LiveSafe and Total Protection<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">X97M\/Downloader.CJG<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"none\">Downloaded dll<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">McAfee LiveSafe and Total Protection<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Ursnif-FULJ<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"none\">URL to download dll<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">hxxp:\/\/docmasterpassb.top\/kdv\/x7t1QUUADWPEIQyxM6DT3vtrornV4uJcP4GvD9vM\/<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">WebAdvisor<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Blocked<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:150,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">MITRE Attack Framework<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"6\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"69905\"><b><span data-contrast=\"none\">Technique ID<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:3,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><span data-contrast=\"none\">Tactic<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:3,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><span data-contrast=\"none\">Technique Details<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:3,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><span data-contrast=\"none\">Description<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:3,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"4369\"><b><span data-contrast=\"none\">T1566.001<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Initial Access<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Spear phishing Attachment<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Manual execution by user<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"4369\"><b><span data-contrast=\"none\">T1059.005<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Execution<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Visual Basic<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Malicious VBA macros<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"4369\"><b><span data-contrast=\"none\">T1218.011<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Defense Evasion<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">Signed binary abuse<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Rundll32.exe is used<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"4369\"><b><span data-contrast=\"auto\">T1027<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Defense Evasion<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">Obfuscation techniques<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">VBA and powershell base64 executions<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"4369\"><b><span data-contrast=\"auto\">T1086<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"none\">Execution<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">Powershell execution<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">PowerShell command abuse<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"none\">Conclusion<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Macros are disabled by default in Microsoft Office applications, we suggest keeping it that way unless the document is received from a trusted source. The infection chain discussed in the blog is not limited to Word or Excel. Further threats may use other live-off-the-land tools to download its payloads.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee customers are protected against the malicious files and sites detailed in this blog with McAfee LiveSafe\/Total Protection and McAfee Web Advisor.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft&#8230;<\/p>\n","protected":false},"author":695,"featured_media":153711,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,214],"coauthors":[4136],"class_list":["post-153472","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-cybersecurity","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-08T04:29:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T19:28:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Phishing Campaigns featuring Ursnif Trojan on the Rise\",\"datePublished\":\"2022-06-08T04:29:40+00:00\",\"dateModified\":\"2023-07-12T19:28:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/\"},\"wordCount\":957,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg\",\"keywords\":[\"cybersecurity\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/\",\"name\":\"Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg\",\"datePublished\":\"2022-06-08T04:29:40+00:00\",\"dateModified\":\"2023-07-12T19:28:07+00:00\",\"description\":\"Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing Campaigns featuring Ursnif Trojan on the Rise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog","description":"Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog","og_description":"Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-06-08T04:29:40+00:00","article_modified_time":"2023-07-12T19:28:07+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Phishing Campaigns featuring Ursnif Trojan on the Rise","datePublished":"2022-06-08T04:29:40+00:00","dateModified":"2023-07-12T19:28:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/"},"wordCount":957,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg","keywords":["cybersecurity","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/","name":"Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg","datePublished":"2022-06-08T04:29:40+00:00","dateModified":"2023-07-12T19:28:07+00:00","description":"Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_MFE_Blogs_051722_Blog-1.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-campaigns-featuring-ursnif-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Phishing Campaigns featuring Ursnif Trojan on the Rise"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/153472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=153472"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/153472\/revisions"}],"predecessor-version":[{"id":171575,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/153472\/revisions\/171575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/153711"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=153472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=153472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=153472"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=153472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}