Distribution of MSIX Malware Disguised as Notion Installer

An MSIX malware disguised as the Notion installer is being distributed. The distribution website looks similar to that of the actual Notion homepage.

Figure 1. Website that distributes malware

 

The user gets a file named “Notion-x86.msix” upon clicking the download button. This file is Windows app installer, and it is signed with a valid certificate.

Figure 2. The signature information of the malicious installer

 

The user gets the following pop-up upon running the file. Upon clicking the Install button, Notion is installed on the PC and is infected with malware.

Figure 3. Installation process of the malicious installer

 

Upon installing, StartingScriptWrapper.ps1 and refresh.ps1 files are created inside the application’s path. The StartingScriptWrapper.ps1 file is a legitimate file that contains the MS signature with a feature of executing the Powershell script given as an argument. This file allows the config.json configuration file inside the package to be read during the installation process. It then allows the execution of a certain Powershell script. The package’s config.json is configured to run refresh.ps1 as shown below:

Figure 4. config.json’s file content

 

The file that is run during this process (refresh.ps1) is the actual malware, and it performs the feature of downloading commands from C2 and running them.

The refresh.ps1 file is obfuscated using blank characters, and the string is completed by adding an integer to each variable consisting of blanks and adding or multiplying them. The obfuscated script consists of 8,663 characters, but the string executed at the end is a 200-character long command.

Figure 5. refresh.ps1’s file content

Figure 6. Unobfuscation of refresh.ps1

 

This command downloads additional Powershell commands from the C2 server and executes them. The C2 server is currently not responding properly, but the analysis team confirmed the distribution of LummaC2 malware during the initial analysis.

Additionally, the in-house logs revealed that the hxxps://fleetcontents.com/1.dat file was downloaded and run inside PowerShell.exe. Given the information, this C2 likely responded to the command to download and load 1.dat from other C2.

1.dat is a .NET EXE file that uses the process hollowing technique to inject LummaC2 into RegAsm.exe and run it.

The process tree of the malicious behavior is as follows. As it is executed via Windows Installer, the behavior begins from the relevant service host.

Figure 7. The process tree

 

LummaC2 is an Infostealer that can steal data such as the browser information, cryptocurrency information, and files. For information about LummaC2, check the following blog article.

Before running the files, users should check whether the files are from the domains of official websites and check the signature author even when the files are signed with legitimate certificates. And extra caution is advised when executing MSIX files, because multiple malicious variations take disguise of not only Notion, but also applications such as Slack, WinRar, and Bandicam.

[IOC Information]

Distribution Websites

  • hxxps://trynotion[.]org
  • hxxps://notion.rtpcuan138[.]com
  • hxxps://emobileo[.]com/Notion-x86.msix

Files

  • d888a82701f47a2aa94dcddda392c07d (Dropper/APPX.LummaC2 2024.02.28.00) (Notion-x86.msix)
  • 3cdc99c2649d1d95fe7768ccfd4f1dd5 (Downloader/PowerShell.Obfus 2024.02.28.00) (refresh.ps1)
  • 8a3a10fcb3f67c01cd313a39ab360a80 (Trojan/Win.Generic.C5557471 2024.02.27.01) (dat1)

C2

  • hxxps://ads-tooth[.]top/check.php (refresh.ps1)
  • hxxps://fleetcontents[.]com/1.dat (check.php)
  • hxxps://problemregardybuiwo[.]fun/api (LummaC2)
  • hxxps://technologyenterdo[.]shop/api (LummaC2)
  • hxxps://lighterepisodeheighte[.]fun/api (LummaC2)
  • hxxps://detectordiscusser[.]shop/api (LummaC2)
  • hxxps://edurestunningcrackyow[.]fun/api (LummaC2)
  • hxxps://pooreveningfuseor[.]pw/api (LummaC2)
  • hxxps://turkeyunlikelyofw[.]shop/api (LummaC2)
  • hxxps://associationokeo[.]shop/api (LummaC2)
4.8 4 votes
Article Rating
Subscribe
Notify of
guest

14 Comments
Inline Feedbacks
View all comments
trackback

[…] at the AhnLab Security Emergency Response Center (ASEC) have uncovered a disturbing malware campaign that’s cleverly disguised as a legitimate […]

trackback

[…] Cybersecurity researchers from ASEC exposed the methodology of this attack. When users click the download button, they are given a file named ‘Notion-x89.msix,’ seemingly the official Windows app installer. This campaign is particularly insidious because the file is signed with a valid certificate, enhancing its credibility and making it more challenging for users to identify the threat. […]

trackback

[…] Cybersecurity researchers from ASEC exposed the methodology of this attack. When users click the download button, they are given a file named ‘Notion-x89.msix,’ seemingly the official Windows app installer. This campaign is particularly insidious because the file is signed with a valid certificate, enhancing its credibility and making it more challenging for users to identify the threat. […]

trackback

[…] installation, the malware executes a malicious script designed to steal sensitive information from the victim’s computer. This […]

trackback

[…] The user clicks Install and gets malware-infected Notion. Installs create StartingScriptWrapper.ps1 and refresh.ps1 in the app path, ASEC said. […]

trackback

[…] The user clicks Install and gets malware-infected Notion. Installs create StartingScriptWrapper.ps1 and refresh.ps1 in the app path, ASEC said. […]

trackback

[…] The user clicks Install and gets malware-infected Notion. Installs create StartingScriptWrapper.ps1 and refresh.ps1 in the app path, ASEC said. […]

trackback

[…] The user clicks Install and gets malware-infected Notion. Installs create StartingScriptWrapper.ps1 and refresh.ps1 in the app path, ASEC said. […]

trackback

[…] The user clicks Install and gets malware-infected Notion. Installs create StartingScriptWrapper.ps1 and refresh.ps1 in the app path, ASEC said. […]

trackback

[…] Intelligence Center (ASEC) and eSentire revealed that counterfeit installers for Adobe Reader, Notion and Synaptics are being distributed via fake PDF files and seemingly legitimate websites to deploy […]

trackback

[…] En enero de 2024, se descubrió una campaña de malware conocida como DarkGate que explotaba una reciente vulnerabilidad de seguridad en Microsoft Windows. Según Trend Micro, los usuarios eran engañados a través de archivos PDF con redirecciones de Google DoubleClick Digital Marketing (DDM) que llevaban a sitios comprometidos que alojaban CVE-2024-21412, una vulnerabilidad que permitía instalar software malicioso de Microsoft (.MSI) a través de la omisión del sistema de protección inteligente de Windows SmartScreen. […]

trackback

[…] de AhnLab (ASEC) y eSentire revelaron que los instaladores falsificados de Adobe Reader , Notion y Synaptics se están distribuyendo a través de archivos PDF falsos y sitios web aparentemente […]

trackback

[…] Intelligence Center (ASEC) and eSentire revealed that counterfeit installers for Adobe Reader, Notion and Synaptics are being distributed via fake PDF files and seemingly legitimate websites to deploy […]