An Attack Using Only System Tools Is Not Invisible – You Just Have to Look Harder

  /     /     /  
Publicated : 23/11/2024   Category : security


An Attack Using Only System Tools Is Not Invisible – You Just Have to Look Harder


Microsofts team behind Windows Defender ATP has identified a new fileless malware campaign that can bypass standard antivirus tools.



Microsofts team behind Windows Defender ATP (the commercial version of the companys Windows Defender free antivirus)
has identified
a new fileless malware campaign that can bypass standard antivirus tools. Andrea Lelli wrote up a blog post about how they did it.
Everything started when telemetry to WD ATP showed a sharp increase at the end of May/beginning of June in the use of the Windows Management Instrumentation Command-line (WMIC) tool to run a script (a technique that MITRE refers to XSL Script Processing), indicating a fileless attack. This was their first tip-off that something was going on.
They then found the object of all this was to install the backdoor called Astaroth directly into memory. The backdoor was first found in 2018. This info-stealing malware is known for stealing sensitive information such as credentials, keystrokes and other data, which it then exfiltrates and can send to a remote attacker. It was
previously seen
by Cybereason in a campaign against Brazilian and European users in February of this year.
Microsoft identified the path of attack thusly: A malicious link in a spear-phishing email leads to an LNK file they said. When double-clicked, the LNK file causes the execution of the WMIC tool with the /Format parameter, which allows the download and execution of a JavaScript code. The JavaScript code in turn downloads payloads by abusing the Bitsadmin tool.
After the payload is decrypted into DLLs, the Regsvr32 tool is used to load one of the decoded DLLs, which in turn decrypts and loads other files until the final payload, Astaroth, is injected into the Userinit process.
The attack uses no external tools. It uses legitimate tools that are already present on the target system to obscure what is going on as regular activity. The results of this kind of attack leaves no disk files that traditional AV products can scan.
Microsoft strongly makes the point that being fileless doesnt mean being invisible; and it certainly doesnt mean being undetectable. They think that some of the fileless techniques can be so unusual and anomalous that they will draw immediate attention to the malware, in the same way that a bag of money moving by itself would.
In some ways, Microsofts alert is a way to show off their Defender ATP product. By being able to detect a fileless attack they are trying to show what they perceive as a technological superiority compared to other products.
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
An Attack Using Only System Tools Is Not Invisible – You Just Have to Look Harder