{"id":84916,"date":"2017-10-10T11:09:51","date_gmt":"2017-10-10T05:39:51","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84916"},"modified":"2017-10-10T11:18:46","modified_gmt":"2017-10-10T05:48:46","slug":"fileless-malware-uses-unique-technique-analysis-quick-heal-security-labs","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/fileless-malware-uses-unique-technique-analysis-quick-heal-security-labs\/","title":{"rendered":"A fileless malware uses a unique technique &#8211; an analysis by Quick Heal Security Labs"},"content":{"rendered":"<p>Spam email campaigns have increased with the use of multiple random techniques which improve the efficiency of payload distribution to spread malware to more number of users. These attacks have been randomly observed to have increased rapidly in numbers; similar techniques, observed first time in mid-2014, were used in the distribution of the <strong>Poweliks fileless malware<\/strong>.<\/p>\n<p><strong>Technical analysis of the observed campaign<\/strong><\/p>\n<p>In this campaign, the attacker uses an XML script and has a Windows Script Component (WSC) to deliver the malicious payload \u2013 this technique has the ability to easily modify obfuscation. A small XML script having a set of instructions is used to download another script file from compromised websites. The attacker uses this XML file because they can easily change the code and deliver a new variant.<\/p>\n<p><strong>Attack chain sequence<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84921 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/10\/Unique1.jpg\" alt=\"unique1\" width=\"303\" height=\"344\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique1.jpg 478w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique1-264x300.jpg 264w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique1-343x390.jpg 343w\" sizes=\"(max-width: 303px) 100vw, 303px\" \/><\/p>\n<figure id=\"attachment_84922\" aria-describedby=\"caption-attachment-84922\" style=\"width: 514px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84922\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/10\/Unique2.jpg\" alt=\"Fig 1. XML script\" width=\"514\" height=\"186\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique2.jpg 838w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique2-300x108.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique2-768x278.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique2-650x235.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique2-789x285.jpg 789w\" sizes=\"(max-width: 514px) 100vw, 514px\" \/><figcaption id=\"caption-attachment-84922\" class=\"wp-caption-text\">Fig 1. XML script<\/figcaption><\/figure>\n<p>The set of instructions works as follows<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84917 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/10\/Unique3.JPG.png\" alt=\"unique3-jpg\" width=\"343\" height=\"109\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique3.JPG.png 343w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique3.JPG-300x95.png 300w\" sizes=\"(max-width: 343px) 100vw, 343px\" \/><\/p>\n<p>Here, rundll32 is used for running the DLL file and placing its library in the memory with the following command line.<\/p>\n<p>Rundll32.exe &lt;DLL name&gt;, &lt;entry point&gt;<\/p>\n<p>Let\u2019s understand how Rundll32 is successfully able to parse the parameters and the argument. Rundll32 internally parses the command line and searches for the comma (\u2018,\u2019) to locate the DLL name and space to locate the entry point name.<\/p>\n<p>In the above script code, Rundll32 finds mshtml as dllname and RunHTMLApplication as an entry point. For now \u2018javascript:\u2019 prefix seems to be unwanted. The RunHTMLApplication calls \u2018CreateUrlMoniker\u2019 which parses the command line to find the string before \u2018:\u2019 i.e., JavaScript. \u2018Microsoft HTML\u2019 is the handler for the JavaScript.<\/p>\n<p>The XML file-delivered script file has the actual malicious payload location and instructions to de-obfuscate malware. Every time, the payload location varies.<\/p>\n<figure id=\"attachment_84918\" aria-describedby=\"caption-attachment-84918\" style=\"width: 651px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84918\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/10\/Unique4.JPG.png\" alt=\"Fig 2. VBS script\" width=\"651\" height=\"251\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique4.JPG.png 836w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique4.JPG-300x116.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique4.JPG-768x296.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique4.JPG-650x250.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique4.JPG-789x304.png 789w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><figcaption id=\"caption-attachment-84918\" class=\"wp-caption-text\">Fig 2. VBS script<\/figcaption><\/figure>\n<p>The same technique is used by the <a href=\"https:\/\/blogs.quickheal.com\/analysis-trickbot-malware-quick-heal-security-labs\/\">TrickBot malware<\/a> having macro scripting in Microsoft Office documents which then downloads the actual payload.<\/p>\n<figure id=\"attachment_84919\" aria-describedby=\"caption-attachment-84919\" style=\"width: 639px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84919\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/10\/Unique5.jpg\" alt=\"Fig 3. OLE Macro\" width=\"639\" height=\"269\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique5.jpg 835w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique5-300x126.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique5-768x323.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique5-650x273.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique5-789x332.jpg 789w\" sizes=\"(max-width: 639px) 100vw, 639px\" \/><figcaption id=\"caption-attachment-84919\" class=\"wp-caption-text\">Fig 3. OLE Macro<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84920\" aria-describedby=\"caption-attachment-84920\" style=\"width: 628px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84920\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/10\/Unique6.jpg\" alt=\"Fig 4. VBS script\" width=\"628\" height=\"244\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique6.jpg 826w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique6-300x117.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique6-768x298.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique6-650x253.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/10\/Unique6-789x307.jpg 789w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><figcaption id=\"caption-attachment-84920\" class=\"wp-caption-text\">Fig 4. VBS script<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Quick Heal detection<\/strong><\/p>\n<ol>\n<li>Quick Heal Virus Protection successfully detects such malicious script files and doc files.<\/li>\n<li>Quick Heal Browsing Protection blocks malicious URLs as \u2018Harmful\u2019.<\/li>\n<li>Quick Heal Email Protection successfully blocks such malicious attachments even before they can infect the system<\/li>\n<\/ol>\n<p><strong>How to stay away from such threats<\/strong><\/p>\n<ol>\n<li>Do not click on links or open attachments receiving in emails from unexpected source or unknown sources.<\/li>\n<li>Do not click open double extension file such as doc.js, wsf.js, vbs.doc, etc. These could be malicious files which use double extension to trick users.<\/li>\n<li>Apply all recommended updates on your computer OS, software, and Internet browsers to keep them up-to-date.<\/li>\n<li>Install software only from genuine and trusted sources only.<\/li>\n<li>Never enable \u2018macros\u2019 or editing mode if any document asks you to do so.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Subject Matter Expert<\/strong><\/p>\n<p>Prashant Tilekar | Quick Heal Security Labs<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spam email campaigns have increased with the use of multiple random techniques which improve the efficiency of payload distribution to spread malware to more number of users. These attacks have been randomly observed to have increased rapidly in numbers; similar techniques, observed first time in mid-2014, were used in the distribution of the Poweliks fileless [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84924,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,5],"tags":[1485],"class_list":["post-84916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-security","tag-fileless-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84916"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84916"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84916\/revisions"}],"predecessor-version":[{"id":84927,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84916\/revisions\/84927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84924"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}