An Attack Using Only System Tools Is Not Invisible – You Just Have to Look Harder

Microsoft's team behind Windows Defender ATP has identified a new 'fileless' malware campaign that can bypass standard antivirus tools.

Larry Loeb, Blogger, Informationweek

July 9, 2019

2 Min Read

Microsoft's team behind Windows Defender ATP (the commercial version of the company's Windows Defender free antivirus) has identifieda new "fileless" malware campaign that can bypass standard antivirus tools. Andrea Lelli wrote up a blog post about how they did it.

Everything started when telemetry to WD ATP showed a sharp increase at the end of May/beginning of June in the use of the Windows Management Instrumentation Command-line (WMIC) tool to run a script (a technique that MITRE refers to XSL Script Processing), indicating a fileless attack. This was their first tip-off that something was going on.

They then found the object of all this was to install the backdoor called "Astaroth" directly into memory. The backdoor was first found in 2018. This info-stealing malware is known for stealing sensitive information such as credentials, keystrokes and other data, which it then exfiltrates and can send to a remote attacker. It was previously seen by Cybereason in a campaign against Brazilian and European users in February of this year.

Microsoft identified the path of attack thusly: "A malicious link in a spear-phishing email leads to an LNK file" they said. "When double-clicked, the LNK file causes the execution of the WMIC tool with the '/Format' parameter, which allows the download and execution of a JavaScript code. The JavaScript code in turn downloads payloads by abusing the Bitsadmin tool."

After the payload is decrypted into DLLs, the Regsvr32 tool is used to load one of the decoded DLLs, which in turn decrypts and loads other files until the final payload, Astaroth, is injected into the Userinit process.

The attack uses no external tools. It uses legitimate tools that are already present on the target system to obscure what is going on as regular activity. The results of this kind of attack leaves no disk files that traditional AV products can scan.

Microsoft strongly makes the point that being fileless doesn't mean being invisible; and it certainly doesn't mean being undetectable. They think that some of the fileless techniques can be so unusual and anomalous that they will draw immediate attention to the malware, in the same way that a bag of money moving by itself would.

In some ways, Microsoft's alert is a way to show off their Defender ATP product. By being able to detect a "fileless" attack they are trying to show what they perceive as a technological superiority compared to other products.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Read more about:

Security Now

About the Author

Larry Loeb

Blogger, Informationweek

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange. His first Mac had 128 KB of memory, which was a big step up from his first 1130, which had 4 KB, as did his first 1401. You can e-mail him at [email protected].

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights