A deeper look uncovered that the attacker abused the DLL search order to load their own malicious DLL. What makes this executable even more attractive in the eyes of an attacker is the fact that it is started from a built-in scheduled task named FODCleanupTask, thereby minimizing the footprint on the machine and reducing the chances of detection even further. The loader file name is WinBio.dll (note the uppercase characters) and is placed by the attacker alongside the executable in the same folder (“WinBioPlugIns"), thus leveraging the default DLL search order.
When the executable is started by the task scheduler it doesn’t have command line arguments and the malware works as follows: The worker process loads and executes the payload DLL in-memory. Solutions This malware uses a common, yet stealthy and effective, method to execute its payload in the context of legitimate processes. Countermeasures should be in place to detect this malicious behavior.
from Cyware News - Latest Cyber News
When the executable is started by the task scheduler it doesn’t have command line arguments and the malware works as follows: The worker process loads and executes the payload DLL in-memory. Solutions This malware uses a common, yet stealthy and effective, method to execute its payload in the context of legitimate processes. Countermeasures should be in place to detect this malicious behavior.
from Cyware News - Latest Cyber News
Comments
Post a Comment