• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  fileless malware • Malware • Security  /  A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs
A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs
10 October 2017

A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs

Written by Rajib Singha
Rajib Singha
fileless malware, Malware, Security

Spam email campaigns have increased with the use of multiple random techniques which improve the efficiency of payload distribution to spread malware to more number of users. These attacks have been randomly observed to have increased rapidly in numbers; similar techniques, observed first time in mid-2014, were used in the distribution of the Poweliks fileless malware.

Technical analysis of the observed campaign

In this campaign, the attacker uses an XML script and has a Windows Script Component (WSC) to deliver the malicious payload – this technique has the ability to easily modify obfuscation. A small XML script having a set of instructions is used to download another script file from compromised websites. The attacker uses this XML file because they can easily change the code and deliver a new variant.

Attack chain sequence

unique1

Fig 1. XML script
Fig 1. XML script

The set of instructions works as follows

unique3-jpg
Here, rundll32 is used for running the DLL file and placing its library in the memory with the following command line.

Rundll32.exe <DLL name>, <entry point>

Let’s understand how Rundll32 is successfully able to parse the parameters and the argument. Rundll32 internally parses the command line and searches for the comma (‘,’) to locate the DLL name and space to locate the entry point name.

In the above script code, Rundll32 finds mshtml as dllname and RunHTMLApplication as an entry point. For now ‘javascript:’ prefix seems to be unwanted. The RunHTMLApplication calls ‘CreateUrlMoniker’ which parses the command line to find the string before ‘:’ i.e., JavaScript. ‘Microsoft HTML’ is the handler for the JavaScript.

The XML file-delivered script file has the actual malicious payload location and instructions to de-obfuscate malware. Every time, the payload location varies.

Fig 2. VBS script
Fig 2. VBS script

The same technique is used by the TrickBot malware having macro scripting in Microsoft Office documents which then downloads the actual payload.

Fig 3. OLE Macro
Fig 3. OLE Macro
Fig 4. VBS script
Fig 4. VBS script


Seqrite detection

1.   Seqrite Endpoint Security Virus Protection successfully detects such malicious script files and doc files.
2.   Seqrite Endpoint Security Browsing protection blocks malicious URLs as ‘Harmful’.
3.   Seqrite Endpoint Security Email Protection successfully blocks such malicious attachments even before they can infect the system.

How to stay away from such threats

  1. Do not click on links or open attachments receiving in emails from unexpected source or unknown sources.
  2. Do not click open double extension file such as doc.js, wsf.js, vbs.doc, etc. These could be malicious files which use double extension to trick users.
  3. Apply all recommended updates on your computer OS, software, and Internet browsers to keep them up-to-date.
  4. Install software only from genuine and trusted sources only.
  5. Never enable ‘macros’ or editing mode if any document asks you to do so.

Subject Matter Expert

Prashant Tilekar | Quick Heal Security Labs

 Previous PostHackers Surveillance: How cybercriminals use hacker surveillance ...
Next Post  Cybercriminals know the importance of your data. Do you?
Rajib Singha

About Rajib Singha

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...

Articles by Rajib Singha »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies