Why the newly discovered Microsoft Windows βfilelessβ log exploit is a marvel of stealth
The exploit that Kaspersky researchers uncovered is unnamed, so weβre calling it βThrowShellβ
By Kim Crawley
The key to cyberattacks evading detection from antivirus software and intrusion detection systems is often to exploit operating system processes. Thatβs a feature of a recently discovered fileless Windows exploit discovered by Kaspersky researchers.
Fileless malware attacks computer systems without writing new files to a computerβs data storage. If antivirus software scans a hard drive for malware, it wonβt find any files related to a fileless attack. Itβs a popular obfuscation technique with cyber threat actors.Β
Kaspersky hasnβt given this new exploit any particular name. Kasperskyβs Denis Legezo explained that some DLLs (Windows Dynamic Link Libraries) involved in the exploit resemble tools in commercial pentesting platforms:
βRegarding the commercial tools, traces of SilentBreak and Cobalt Strike toolset usage in this campaign are quite visible. Trojans named ThrowbackDLL.dll and SlingshotDLL.dll remind us of Throwback and Slingshot, which are both tools in SilentBreakβs framework, while the βsbβ associated with the dropper (sb.dll) could be an abbreviation of the vendorβs name.
Here we want to mention that several .pdb paths inside binaries contain the projectβs directory C:\Users\admin\source\repos\drx\ and other modules not named after Throwback or Slingshot, such as drxDLL.dll. However, encryption functions are the same as in the publicly available Throwback code.β
The new exploit puts malicious shellcode into Windows event logs. Cyberattacks that use fundamental code libraries such as βLog4Shellβ and βSpring4Shellβ are recent concerns in the cybersecurity community. So, Iβll call this attack βThrowShell.β Maybe itβll stick.
How βThrowShellβ works
The ThrowShell attack starts by persuading a user to download a file with a Cobalt Strike module. Kaspersky researchers have observed this as a RAR archive file with a Cobalt Strike certificate distributed through file.io, a file sharing site the researchers consider to be legitimate. Yes, βThrowShellβ starts as a Trojan. But interestingly, when I tried to visit file.io in Firefox, my Malwarebytes Browser Guard extension blocked the site as a suspected phishing domain. Iβve personally never visited file.io.
Anti-detection wrappers are used with the Trojans. MSVC, Go compiler 1.17.2 and GCC under MinGW are the compilers researchers have seen.Β
Once the RAR file has been extracted and its contents executed, itβs then much easier for the attacker to send additional malicious DLLs to the targeted device.Β
Werfault.exe is the initial Windows executable file thatβs targeted for code injection by ThrowShell. Itβs Microsoft Windows Error Reporting Fault Reporter in Windows 10 and Windows 11. The important role that the process serves in Windows assures that the file is whitelisted in endpoint security applications. Itβs almost as sneaky as exploiting svchost.exe, in my opinion.
The malicious executed code is signed with a certificate for an application called βFast Invest,β which the researchers didnβt see any legitimate code signed with. Once extracted, decrypted and signed, ThrowShellβs malicious code spreads within Windows through dropper injection with Cobalt Strike pentesting software. Explorer.exe, the main file manager for all supported versions of Windows, is one of the processes that ThrowShell targets for code injection. Thatβs the way fileless malware typically works; inject malicious code into ordinary OS processes and execute it that way.Β
While spreading through a variety of ordinary Windows DLLs and processes, shellcode is eventually inserted into Windows event logs. Researchers have seen ThrowShell fingerprint Windows targets for MachineGUID, computer names, local IP addresses, OS version, CPU architecture, and SeDebugPrivilege status in processes currently running in memory.
This is all a really stealthy way to infect client Windows targets, get right into the memory, evade detection, establish persistence, and maintain a backdoor right into the Windows shell. This exploit can possibly sit in a Windows client for months or longer with an easy way for the attacker to perform all kinds of malicious activity with administrative privileges.
The post Why the newly discovered Microsoft Windows βfilelessβ log exploit is a marvel of stealth appeared first on Synack.