QBot malware exploits Windows WordPad EXE to take over
#1
Information 
Quote:The QBot malware has recently been observed using a sophisticated technique to infect computers by taking advantage of a DLL hijacking vulnerability in the widely used Windows 10 WordPad program. By leveraging this flaw, the malware can evade detection from security software, making it a significant concern for users and organizations alike.

This article delves into the intricacies of DLL hijacking and the specific methods employed by QBot, shedding light on the potential risks and impact of this malware.

What is DLL hijacking?DLLs, or dynamic-link libraries, are essential files containing functions that multiple programs can utilize simultaneously. When an application is launched, it searches for the required DLLs in designated Windows folders and loads them accordingly.

Notably, DLLs located in the same folder as the executable are given priority and loaded before others. This hierarchy provides an opportunity for malicious actors to exploit DLL hijacking vulnerabilities.

QBot exploitation of WordPad DLL hijackingQBot, initially recognized as a banking trojan but later evolving into a versatile malware dropper, has established partnerships with ransomware groups like Black Basta, Egregor, and Prolock. Together, they target corporate networks for extortion attacks.

 According to ProxyLife, a Cryptolaemus member and security researcher, QBot malware has recently launched a phishing campaign utilizing a DLL hijacking vulnerability within the Windows 10 WordPad executable, write.exe.

[Image: QBot-malware_2.jpg]

QBot malware utilizes DLL hijacking - - Image courtesy of BleepingComputerA malicious chain of eventsWhen a user clicks on a download link contained in the phishing emails, a ZIP archive is fetched from a remote host. Inside the archive, two critical components are present: document.exe (disguised as the Windows 10 WordPad executable) and a DLL file named edputil.dll, which enables DLL hijacking. Further investigation reveals that document.exe is, in fact, a renamed copy of the legitimate Write.exe executable used to launch the Windows 10 WordPad document editor.

Upon execution, document.exe attempts to load the genuine DLL file, edputil.dll, usually found in the C:\Windows\System32 folder. However, instead of strictly checking for the DLL in that specific location, document.exe prioritizes loading any DLL with the same name found in its own folder.

Seizing this opportunity, threat actors create a malicious version of edputil.dll and place it in the same folder as document.exe, ensuring that the malware is loaded instead.

[Image: QBot-malware-scaled.jpg]

Exploiting the loaded DLL

Once the malicious DLL is loaded, the QBot malware proceeds to use C:\Windows\system32\curl.exe to secretly download a DLL file disguised as a PNG image from a remote host. This deceptive file, when executed through rundll32.exe, unleashes the true capabilities of the malware.

QBot now operates silently in the background, stealing emails for future phishing attacks and downloading additional payloads such as Cobalt Strike, a popular toolkit used by threat actors to gain initial access to compromised devices. By infiltrating trusted programs like Windows WordPad, QBot manages to evade detection and carry out its malicious activities.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] Ashampoo® Photo Optimiz...
"Share feedback...damien76 — 21:21
AdGuard v4.9 for Android
AdGuard v4.9 for A...harlan4096 — 18:01
New Windows 11 Start Menu will merge pin...
Microsoft is revam...harlan4096 — 17:58
NFC carders hide behind Apple Pay and Go...
Cybercriminals are...harlan4096 — 10:01
AdGuard Browser Extension 5.0.216 (MV3 s...
AdGuard Browser Ex...harlan4096 — 09:57

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (44)wapedDow
avatar (48)oapedDow
avatar (41)Sanchowogy
avatar (45)MeighGoask
avatar (46)creatralGuelm
avatar (37)procnipsut
avatar (43)accenwibly
avatar (40)ahyvily
avatar (37)urumahiz
avatar (43)techlignub
avatar (42)Stevenmam
avatar (49)onlinbah
avatar (49)fuspeukChark
avatar (43)werriewWaiNg
avatar (37)Freemanleo
avatar (42)cdoubapKit
avatar (37)lystraPonia
avatar (30)smith8395john
avatar (50)steakelask
avatar (44)Termoplenka
avatar (42)bycoPaist
avatar (48)pieloKat
avatar (42)ilyagNeexy
avatar (50)donitascene
avatar (50)burntLaw
avatar (40)MrDoorsskibheeds
avatar (50)Toligo
avatar (45)Rodneykak
avatar (48)tradeSmode
avatar (38)vemedProkbior
avatar (37)RobertUtelt
avatar (45)JamesZic
avatar (42)Sanfordbup
avatar (37)Der.Reisende

[-]
Online Staff
damien76's profile damien76

>