New attacks use Windows security bypass zero-day to drop malware

Teilen:

New phishing attacks use a Windows zero-day vulnerability to drop the Qbot malware without displaying Mark of the Web security warnings.

When files are downloaded from an untrusted remote location, such as the Internet or an email attachment, Windows add a special attribute to the file called the Mark of the Web.

This Mark of the Web (MoTW) is an alternate data stream that contains information about the file, such as the URL security zone the file originates from, its referrer, and its download URL.

When a user attempts to open a file with a MoTW attribute, Windows will display a security warning asking if they are sure they wish to open the file.

“While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, do not open this software,” reads the warning from Windows.

Last month, the HP threat intelligence team reported that a phishing attack was distributing the Magniber ransomware using JavaScript files.

These JavaScript files are not the same as those used on websites but are standalone files with the ‘.JS’ extension that are executed using the Windows Script Host (wscript.exe).

After analyzing the files, Will Dormann, a senior vulnerability analyst at ANALYGENCE, entdeckt that the threat actors were using a new Windows zero-day vulnerability that prevented Mark of the Web security warnings from being displayed.

To exploit this vulnerability, a JS file (or other types of files) could be signed using an embedded base64 encoded signature block, as described in this Microsoft support article.

However, when a malicious file with one of these malformed signatures is opened, instead of being flagged by Microsoft SmartScreen and showing the MoTW security warning, Windows automatically allows the program to run.

QBot malware campaign uses Windows zero-day

Neueste QBot malware phishing campaigns have distributed password-protected ZIP archives containing ISO images. These ISO images contain a Windows shortcut and DLLs to install the malware.

ISO images were being used to distribute the malware as Windows was not correctly propagating the Mark of the Web to files within them, allowing the contained files to bypass Windows security warnings.

As part of the Microsoft November 2022 Patch Tuesday, security updates were released that fixed this bug, causing the MoTW flag to propagate to all files inside an opened ISO image, fixing this security bypass.

In a new QBot phishing campaign entdeckt by security researcher ProxyLife, the threat actors have switched to the Windows Mark of the Web zero-day vulnerability by distributing JS files signed with malformed signatures.

This new phishing campaign starts with an email that includes a link to an alleged document and a password to the file.

When the link is clicked, a password-protected ZIP archive is downloaded that contains another zip file, followed by an IMG file.

In Windows 10 and later, when you double-click on a disk image file, such as an IMG or ISO, the operating system will automatically mount it as a new drive letter.

This IMG file contains a .js file (‘WW.js’), a text file (‘data.txt’), and another folder that contains a DLL file renamed to a .tmp file (‘resemblance.tmp’) [VirusTotal], as illustrated below. It should be noted that the file names will change per campaign, so they should not be considered static.

The JS file contains VB script that will read the data.txt file, which contains the ‘vR32’ string, and appends the contents to the parameter of the shellexecute command to load the ‘port/resemblance.tmp’ DLL file. In this particular email, the reconstructed command is:

As the JS file originates from the Internet, launching it in Windows would display a Mark of the Web security warning.

However, as you can see from the image of the JS script above, it is signed using the same malformed key used in the Magniber ransomware campaigns to exploit the Windows zero-day vulnerability.

This malformed signature allows the JS script to run and load the QBot malware without displaying any security warnings from Windows, as shown by the launched process below.

Regsvr32.exe launching the QBot DLL
Quelle: BleepingComputer

After a short period, the malware loader will inject the QBot DLL into legitimate Windows processes to evade detection, such as wermgr.exe or AtBroker.exe.

Microsoft has known about this zero-day vulnerability since October, and now that other malware campaigns are exploiting it, we will hopefully see the bug fixed as part of the December 2022 Patch Tuesday security updates.

The QBot malware

QBot, also known as Qakbot, is a Windows malware initially developed as a banking trojan but has evolved to be a malware dropper.

Once loaded, the malware will quietly run in the background while stealing emails for use in other phishing attacks or to install additional payloads such as Brute RatelCobalt Strikeund other malware.

Installing the Brute Ratel and Cobalt Strike post-exploitation toolkits typically lead to more disruptive attacks, such as data theft and ransomware attacks.

In the past, the Egregor und Prolock ransomware operations partnered with the QBot distributors to gain access to corporate networks. More recently, Black Basta ransomware attacks have been seen on networks following QBot infections.

https://www.bleepingcomputer.com/news/security/new-attacks-use-windows-security-bypass-zero-day-to-drop-malware/

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:54 pm, Juli 11, 2025
Wetter-Symbol 23°C
L: 22° | H: 24°
klarer Himmel
Luftfeuchtigkeit: 62 %
Druck: 1019 mb
Wind: 9 mph E
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 1%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:56 am
Sonnenuntergang: 9:15 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 10:00 pm
Wetter-Symbol
22° | 24°°C 0 mm 0% 10 mph 65 % 1018 mb 0 mm/h
So. Juli 13 10:00 pm
Wetter-Symbol
17° | 29°°C 0 mm 0% 7 mph 66 % 1015 mb 0 mm/h
Mo. Juli 14 10:00 pm
Wetter-Symbol
19° | 28°°C 0 mm 0% 14 mph 71 % 1017 mb 0 mm/h
Di. Juli 15 10:00 pm
Wetter-Symbol
15° | 25°°C 0 mm 0% 13 mph 68 % 1020 mb 0 mm/h
Mi. Juli 16 10:00 pm
Wetter-Symbol
18° | 25°°C 1 mm 100% 13 mph 83 % 1019 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
20° | 22°°C 0 mm 0% 3 mph 59 % 1018 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
17° | 19°°C 0 mm 0% 4 mph 61 % 1018 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 65 % 1018 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
26° | 26°°C 0 mm 0% 6 mph 44 % 1017 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 6 mph 32 % 1016 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 10 mph 30 % 1014 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
25° | 25°°C 0 mm 0% 9 mph 41 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
21° | 21°°C 0 mm 0% 6 mph 55 % 1015 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,702.71
1.27%
Ethereum(ETH)
€2,547.75
0.98%
XRP(XRP)
€2.34
7.36%
Fesseln(USDT)
€0.86
0.01%
Solana(SOL)
€138.90
-0.44%
USDC(USDC)
€0.86
0.01%
Dogecoin(DOGE)
€0.175290
7.05%
Shiba Inu(SHIB)
€0.000011
2.42%
Pepe(PEPE)
€0.000011
3.62%
Peanut das Eichhörnchen(PNUT)
€0.246234
7.19%
Nach oben scrollen