Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

12/3/2019
07:15 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

ATP Rises to the Polymorphic Malware Challenge

The Microsoft Defender ATP Research Team has begun to discuss a polymorphic threat, Dexphot, that it has been tracking for over a year.

The Microsoft Defender ATP Research Team has begun to discussa polymorphic threat (“Dexphot”) that it has been tracking for over a year.

ATP first picked it up when it attempted to deploy files that changed every 20-30 minutes on thousands of devices. They found that there were layers of obfuscation, encryption and the use of randomized file names hiding the installation process. It then used fileless techniques to run malicious code directly in memory, which makes analysis harder.

Dexphot has as its goal to put a cryptocurrency miner on the victim, along with monitoring services and scheduled tasks that will trigger re-infection if the defenders attempt to remove the malware.

Because of the convoluted activity of the malware, ATP says that behavior-based machine learning models were used to detect and block the threat. Due to the persistence mechanisms, polymorphism, and use of fileless techniques, behavior-based detection was a "critical component."

ATP's telemetry told it that SoftwareBundler:Win32/ICLoader and its variants were the primarily methods used to drop and run the Dexphot installer. There are two URLs used to download the malicious payload, and these are later used to establish persistence, update the malware, and re-infect the device. The URLs used for hosting all follow a similar pattern. The domain address usually ends in a .info or .net TLD, while the file name for the actual payload consists of random characters.

Dexphot halts the infection process immediately if an antivirus product is found running. As time went on, additional products were added to this abort list which shows how the malware changed.

Once installed, the payloads are run by loading them into other system processes via "process hollowing." This is when malware replaces the contents of a legitimate process with malicious code.

ATP found that memory scans could detect and terminate the loading of malicious code hidden by process hollowing -- including the monitoring processes that attempt to update the malware code and re-infect the machine via PowerShell commands.

This is needed since Dexphot regularly checks up on itself. If any of the malware processes are terminated, the monitors immediately identify the situation, terminate all remaining malicious processes, and re-infect the device. These monitors will automatically update all of Dexphot's components, both upon system reboot as well as every 90 or 110 minutes while the system is running.

Dexphot exhibits multiple layers of polymorphism across the binaries it distributes, so a traditional file-based detection approach would not be effective against it.

Dexphot is a great example of the level of complexity and rate of evolution that is happening even in "mundane" threats. These kinds of malware are intent on evading protections and motivated to fly under the radar for the prospect of profit.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Assessing Cybersecurity Risk in Todays Enterprises
Assessing Cybersecurity Risk in Todays Enterprises
COVID-19 has created a new IT paradigm in the enterprise and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...