Another vital Windows tool is being abused to sideload malware


Cybercriminals have been spotted sideloading malware (opens in new tab) onto vulnerable Windows endpoints through a legitimate Windows Problem Reporting tool called WerFault.exe.
According to researchers from K7 Security Labs, which first discovered the campaign, hackers (presumably from China) would send out a phishing email containing an ISO file. ISO is an optical disk image file which, when ran, would load as a new drive letter (as if the user loaded a CD or a DVD).
In this case, the ISO contains a clean copy of the WerFault.exe executable, but also three additional files – a DLL file named faultrep.dll, an XLS file called File.xls, and a shortcut file called Inventory & Our specialities.lnk.
Abusing legitimate software
The victim would first click the shortcut file, which would run the legitimate WerFault.exe file. Given that these are clean files, they won’t trigger any antivirus alarms.
Then WerFault.exe will try to load faultrep.dll which, in usual circumstances, is also a legitimate file needed to run the program properly. However, WerFault will first look for the file in the same folder where it resides, and if the DLL is malicious (as is the case here), it will essentially run the malware. This technique is called malware sideloading.
As per K7 Security Labs, the DLL will create two threads, one loading Pupy Remote Access Trojan’s DLL (dll_pupyx64.dll) into memory, and one that opens File.xls – a decoy file that serves no other purpose but to keep the victim busy while the malware loads on the endpoint.
Pupy gives threat actors full access to the target device, enabling them to run commands, steal any data, or move through the network as they wish.
According to BleepingComputer, Pupy was used by Iranian state-sponsored threat actors APT33 and APT35, as well as hackers seeking to distribute the QBot malware.
Via: BleepingComputer (opens in new tab)
Audio player loading… Cybercriminals have been spotted sideloading malware (opens in new tab) onto vulnerable Windows endpoints through a legitimate Windows Problem Reporting tool called WerFault.exe. According to researchers from K7 Security Labs, which first discovered the campaign, hackers (presumably from China) would send out a phishing email containing an…
Recent Posts
- The shape of things to come? Nvidia’s super fast 800GBps SuperNIC card spied and this Connect X-8 AIB vaguely resembles a GPU
- Two AI chatbots speaking to each other in their own special language is the last thing we need
- Samsung’s 9100 PRO SSD line includes its first 8TB NVMe model for consumers
- Sonos speakers and soundbars are 25 percent off for existing customers
- Xbox Cloud Gaming will let you invite friends with just a link
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010