Sunday, April 27, 2025
HomeMalwareMuddyWater Malware Attack Launch PowerShell Script to Open Backdoor in Windows PC...

MuddyWater Malware Attack Launch PowerShell Script to Open Backdoor in Windows PC via MS Word Document

Published on

SIEM as a Service

Follow Us on Google News

Newly detected MuddyWater Malware campaign open the sophisticated backdoor in Windows PC by launching Powershell script using weaponized Microsoft word document.

Initially, MuddyWater attack targeted the Saudi government using the same set of malicious components with PowerShell script in 2017 also it launch the same attack on other countries like Turkey, Pakistan, and Tajikistan in March 2018.

The same type of campaign involved with this new attack using a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell to open the backdoor.

- Advertisement - Google News

Unlike old Champaign, the new attack will not directly influence through visual Basic Script(VBS) and PowerShell component files. instead of that, the document itself contains all the script which is then decoded and dropped to execute the payload.

MuddyWater Malware Infection Chain

The initial infection starts with the Word document that is being delivered into the vicitms machine through Email which contains the reward or promotion based content that comes from industries or organizations.

In this case, old campaign also distributed via Email with a different subject that related to government or telecommunications documents.

Attacker trick users to enable the macro to view the full content of the document but it actually executes malicious routines without vicitms knowledge.

According to Trend Micro, Once the macro is enabled, it will use the Document_Open()  event to automatically execute the malicious routine if either a new document using the same template is opened or when the template itself is opened as a document0.

In-depth code analysis revealed that PowerShell script capable of decoding the contents of the malicious document that leads to execute another PowerShell script.

                                     The second encoded PowerShell script dropped by First Powershell

Second Powershell script launching various malicious component in a specific directory (%Application Data%\Microsoft\CLR\*) which is used to run the final payload, PRB-Backdoor.

Finally, PRB-Backdoor will communicate with its Command-and-Control server to send and receive specific command to perform various malicious activities.

An attacker using various commands that used to record keyboard strokes, Read & Write files, Executes shell commands, introduces the affected machine to the C&C server, Steals passwords listed or found in the browser histories etc.

threat actors behind MuddyWater are continuously evolving their tools and techniques to make them more effective and persistent. Trend Micro said.

Indicators of Compromise :

SHA -1  – 240b7d2825183226af634d3801713b0e0f409eb3e1e48e1d36c96d2b03d8836b

Also Read:

Iron Cybercrime Group Distributing New Powerful Backdoor with Strong Evasion Techniques

Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PC

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean APT Hackers Pose as Companies to Spread Malware to Job Seekers

Silent Push Threat Analysts have uncovered a chilling new cyberattack campaign orchestrated by the...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...