Tuesday, March 4, 2025
HomeBackdoorBeware:Emails Delivering Backdoor and Injecting Malicious Scripts into Enterprise Networks

Beware:Emails Delivering Backdoor and Injecting Malicious Scripts into Enterprise Networks

Published on

SIEM as a Service

Follow Us on Google News

Nowadays Email campaign playing major role to spreading Malwares, backdoor and advance exploit to take over the single target and Enterprise networks.

A New Backdoor Contained Malicious Email champaign that carries Malicious scripts which are spreading in Russian Language and it seems that , this malicious email campaign is developed for attacking Russian Enterprises.

This Malicious Backdoor delivering by a combination of exploits and Windows components helps to take over the infected victims Machine.

This Malicious component not only developed to infect the Enterprise network but also capable of attacking the other industries such as financial institutions, including banks, and mining firms.

Also Read   A Complete Fileless Malware “JS_POWMET” with Highly Sophisticated Evasion Technique

Backdoor Infection Chain

A Social Engineering Method Called Spear Phishing Champaign has played major role in this Part to infect the target Via Email.

A Malicious Email that contains legitimate information and it’s completely looks like an actual Sales and Billing information which is given in Russian Language.

“Email also having an Attached Document file as .DOC in Different file names in russian Language.Инструкция для подключения клиентов.doc (Instructions for connecting clients) and Заявление на оплату услуги .doc (Application for payment of the service).”

Backdoor

Malware Attacked Email

Attacked Document has Embedded with Malware Rich Text Format (RTF) file Detected as TROJ_EXPLOYT.JEJORC by Trend Micro.

Further, Analyse  Revealed that, the Malicious file contains embedded .XLS Malicious javascript files from this URL ( hxxps://wecloud[.]biz/m11[.]xls).

All the malicious URL used for this attacks are controlled by the attacker that was Registered on July ,Trend Micro said.

Backdoor

Attack Chain

This Malicious javascript file dropped Two Powershell script . One script used to download and launch the Malformed Document and another script continue the chain of infection.

After Download the another file by second Powershell script , downloaded file will be decrypted using AES-CBC Cipher Algorithm.

Once Decryption has done ,file will be saved as .TXT Extension to the  %Appdata% .The decrypted file is a dynamic-link library (DLL) file detected as TROJ_DROPNAKJS.ZGEG-A.

The JavaScript code in m11.xls will then execute the file using the following command line:

odbcconf.exe /S /A {REGSVR C:\Users\Administrator\AppData\Roaming\{RANDOM}.txt}
Dropped file into %Appdata% has malicious, obfuscated JavaScript file (JS_NAKJS.ZIEG-A).

Finall, DDL will Execute the following Command that uses MS Regsvr32 (Microsoft Server Registry)that has used to register and unregister the OLE controls.

regsvr32.exe /s /n /u /i:”C:\Users\Administrator\AppData\Roaming\{RANDOM}.txt” scroBj.dll
This attack method is also known as Squiblydoo—Regsvr32 is abused to bypass restrictions on running scripts. It also means evading application whitelisting protections such as AppLocker. While Squiblydoo is already a known attack vector, this is the first time we’ve seen it combined with odbcconf.exe.

Finally after Deobfuscated done ,it will execute another XML file then later the file serves as the main backdoor .

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...