Tuesday, December 17, 2024
HomeCyber CrimeCyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

Published on

SIEM as a Service

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files to infiltrate systems with backdoor malware.

The campaign showcases the growing sophistication of phishing techniques and the exploitation of lesser-known Windows features.

The FLUX#CONSOLE Campaign

The FLUX#CONSOLE campaign has been identified as a multi-stage attack with sinister objectives.

- Advertisement - SIEM as a Service

By using MSC files, threat actors bypass many traditional antivirus (AV) systems and deliver highly obfuscated backdoor payloads.

This strategy appears to be a shift from the abuse of LNK files, which have been a hallmark of phishing campaigns for years. Key aspects of this campaign include:

  • Tax-Themed Phishing Lures: Emails trick users into opening benign tax-related documents.
  • Advanced Obfuscation: From JavaScript to concealed DLLs, the attackers employ multiple obfuscation layers to hinder detection.
  • DLL Sideloading: The use of legitimate Windows applications like Dism.exe to execute malicious code.
  • Persistence Mechanisms: Scheduled tasks ensure the malware remains active even after the system reboots.

These techniques collectively demonstrate the lengths cybercriminals go to evade detection and establish persistent access.

2024 MITRE ATT&CK Evaluation Results Released for SMEs & MSPs -> Download Free Guide

How the Attack Works

Step 1: Phishing Lure

According to the Securonix report, the attack begins with a phishing email containing either a direct malicious attachment or a link. The attachment masquerades as a legitimate file, such as a tax document.

In this case, filenames like “Income-Tax-Deduction-and-Rebates202441712.pdf” are used.The deceptive .MSC file appears as a PDF, using a Windows feature where file extensions are hidden by default, further tricking users.

Phishing lure document: Income-Tax-Deduction-and-Rebates202441712.pdf (income.pdf)
Phishing lure document: Income-Tax-Deduction-and-Rebates202441712.pdf (income.pdf)

Step 2: Execution of the MSC File

Microsoft Common Console Document (.MSC) files are legitimate Windows tools used to configure administrative settings. However, in this campaign, attackers exploit their ability to execute embedded scripts or commands.

  • When users double-click the .MSC file, malicious JavaScript or VBScript is executed under the guise of the legitimate mmc.exe process.
  • The file also hides its activity by minimizing windows and employing advanced obfuscation.
XML contents of ARRVL-PAX-MNFSTPK284-23NOV.pdf.msc phishing lure
XML contents of ARRVL-PAX-MNFSTPK284-23NOV.pdf.msc phishing lure

Step 3: Payload Delivery

The .MSC file acts as both a loader and dropper. It initiates one of two delivery mechanisms:

  1. Embedded within the .MSC file itself.
  2. Downloaded from a remote server.

In both cases, it delivers a malicious payload in the form of a DLL file named DismCore.dll, which is sideloaded via the legitimate Dism.exe process.

Step 4: Persistence

Once the malware is active, it establishes persistence by creating scheduled tasks. For example, a task named “CoreEdgeUpdateServicesTelemetryFallBack” is created to execute the malicious Dism.exe every five minutes, ensuring the malware continues running.

Persistence – scheduled task details
Persistence – scheduled task details

Microsoft Management Console (MMC) snap-in files (.MSC) are often used by IT administrators and aren’t typically perceived as malicious. Attackers exploit this trust factor. When opening an .MSC file:

  • The legitimate mmc.exe process is triggered.
  • The embedded malicious code runs inconspicuously under the guise of an administrative tool.

Additionally, because .MSC files can host scripts like JavaScript or VBScript, they offer a flexible yet powerful medium for executing malicious payloads.

Obfuscation Techniques

The FLUX#CONSOLE campaign employs cutting-edge obfuscation methods:

  1. JavaScript Layers: The initial script is obfuscated, often hiding malware execution commands. Multiple decryption steps are required to analyze its behavior.
  2. Base64 and Hex Encoding: Payloads are encoded to avoid static detection.
  3. DLL Obfuscation: Even the final DismCore.dll payload includes various junk code routines to confuse analysts.

These tactics make it challenging for traditional security tools to detect and block the malware.

Once inside the system, the backdoor:

  • Communicates with a remote Command-and-Control (C2) server, sending encrypted requests and responses.
  • Can exfiltrate sensitive data.
  • Provides attackers with potential for lateral movement, enabling further compromise of corporate networks.

Although researchers disrupted the attack within 24 hours, the severity of the breach highlights the vulnerabilities in modern endpoint defenses.

The FLUX#CONSOLE campaign serves as a wake-up call for the cybersecurity community. By exploiting trusted tools like .MSC files and leveraging advanced obfuscation techniques, attackers continue to evade traditional defenses.

As such campaigns evolve, robust security solutions and proactive threat intelligence are essential to stay ahead of cybercriminals.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.A...

ConnectOnCall Data Breach, 900,000 Customers Data Exposed

 The healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.A...