Friday, February 21, 2025
HomeCyber Security NewsThreat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Published on

SIEM as a Service

Follow Us on Google News

Threat actors are leveraging a modified version of the SharpHide tool to create hidden registry entries, significantly complicating detection and removal efforts.

This technique exploits vulnerabilities in Windows registry handling, using null-terminated strings to obscure malicious entries.

The modified SharpHide has been integrated into sophisticated attack chains, enabling malware persistence while evading standard detection mechanisms.

Exploitation of Windows Registry Redirection

The modified SharpHide tool employs a technique originally documented by eWhiteHats researchers, which involves prepending two wide-character nulls to registry paths.

This method effectively hides malicious entries from the Windows Registry Editor (regedit), as the tool cannot properly process null characters.

The attackers use this capability to create hidden keys under critical registry paths such as HKCU\Software\Microsoft\Windows\CurrentVersion\Run or HKLM equivalents, ensuring persistence across system reboots.

When executed with administrator privileges, the malware leverages Windows registry redirection to write hidden values into the WOW6432Node branch on 64-bit systems.

This behavior occurs because the malicious script runs within a 32-bit process (RegSvcs.exe), causing Windows to redirect registry writes to the WOW6432Node branch.

These hidden entries are undetectable by standard SharpHide deletion techniques, further complicating remediation efforts.

Obfuscation and Payload Execution

The modified SharpHide is distributed as part of a PowerShell script that obfuscates two Base64-encoded binaries.

The first binary contains the primary malicious payload, while the second serves as a loader.

The loader abuses PowerShell’s reflection capabilities to dynamically load and execute the payload within the legitimate RegSvcs.exe process.

This approach ensures that the malware operates under the guise of a trusted system executable, reducing its visibility to security tools.

Upon execution, the hidden registry entry triggers the execution of mshta.exe, which retrieves and runs a secondary script from an attacker-controlled Command-and-Control (C2) server.

This multi-stage execution chain enables threat actors to maintain persistence and dynamically update their payloads.

To address these advanced persistence techniques, security researchers have developed a tool named SharpDelete.

This utility is designed to detect and remove hidden registry values created by SharpHide, including those in redirected paths such as WOW6432Node.

SharpDelete provides flexibility by allowing users to specify custom registry locations for analysis and cleanup.

The exploitation of modified SharpHide underscores the evolving sophistication of persistence mechanisms used by threat actors.

By abusing native APIs and leveraging registry redirection, attackers can achieve stealthy persistence that challenges traditional detection methods.

Security teams must adopt advanced tools capable of detecting hidden registry entries and monitor behaviors such as PowerShell activity and process injection.

This incident highlights the importance of proactive defense measures, including behavioral analysis tools like Sysinternals Autoruns and custom utilities like SharpDelete, to combat these emerging threats effectively.

PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...