Thursday, April 17, 2025
HomeComputer SecurityTrickbot Malware Re-emerging via MS Word Documents with Powerful Code-Injection Technique

Trickbot Malware Re-emerging via MS Word Documents with Powerful Code-Injection Technique

Published on

SIEM as a Service

Follow Us on Google News

Trickbot malware is one of the widely known Banking Trojan emerging again with sophisticated techniques to at target the various financial institutions and large bank to steal the banking credentials.

The current version of Trickbot malware is spreading with a powerful code injection technique to evade the detection, anti-analysis technique and disable the security tools that run in the target victims computer.

Trickbot which is capable of launching MitB attacks originated in the middle of 2016 and it targets financial institutions.

- Advertisement - Google News

Trickbot have an ability to stealing the data from Microsoft Outlook, locking the victim’s computer, information gathering, network information gathering and domain credentials stealing.

It Also distributed with the technique such as sleep for long and short time to avoid detection for the most of the security software.

How does Trickbot Malware Works 

An initial distribution of Trickbot malware launching via Microsoft word document which contains embedded Macro code.

Word document macro will not be executed directly instead, the user needs to execute enable content and zoomed in/out of the document to complete the execution process which is one of the new technique to evade the sandbox analysis.

Same as a variety of malicious document execute the PowerShell script and download the Trickbot malware and executed it into the victim’s machine.

Once it dropped the payload from it command & control server then the malware sleeps for 30 seconds to evade sandboxes by calling Sleep(30000) and then decrypts its resource using the RSA algorithm.once the sleep time is completed.

Apart from this TrickBot performing hollow process injection using direct system calls and researchers believe that this malware sharing the code with Flokibot malware.

According to cyberbit, It using CreateProcessW to create a suspended process and the malware uses CreateFileW to obtain a handle to ntdll.dll it copies it a buffer allocated by VirtualAlloc using ReadFile, and then allocates another buffer for mapping it to the memory from its raw Copy.

Reading ntdll.dll from the disk

Trickbot using some function(red) for hollowing from direct system calls and some functions(Blue) hollowing from the addresses saved on the stack earlier.

After running the malware, we can see, as in previous variants, it copied itself and its encrypted modules to C:\Users\%USERNAME%\AppData\Roaming\msnet

Organizations should be aware of this new trend to directly call functions via system calls. This technique bypasses security tool hooks and therefore most security products will not detect this threat, Researchers said.

Also Read:

New Version of Trickbot Trojan Spread via Local SMB to Perform NetServer and LDAP Enumeration

Banking Trojan “Trickbot” Powered by Necurs Targeting Financial Institutions

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium, has found that over...

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File

The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File

The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics...

Gamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Researchers have unearthed details of the Pterodo malware family, notably the PteroLNK variant used...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging...