Self-extracting archives as an attack assistant

Self-extracting archives as an attack assistant

Share post

In the past, packed, self-extracting archives often contained malware. A new scam shows: self-extracting archives do not contain any malware, but execute commands when opened in Windows, which malware can then catch up on - according to Crowdstrike.

Many employees in companies rely on a packer such as ZIP, 7zip or WinRAR so that large files can be transported more quickly via email. Self-extracting archives are also popular in the business world. The archives are an EXE file and can be unpacked with a click. For example, even if Outlook blocks mail attachments with an EXE file, it still allows a ZIP file to be plugged into an EXE file. Good scanners have also detected the malware in double-packed archives. As a result, the attackers are now finding new ways to trap unsuspecting employees.

Emotet uses encrypted archives

At Emotet, an archive containing harmless decoy files and another but encrypted archive were sent to users. The scan only revealed harmless files since the encrypted part often cannot be examined. Hidden parameters and commands in the archive are not visible. If the self-extracting archive is now unpacked, the tool writes the packed files and starts the second, encrypted archive. The password is then passed to this archive via parameters, and the Emotet file is unpacked and executed.

Archives with chain of command

If a self-extracting archive – SFX for short – is executed with a click, the content is extracted. If, for example, malware is then written to the system, an endpoint security solution usually reliably fends it off. But: there is no malware in the archives found by Crowdstrike. Rather, the SFX files execute a chain of commands that you can give them quite regularly. In one recorded case, a registry key was passed to Windows via a parameter. This then meant that it was possible to run commands with higher rights than those of a standard administrator account.

Crowdstrike has recorded how these traps work in practice in a blog post and explains the individual traps of the examples found in the wild.

More at Crowdstrike.com

 


About CrowdStrike

CrowdStrike Inc., a global leader in cybersecurity, is redefining security in the cloud age with its completely redesigned platform for protecting workloads and devices. The lean single-agent architecture of the CrowdStrike Falcon® platform uses cloud-scaled artificial intelligence and ensures protection and transparency across the company. This prevents attacks on end devices both inside and outside the network. With the help of the company's own CrowdStrike Threat Graph®, CrowdStrike Falcon correlates around 1 trillion endpoint-related events worldwide every day and in real time. This makes the CrowdStrike Falcon platform one of the world's most advanced data platforms for cybersecurity.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more