This cheeky new malware strain hides in the Windows Registry

An abstract image of digital security.
(Image credit: Shutterstock)

Cybersecurity researchers from Pavilion have recently uncovered a new malware campaign in which Russian malicious actors allegedly target other Russians.

As reported by researchers Matt Stafford and Sherman Smith, in early November, the company spotted a lightweight, but highly potent JavaScript Remote Access Trojan (RAT), that was being deployed together with a C# keylogger which it has called “DarkWatchman”.

It is being distributed in a similar fashion to most malware today - through phishing emails. An email with a ZIP attachment would be sent out, containing what seems to be a text document. In reality, however, the file is a self-installing WinRAR archive that deploys both the RAT and the keylogger.

DarkWatchman is quite cheeky, the researchers further explained, as it does not store logged keys on the disk, but rather uses the Windows Registry fileless storage. The Trojan sets up a scheduled task, to run itself every time the victim logs into Windows.

Enabling ransomware attacks

After logging, it will execute a PowerShell script to compile the keylogger and launch it into memory.

"The keylogger is distributed as obfuscated C# source code that is processed and stored in the registry as a Base64-encoded PowerShell command. When the RAT is launched, it executes this PowerShell script which, in turn, compiles the keylogger (using CSC) and executes it," the two researchers explained.

"The keylogger itself does not communicate with the C2 or write to disk. Instead, it writes its keylog to a registry key that it uses as a buffer. During its operation, the RAT scrapes and clears this buffer before transmitting the logged keystrokes to the C2 server."

Speaking of the C2 server, DarkWatchman uses domain generation algorithms (DGA), generating up to 500 domains every day. That, the researchers explained, makes them highly resilient to domain seizure, and resistant to communication monitoring.

DarkWatchman has a very specific use case, Prevailion researchers believe. According to them, the RAT was designed by ransomware operators and distributed to third parties, who are then tasked with compromising target networks. Once the RAT is deployed, installing the actual malware becomes a lot easier. 

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Trojan
Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease
A white padlock on a dark digital background.
A new and dangerous keylogger is on the loose - here's how to stay safe
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
Microsoft Outlook targeted by new malware attacks allowing sneaky hijacking
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does