This new malware hijacks Windows WordPad to avoid detection

security
OpenVPN-protokollet - därför är det så bra (Image credit: Shutterstock)

Hackers have begun abusing a flaw in the WordPad text editor that comes preloaded with the Windows 10 operating system to distribute the Qbot malware, researchers have claimed.

A cybersecurity researcher and a member of Cryptolaemus, going by the alias ProxyLife discovered a new email campaign in which hackers are distributing the WordPad program together with a malicious .DLL.

When WordPad is launched, it will look for certain .DLL files it needs in order to properly run. First, it will look for the files in the same folder it resides, and if it finds them - it will automatically run them, even if those .DLL files are malicious.

DLL hijacking

The practice is usually called “DLL sideloading” or “DLL hijacking” and it’s a known method. Previously, hackers were seen using the Calculator app to do the same thing.

In this particular instance, when WordPad runs the DLL, the malicious file will use an executable called Curl.exe (found in the System32 folder) to download a DLL pretending to be a PNG. That DLL is actually Qbot, an ancient banking trojan that can steal emails to use in more phishing attacks, and initiate the download of additional malware, such as Cobalt Strike, for example. 

By using legitimate programs, such as WordPad, or Calculator, to run the malicious DLL files, threat actors are hoping to bypass any antivirus programs and remain stealthy during the attack. 

However, as this method requires Curl.exe to be used, it only works on Windows 10 and newer versions, as previous versions did not have this program preinstalled. That doesn’t do much good as older versions are mostly reaching end of support anyway, and users are moving towards Windows 10 and Windows 11

Right now, BleepingComputer reports, the QBot operation has moved on to other infection methods in recent weeks.

Via: BleepingComputer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
Microsoft Outlook targeted by new malware attacks allowing sneaky hijacking
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Trojan
Hackers hide malware into website images to go unnoticed
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)