Original Article Text

Click to Toggle View

Chinese hackers abuse Microsoft APP-v tool to evade antivirus. The Chinese APT hacking group "Mustang Panda" has been spotted abusing the Microsoft Application Virtualization Injector utility as a LOLBIN to inject malicious payloads into legitimate processes to evade detection by antivirus software. This technique was discovered by threat researchers at Trend Micro, who track the threat group as Earth Preta, reporting that they have verified over 200 victims since 2022. Mustang Panda's targeting scope, based on Trend Micro's visibility, includes government entities in the Asia-Pacific region, while the primary attack method is spear-phishing emails that appear to come from government agencies, NGOs, think tanks, or law enforcement. The threat group was previously seen in attacks targeting governments worldwide using Google Drive for malware distribution, custom evasive backdoors, and a worm-based attack chain. The emails spotted by Trend Micro contain a malicious attachment containing the dropper file (IRSetup.exe), a Setup Factory installer. If executed by the victim, it will drop multiple files into C:\ProgramData\session, including legitimate files, the malware components, and a decoy PDF to serve as a diversion. Evading antivirus When ESET antivirus products are detected (ekrn.exe or egui.exe) on a compromised machine, Mustang Panda employs a unique evasion mechanism exploiting tools pre-installed on Windows 10 and later. The abuse starts with the Microsoft Application Virtualization Injector (MAVInject.exe), a legitimate Windows system tool that allows the operating system to inject code into running processes. It's mainly used by Microsoft's Application Virtualization (App-V) to run virtualized applications, but developers and admins can also use it to execute DLLs inside another process for testing or automation. In 2022, cybersecurity firm FourCore reported that MAVInject.exe could be abused as a LOLBIN, warning that the executable should be blocked on devices not utilizing APP-v. Mustang Panda abuses the executable to inject malicious payloads into 'waitfor.exe,' a legitimate Windows utility that comes pre-installed in Windows operating systems. The legitimate function of waitfor.exe on Windows is to synchronize processes across multiple machines by waiting for a signal or command before executing a specific action. It is primarily used in batch scripting and automation for delaying tasks or ensuring that specific processes finish before others start. Being a trusted system process, the malware that is injected in it passes as a normal Windows process, so ESET, and potentially other antivirus tools, does not flag the malware's execution. The malware injected into waitfor.exe is a modified version of the TONESHELL backdoor, which comes hidden inside a DLL file (EACore.dll). Once running, the malware connects to its command and control server at militarytc[.]com:443, and sends system info and victim ID. The malware also provides attackers with a reverse shell for remote command execution and file operations, such as move and delete. Trend Micro believes with medium confidence that this new variant is a custom Mustang Panda tool based on its functional characteristics and previously documented packet decryption mechanisms.

Daily Brief Summary

NATION STATE ACTIVITY // Chinese Hackers Use Microsoft Tool to Bypass Antivirus Defenses

Chinese APT group Mustang Panda has exploited the Microsoft Application Virtualization Injector utility to inject malicious payloads.

This tactic allows the malware to avoid detection by disguising it within legitimate processes, bypassing antivirus software.

Trend Micro identified over 200 victims of these attacks since 2022, primarily targeting Asian-Pacific government entities through spear-phishing.

The phishing emails used by the attackers mimic communications from governmental or authoritative bodies and contain malicious attachments.

When specific ESET antivirus components are detected on a system, Mustang Panda employs specialized evasion techniques using pre-installed Windows tools.

The malware utilizes the ‘waitfor.exe’ utility, exploiting its trust level within systems to execute malicious activities undetected.

The backdoor deployed, known as TONESHELL, facilitates remote command execution and data exfiltration.

Trend Micro assesses that these attacks exhibit tailored traits indicating a sophisticated toolset likely unique to Mustang Panda.