Article Details

Scrape Timestamp (UTC): 2023-10-30 04:25:18.576

Source: https://thehackernews.com/2023/10/hackers-using-msix-app-packages-to.html

Original Article Text

Click to Toggle View

Hackers Using MSIX App Packages to Infect Windows PCs with GHOSTPULSE Maware. A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as Google Chrome, Microsoft Edge, Brave, Grammarly, and Cisco Webex to distribute a novel malware loader dubbed GHOSTPULSE. "MSIX is a Windows app package format that developers can leverage to package, distribute, and install their applications to Windows users," Elastic Security Labs researcher Joe Desimone said in a technical report published last week. "However, MSIX requires access to purchased or stolen code signing certificates making them viable to groups of above-average resources." Based on the installers used as lures, it's suspected that potential targets are enticed into downloading the MSIX packages through known techniques such as compromised websites, search engine optimization (SEO) poisoning, or malvertising. Launching the MSIX file opens a Windows prompting the users to click the Install button, doing so which results in the stealthy download of GHOSTPULSE on the compromised host from a remote server ("manojsinghnegi[.]com") via a PowerShell script. This process take place over multiple stages, with the first payload being a TAR archive file containing an executable that masquerades as the Oracle VM VirtualBox service (VBoxSVC.exe) but in reality is a legitimate binary that's bundled with Notepad++ (gup.exe). Also present within the TAR archive is handoff.wav and a trojanized version of libcurl.dll that's loaded to take the infection process to the next stage by exploiting the fact that gup.exe is vulnerable to DLL side-loading. "The PowerShell executes the binary VBoxSVC.exe that will side load from the current directory the malicious DLL libcurl.dll," Desimone said. "By minimizing the on-disk footprint of encrypted malicious code, the threat actor is able to evade file-based AV and ML scanning." The tampered DLL file subsequently proceeds by parsing handoff.wav, which, in turn, packs an encrypted payload that's decoded and executed via mshtml.dll, a method known as module stomping, to ultimately load GHOSTPULSE. GHOSTPULSE acts as a loader, employing another technique known as process doppelgänging to kick start the execution of the final malware, which includes SectopRAT, Rhadamanthys, Vidar, Lumma, and NetSupport RAT.

Daily Brief Summary

MALWARE // Cyber Attack Campaign Uses MSIX App Packages & GHOSTPULSE Malware to Infect Pcs

A new cybersecurity attack campaign has been found using MSIX Windows app package files for known software to distribute malware named GHOSTPULSE.

MSIX is a Windows app package that is commonly used by developers to distribute and install apps but require an access to purchased or stolen code signing certificates, making it an attractive tool for hackers.

Potential victims are usually enticed into downloading the MSIX packages through techniques like compromised websites, search engine optimization poisoning, or malvertising.

Once the MSIX file is opened and installed, GHOSTPULSE is downloaded on the compromised host from a remote server through a PowerShell script.

The malware has multiple stages of attack, involving a TAR archived file containing an executable that appears to be an Oracle VM VirtualBox service, a DLL side-loading, and process doppelgänging.

This type of attack is highly evasive as it minimizes the on-disk footprint of encrypted malicious code, making it more difficult for antivirus and machine learning scans to detect.

As a loader, GHOSTPULSE can introduce a range of malware, including SectopRAT, Rhadamanthys, Vidar, Lumma, and NetSupport RAT.