The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts (2401.07995v2)
Abstract: Fileless malware predominantly relies on PowerShell scripts, leveraging the native capabilities of Windows systems to execute stealthy attacks that leave no traces on the victim's system. The effectiveness of the fileless method lies in its ability to remain operational on victim endpoints through memory execution, even if the attacks are detected, and the original malicious scripts are removed. Threat actors have increasingly utilized this technique, particularly since 2017, to conduct cryptojacking attacks. With the emergence of new Remote Code Execution (RCE) vulnerabilities in ubiquitous libraries, widespread cryptocurrency mining attacks have become prevalent, often employing fileless techniques. This paper provides a comprehensive analysis of PowerShell scripts of fileless cryptojacking, dissecting the common malicious patterns based on the MITRE ATT&CK framework.
- D. Hendler, S. Kels, and A. Rubin, “Amsi-based detection of malicious powershell code using contextual embeddings,” in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020, pp. 679–693.
- R. Canary, “2023 red canary threat detection report,” Jun 2023. [Online]. Available: https://redcanary.com/resources/guides/threat-detection-report/
- A. Afreen, M. Aslam, and S. Ahmed, “Analysis of fileless malware and its evasive behavior,” in 2020 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2020, pp. 1–8.
- S. Varlioglu, N. Elsayed, Z. ElSayed, and M. Ozer, “The dangerous combo: Fileless malware and cryptojacking,” SoutheastCon 2022, pp. 125–132, 2022.
- M. N. Olaimat, M. A. Maarof, and B. A. S. Al-rimy, “Ransomware anti-analysis and evasion techniques: A survey and research directions,” in 2021 3rd international cyber resilience conference (CRC). IEEE, 2021, pp. 1–6.
- J. Piet, B. Anderson, and D. McGrew, “An in-depth study of open-source command and control frameworks,” in 2018 13th International Conference on Malicious and Unwanted Software (MALWARE), 2018, pp. 1–8.
- T. Nelson and H. Kettani, “Open source powershell-written post exploitation frameworks used by cyber espionage groups,” in 2020 3rd International Conference on Information and Computer Technologies (ICICT), 2020, pp. 451–456.
- G. S. Gabor Szappanos and S. Gallagher, “Horde of miner bots and backdoors leveraged log4j to attack vmware horizon servers,” Mar 2022. [Online]. Available: http://tinyurl.com/miner-bots-log4j
- A. Bulazel and B. Yener, “A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web,” in Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 2017, pp. 1–21.
- Microsoft, “Fileless threats,” 2021. [Online]. Available: https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/fileless-threats
- P. Newton, “Analysing fileless malware: Cobalt strike beacon,” Jul 2020. [Online]. Available: https://newtonpaul.com/analysing-fileless-malware-cobalt-strike-beacon/
- W. Handaya, M. Yusoff, and A. Jantan, “Machine learning approach for detection of fileless cryptocurrency mining malware,” in Journal of Physics: Conference Series, vol. 1450, no. 1. IOP Publishing, 2020, p. 012075.
- R. Moussaileb, N. Cuppens, J.-L. Lanet, and H. L. Bouder, “A survey on windows-based ransomware taxonomy and detection mechanisms,” ACM Computing Surveys (CSUR), vol. 54, no. 6, pp. 1–36, 2021.
- R. Nataraj, V. Singh, and M. Wood, “Lemon duck powershell malware cryptojacks enterprise networks,” 2019. [Online]. Available: https://tinyurl.com/yc4fmkdz
- L. Gundert. [Online]. Available: https://go.recordedfuture.com/hubfs/reports/rep-2016-9006.pdf
- E. Nakashima and C. Timberg, “Nsa officials worried about the day its potent hacking tool would get loose. then it did,” Washington Post, vol. 16, 2017.
- P. A. Macaraeg, Arvin Roi; Roderno, “Trojan.ps1.pcastle.b,” 2019. [Online]. Available: https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.ps1.pcastle.b
- “Powershell,” 2018. [Online]. Available: https://hunter2.gitbook.io/darthsidious/enumeration/powershell
- T. Micro, “Lemon duck cryptocurrency-mining malware information,” 2020. [Online]. Available: https://success.trendmicro.com/solution/000261916
- V. V. Koushik, “Lemon duck malware : Infecting outdated windows systems using eternalblue,” Ssecpod, 2020. [Online]. Available: https://www.secpod.com/blog/lemon-duck-malware/
- M00nRise, “Post-exploitation tool for hiding processes from monitoring applications,” 2016. [Online]. Available: https://github.com/M00nRise/ProcessHider/blob/master/PowerShell/Invoke-ReflectivePEInjection.ps1
- C. G. S. Team, “Threat alert: Lemonduck crypto-mining malware.” [Online]. Available: https://www.cybereason.com/blog/research/threat-alert-lemonduck-crypto-mining-malware
- T. Caldwell, “The miners strike–addressing the crypto-currency threat to enterprise networks,” Computer Fraud & Security, vol. 2018, no. 5, pp. 8–14, 2018.
- C. M. Pascual, “Ghostminer weaponizes wmi, kills other mining payloads,” 2019. [Online]. Available: https://tinyurl.com/2w49k6v3
- J. Agcaoili, “Monero-mining malware pcastle uses fileless techniques,” 2019. [Online]. Available: https://tinyurl.com/4kh3f3x5
- S. Gallagher, “Two flavors of tor2mine miner dig deep into networks with powershell, vbscript,” Dec 2021. [Online]. Available: http://tinyurl.com/tor2mine-powershell
- MITRE, “Command and control,” The MITRE Corporation MITRE ATT&CK, 2019. [Online]. Available: https://attack.mitre.org/tactics/TA0011/
- C. CISA, “Iranian government-sponsored apt actors compromise federal network, deploy crypto miner, credential harvester: Cisa,” Nov 2022. [Online]. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-320a
- T. Trellix, Aug 2022. [Online]. Available: http://tinyurl.com/trellix-miner
- D. DFIR-Report, “All that for a coinminer?” Jan 2021. [Online]. Available: https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer/
- J. LEIN, “Sketchy powershell scripts on pastebin,” Aug 2021. [Online]. Available: https://jon-lein.github.io/Powershell_Malware_Pastebin/
- Patebin, “What is pastebin.com all about?” [Online]. Available: https://pastebin.com/faq#1
- R. Nataraj, “New lemon duck variants exploiting microsoft exchange server,” May 2021. [Online]. Available: https://news.sophos.com/en-us/2021/05/07/new-lemon-duck-variants-exploiting-microsoft-exchange-server/
- H. Darley, S. Robinson, and R. Ellis, “Exploring a crypto-mining campaign which used the log4j vulnerability: Darktrace blog,” Apr 2022. [Online]. Available: https://darktrace.com/blog/exploring-a-crypto-mining-campaign-which-used-the-log-4j-vulnerability
- I. Patterson. [Online]. Available: https://nssm.cc/download
- G. Kristal, “Purple fox ek: New cves, steganography, and virtualization added to attack flow - sentinellabs,” Oct 2020. [Online]. Available: http://tinyurl.com/purple-fox-steganography
- J. G. SZÉLES, Oct 2020. [Online]. Available: https://www.bitdefender.com/files/News/CaseStudies/study/373/Bitdefender-PR-Whitepaper-LemonDuck-creat4826-en-EN-GenericUse.pdf
- J. Triunfante, E. M. Earnshaw, and M. J. Ofiaza, “Purple fox’ malware can rootkit and abuse powershell,” 2019. [Online]. Available: https://tinyurl.com/2w6vzbc6
- B. Bojan, “Purple fox - a comparison of old and new techniques in the exploitation phase,” Sep 2022. [Online]. Available: https://diverto.github.io/2020/09/22/purple-fox
- PingCastle, “Pingcastle vulnerability scanner,” Oct 2022. [Online]. Available: https://www.pingcastle.com/documentation/scanner/