HOME

TheInfoList



OR:

Fileless malware is a variant of computer related malicious software that exists exclusively as a
computer memory In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term ''memory'' is often synonymous with the term ''primary storage ...
-based artifact i.e. in RAM. It does not write any part of its activity to the computer's
hard drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnet ...
, thus increasing its ability to evade antivirus software that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, time-stamping, etc., and leaving very little evidence that could be used by digital forensic investigators to identify illegitimate activity. Malware of this type is designed to work in-memory, so its existence on the system lasts only until the system is
rebooted ''Rebooted'' is the third season of the computer-animated television series '' Ninjago: Masters of Spinjitzu'' (titled ''Ninjago'' from the eleventh season onward). The series was created by Michael Hegner and Tommy Andreasen. The season aired f ...
.


Definition

Fileless malware is sometimes considered synonymous with ''in-memory'' malware as both perform their core functionalities without writing data to disk during the lifetime of their operation. This has led some commentators to claim that this variant strain is nothing new and simply a “redefinition of the well-known term, memory resident virus”, whose pedigree can be traced back to the 1980s with the birth of the Lehigh Virus that was developed by the originator of the term, Fred Cohen, and became influential with his paper on the topic. This synonymy is however incorrect. Although the aforementioned behavioral execution environment is the same, in both cases i.e. both malware variants are executed in system memory, the crucial differentiation is the method of inception and prolongation. Most malware's infection vector involves some writing to the hard disk, in order for it to be executed, whose origin could take the form of an infected file attachment, external media device e.g. USB, peripheral, mobile phone etc., browser drive-by, side-channel etc. Each of the aforementioned methods has to have contact with the host system's hard drive, in some form or another, meaning that even when employing the stealthiest anti-forensic methods, some form of the infected residue will be left on the host media. Fileless malware on the other hand, from the point of inception until process termination (usually by way of a system reboot), aims never to have its contents written to disk. Its purpose is to reside in volatile system areas such as the
system registry The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and use ...
, in-memory processes and service areas.


History

Fileless malware is an evolutionary strain of malicious software that has taken on a steady model of self-improvement/enhancement with a drive towards clearly defined focused attack scenarios, whose roots can be traced back to the
terminate-and-stay-resident A terminate-and-stay-resident program (commonly TSR) is a computer program running under DOS that uses a system call to return control to DOS as though it has finished, but remains in computer memory so it can be reactivated later. This technique ...
viral programs that, once they were launched, would reside in memory awaiting a system interrupt before gaining access to their control flow; examples of which were seen in viruses such as Frodo,
The Dark Avenger ''The Dark Avenger'' is a 1955 British historical action adventure film directed by Henry Levin. The screenplay was written by Daniel B. Ullman (and an uncredited Phil Park). The film stars Errol Flynn, Joanne Dru and Peter Finch. The music ...
, Number of the Beast. These techniques evolved by way of temporary memory resident viruses and were seen in famous examples such as: Anthrax, Monxla and took on their truer "fileless" nature by way of in-memory injected network viruses/worms such as CodeRed and Slammer. More modern evolutionary incarnations have been seen in viruses such as Stuxnet, Duqu, Poweliks, Phasebot etc.


Recent developments

On February 8, 2017, Kaspersky Lab's Global Research & Analysis Team published a report titled: "Fileless attacks against enterprise networks" which implicates variants of this type of malware, and its latest incarnations, affecting 140 enterprise networks across the globe with banks, telecommunication companies and government organisations being the top targets. The report details how a variant of fileless malware is using PowerShell scripts (located within the Microsoft Windows Registry system) to launch an attack against a target's machine leveraging a common attack framework called
Metasploit The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7. It ...
with supporting attack tools such as
Mimikatz Mimikatz is both an Exploit (computer security), exploit on Microsoft Windows that extracts passwords stored in memory and software that performs that exploit. It was created by France, French programmer Benjamin Delpy and is French slang for "cute ...
, and leveraging standard Windows utilities such as ‘SC’ and ‘NETSH’ to assist with lateral movement. The malware was only detected after a bank identified the Metasploit Meterpreter code running in physical memory on a central domain controller (DC). Kaspersky Labs is not the only company to have identified such emerging trends, with most of the principal IT security anti-malware companies coming forward with similar findings: Symantec, Trend Micro, McAfee Labs, Cybereason, etc.


Digital forensics

The emergence of malware that operate in a fileless way presents a major problem to digital forensic investigators, whose reliance on being able to obtain digital artifacts from a crime scene is critical to ensuring
chain of custody Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Of particular ...
and producing evidence that is admissible in a court of law. Many well-known digital forensic process models such as: Casey 2004, DFRWS 2001, NIJ 2004, Cohen 2009, all embed either an examination and/or analysis phase into their respective models, implying that evidence can be obtained/collected/preserved by some mechanism. The difficulty becomes apparent when considering the standard operating procedures of digital investigators and how they should deal with a computer at a crime scene. Traditional methods direct the investigator to: * Do not, in any circumstances, switch the computer on * Make sure that the computer is switched off – some screen savers may give the appearance that the computer is switched off, but hard drive and monitor activity lights may indicate that the machine is switched on. * Remove the main power source battery from laptop computers. * Unplug the power and other devices from sockets on the computer itself Fileless malware subverts the forensics models, as evidence acquisition can only take place against a memory image that has been obtained from a live running system that is to be investigated. This method, however, can itself compromise the acquired host's memory image and render legal admissibility questionable, or at the very least, instill enough reasonable doubt that the weight of the evidence presented may be drastically reduced, increasing the chances that
Trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
or "some other dude done it" defences may be used more effectively. This renders this type of malware extremely attractive to adversaries wishing to secure a foothold in a network, perform difficult to trace lateral movement and do so in a quick and silent manner, when standard forensic investigatory practices are ill-prepared for the threat.


References


External links


Fileless malware: An evolving threat on the horizon

Say Hello to the Super-Stealthy Malware That’s Going Mainstream

Fileless Malware Takes 2016 By Storm

New Fileless Attack Using DNS Queries to Carry Out PowerShell Commands

Kovter becomes almost file-less, creates a new file type, and gets some new certificates
{{DEFAULTSORT:Fileless malware Computer forensics Types of malware