- Apr 13, 2013
- 3,224
- Content source
- https://youtu.be/eBfdrX22fug
Malicious shortcut (LNK) files have been around for 20+ years. They are still popular as download cradles.Why haven't they improved detection and blocking of LNK files? This threat has been around for at least 6 months to a year.
c m d
p o w e r s h e l l
Not block, but sandbox. It would not block the LNK file itself, by default. It would sandbox the process and scripts executed by the LNK file command line (targets= c m d and xs34).Nice vid. Presuming CF would block these?
Thanks and with @cruelsister 's Restricted rule, any network traffic would be blocked or prompted forNot block, but sandbox. It would not block the LNK file itself, by default. It would sandbox the process and scripts executed by the LNK file command line (targets= c m d and xs34).
See the LNK command line at 2:00 in the video.
Thanks and with @cruelsister 's Restricted rule, any network traffic would be blocked or prompted for
cmd
powershell
cscript
wscript
rundll
AV generally does not even attempt to detect malicious LNK files. Some will detect malicous LNK command lines while most others will deal only with the downloaded or executed malware. Sometimes the behavioral analysis will block any used sponsors from connecting out to the network to download malware. How AVs handle malicious LNK and command lines is all over the place.The standard protection (any AV on default settings) cannot protect well against such attacks in the wild. Even when the attack is detected in the antivirus test, the result is not reliable because most such malware is already dead. In many cases, it successfully managed to bypass AV protection in the wild (when malware was alive).
This is a problem as malicious LNK files are increasingly being delivered to corporate email addresses.Also, the Windows built-in protection via AppLocker or WDAC can sometimes be insufficient against LNK malware because they cannot block shortcuts.
Every single LOLBin can be blocked without any issues. Some enterprises do it. Their LOLBin blocklist can include 250+ processes shipped with Windows on workstation and server. That does not include all of the firewall block rules or firewall automation to deny access to any approved process from a particular source IP address. Any problems arise when talking about unmanaged home users who want to use stuff.One can decrease the chances of infection by blocking some LOLBins, but it would be impossible to block all LOLBins that can be executed via shortcuts.
At least with SRP one can whitelist known, good LNK files and block others by default.Promising remediation can provide Smart App Control (if MOTW is not bypassed) and SRP because they can block shortcuts in unsafe locations.
They do, they include various heuristics methods. Like all other vectors, detection varies. On an enterprise environment, it can’t be relied only on detection.AV generally does not even attempt to detect malicious LNK files.
The sentence "Some enterprises do it" is very important.Every single LOLBin can be blocked without any issues. Some enterprises do it.
Most enterprises have ineffective protections altogether. I know that is an absolute, irrefutable fact because I see it daily. They get away with it because:The sentence "Some enterprises do it" is very important.
Thanks! Running the malware with CF onboard would first result in the Containment alert, followed by 3 Firewall alerts (First to download the trigger, second to initiate the stealer mechanism, third for the data exfiltration). In the case of this malware one MUST hit block on ANY of the FW alerts to be protected (blocking the first 2 will stop the malicious cascade and the third would block the data going bye-bye).Nice vid. Presuming CF would block these?
I did run CF for a few years, but not currently running it, so question: I recall with your recommended settings, the containment was "automatic" or is my recollection frayed? So are you saying that even in Containment you'd still get get Firewall alerts that require the user to select block. Maybe I never encountered malware this strong, or if I did, I just don't remember having to manually tell the the Firewall to block a connection. I do recall looking at "logs" and finding items listed after the fact that CF could continue to block, or "trust" --Thanks! Running the malware with CF onboard would first result in the Containment alert, followed by 3 Firewall alerts (First to download the trigger, second to initiate the stealer mechanism, third for the data exfiltration). In the case of this malware one MUST hit block on ANY of the FW alerts to be protected (blocking the first 2 will stop the malicious cascade and the third would block the data going bye-bye).
Thank you for this post! It is appreciated more than you can know, as it reminded me that I had never mentioned another setting that deals with your question, as well as preventing ANY stealer that I am familiar with from doing any damage.I did run CF for a few years, but not currently running it, so question: I recall with your recommended settings, the containment was "automatic" or is my recollection frayed? So are you saying that even in Containment you'd still get get Firewall alerts that require the user to select block. Maybe I never encountered malware this strong, or if I did, I just don't remember having to manually tell the the Firewall to block a connection. I do recall looking at "logs" and finding items listed after the fact that CF could continue to block, or "trust" --
technically I'm in Grandpa mode, but like to pretend I think younger (smarter) than that -- delusions...Thank you for this post! It is appreciated more than you can know, as it reminded me that I had never mentioned another setting that deals with your question, as well as preventing ANY stealer that I am familiar with from doing any damage.
As an example, consider the Stealer that was used in the video. Clicking on the Link malware will start the infection mechanism that begins with the download of the trigger, the the subsequent other two. Although the malware will be automatically contained and will still collect the data from Chrome (the data also being in Containment). But in the absence of the Firewall (or by allowing all of the 3 alerts) the packaged stolen data can still be transmitted out (double-plus Ungood).
However there is a something in Firewall settings that can be applied to prevent this without any FW alerts being given, and that is simply by Checking the "Do Not Show FW Alerts" and in the drop down box selecting "Block Requests". For the Link malware in the video this stops it cold with no data being harvested. Further this will also stop the bunch of other stealers that are currently circulating including keyloggers. Think maybe a video is called for.
And speaking of settings, there is a easy way to essentially lock down the system to any but totally valid applications without ANY popups. Perhaps this would assist in choosing a simple security solution for Grandma Grandpa, and disgustedly reprobate children to use.