Cybercriminals Using Powerful BatCloak Engine to Make Malware Fully Undetectable

silversurfer

Super Moderator
Thread author
Verified
Top Poster
Staff Member
Malware Hunter
Aug 17, 2014
11,108
A fully undetectable (FUD) malware obfuscation engine named BatCloak is being used to deploy various malware strains since September 2022, while persistently evading antivirus detection.

The samples grant "threat actors the ability to load numerous malware families and exploits with ease through highly obfuscated batch files," Trend Micro researchers said.

About 79.6% of the total 784 artifacts unearthed have no-detection across all security solutions, the cybersecurity firm added, highlighting BatCloak's ability to circumvent traditional detection mechanisms.

The BatCloak engine forms the crux of an off-the-shelf batch file builder tool called Jlaive, which comes with capabilities to bypass Antimalware Scan Interface (AMSI) as well as compress and encrypt the primary payload to achieve heightened security evasion.

The open-source tool, although taken down since it was made available via GitHub and GitLab in September 2022 by a developer named ch2sh, has been advertised as an "EXE to BAT crypter." It has since been cloned and modified by other actors and ported to languages such as Rust.

The final payload is encapsulated using three loader layers – a C# loader, a PowerShell loader, and a batch loader – the last of which acts as a starting point to decode and unpack each stage and ultimately detonate the concealed malware.

"The batch loader contains an obfuscated PowerShell loader and an encrypted C# stub binary," researchers Peter Girnus and Aliakbar Zahravi said. "In the end, Jlaive uses BatCloak as a file obfuscation engine to obfuscate the batch loader and save it on a disk."

Malware Fully Undetectable


 

silversurfer

Super Moderator
Thread author
Verified
Top Poster
Staff Member
Malware Hunter
Aug 17, 2014
11,108
Kaspersky's "System Watcher" by default does prevent/block most attacks even by sophisticated malware.

You can also tweak for increased protection in K. paid versions, formerly named Application Control, current name: Intrusion Prevention.

I see your new thread, you just should check/read the links shared by our forum members:
 

Xeno1234

Level 14
Jun 12, 2023
684
Kaspersky's "System Watcher" by default does prevent/block most attacks even by sophisticated malware.

You can also tweak for increased protection in K. paid versions, formerly named Application Control, current name: Intrusion Prevention.

I see your new thread, you just should check/read the links shared by our forum members:
I assume Kaspersky blocks most of these, but then again no software is perfect.
 
  • Like
Reactions: [correlate]
F

ForgottenSeer 97327

Disabled CMD (and cmd and bat scripts) since 2019 without problems. Time to put this dinosaurus command shell introduced in the first Windows NT version 30 years ago to the grave o_O:oops::cool:

Just enable all protections in Microsoft Defender Exploit Protection (also works when you use a third-party antivirus). .
1686723748615.png
 
Last edited by a moderator:

Xeno1234

Level 14
Jun 12, 2023
684
Disabled CMD (and cmd and bat scripts) since 2019 without problems. Time to put this dinosaurus command shell introduced in the first Windows NT version 30 years ago to the grave o_O:oops::cool:

Just enable all protections in Microsoft Defender Exploit Protection (also works when you use a third-party antivirus). .
That works and doesnt cause issues?
 
  • Like
Reactions: [correlate]

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,510
Also, how do you do it lol?
This one is enough to block most console applications via Exploit Protection (run from the PowerShell Administrator console):

Code:
Set-ProcessMitigation -Name program.exe -Enable DisableWin32kSystemCalls

Back to allowing program.exe:
Code:
Set-ProcessMitigation -Name program.exe -Disable DisableWin32kSystemCalls

This can also be done from Security Center by enabling the mitigation "Disable Win32k system calls" for the application program.exe (Add by program name). If you change program ---> cmd, the cmd console will be blocked. The same can be done for most LOLBins.

1686822548147.png


1686822769529.png
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top