Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. It does not write any part of its activity to the computer's hard drive, thus increasing its ability to evade antivirus software that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, time-stamping, etc., and leaving very little evidence that could be used by digital forensic investigators to identify illegitimate activity. Malware of this type is designed to work in memory, so its existence on the system lasts only until the system is rebooted.
Definition
Fileless malware is sometimes considered synonymous with in-memory malware as both perform their core functionalities without writing data to disk during the lifetime of their operation. This has led some commentators to claim that this variant strain is nothing new and simply a “redefinition of the well-known term, memory resident virus”,[1] whose pedigree can be traced back to the 1980s with the birth of the Lehigh Virus that was developed by the originator of the term, Fred Cohen, and became influential with his paper on the topic.[2]
This synonymy is however incorrect. Although the aforementioned behavioral execution environment is the same, in both cases i.e. both malware variants are executed in system memory, the crucial differentiation is the method of inception and prolongation. Most malware's infection vector involves some writing to the hard disk,[3] in order for it to be executed, whose origin could take the form of an infected file attachment, external media device e.g. USB, peripheral, mobile phone etc., browser drive-by, side-channel etc.
Each of the aforementioned methods has to have contact with the host system's hard drive, in some form or another, meaning that even when employing the stealthiest anti-forensic methods, some form of the infected residue will be left on the host media.
Fileless malware on the other hand, from the point of inception until process termination (usually by way of a system reboot), aims never to have its contents written to disk. Its purpose is to reside in volatile system areas such as the system registry, in-memory processes and service areas.[4]
Fileless malware commonly employs the Living off the Land (LotL) technique which refers to the use of pre-existing operating system binaries to perform tasks.[5] The goal of this technique is to avoid unnecessarily dropping extra malware on the system to perform tasks that can be done using already existing resources, this aids in stealth, primarily because the pre-existing system binaries are commonly signed and trusted. An example is an attacker using PsExec to connect to a target system.
History
Fileless malware is an evolutionary strain of malicious software that has taken on a steady model of self-improvement/enhancement with a drive towards clearly defined focused attack scenarios, whose roots can be traced back to the terminate-and-stay-resident viral programs[6] that, once they were launched, would reside in memory awaiting a system interrupt before gaining access to their control flow; examples of which were seen in viruses such as Frodo, The Dark Avenger, Number of the Beast.[7]
These techniques evolved by way of temporary memory resident viruses[8] and were seen in famous examples such as: Anthrax, Monxla[9] and took on their truer fileless nature by way of in-memory injected network viruses/worms such as CodeRed and Slammer.
More modern evolutionary incarnations have been seen in viruses such as Stuxnet, Duqu, Poweliks,[10] and Phasebot.[11]
Recent developments
On February 8, 2017, Kaspersky Lab's Global Research & Analysis Team published a report titled: "Fileless attacks against enterprise networks"[12] which implicates variants of this type of malware, and its latest incarnations, affecting 140 enterprise networks across the globe with banks, telecommunication companies and government organizations being the top targets.
The report details how a variant of fileless malware is using PowerShell scripts (located within the Microsoft Windows Registry system) to launch an attack against a target's machine leveraging a common attack framework called Metasploit with supporting attack tools such as Mimikatz,[13] and leveraging standard Windows utilities such as ‘SC’ and ‘NETSH’ to assist with lateral movement.
The malware was only detected after a bank identified the Metasploit Meterpreter code running in physical memory on a central domain controller (DC).[12]
Kaspersky Labs is not the only company to have identified such emerging trends, with most of the principal IT security anti-malware companies coming forward with similar findings: Symantec,[14] Trend Micro,[15]and Cybereason.[16]
Digital forensics
The emergence of malware that operates in a fileless way presents a major problem to digital forensic investigators, whose reliance on being able to obtain digital artifacts from a crime scene is critical to ensuring chain of custody and producing evidence that is admissible in a court of law.
Many well-known digital forensic process models such as: Casey 2004, DFRWS 2001, NIJ 2004, Cohen 2009,[17] all embed either an examination and/or analysis phase into their respective models, implying that evidence can be obtained/collected/preserved by some mechanism.
The difficulty becomes apparent when considering the standard operating procedures of digital investigators and how they should deal with a computer at a crime scene. Traditional methods direct the investigator to:[18]
- Do not, in any circumstances, switch the computer on
- Make sure that the computer is switched off – some screen savers may give the appearance that the computer is switched off, but hard drive and monitor activity lights may indicate that the machine is switched on.
- Remove the main power source battery from laptop computers.
- Unplug the power and other devices from sockets on the computer itself
Fileless malware subverts the forensics models, as evidence acquisition can only take place against a memory image that has been obtained from a live running system that is to be investigated. This method, however, can itself compromise the acquired host's memory image and render legal admissibility questionable, or at the very least, instill enough reasonable doubt that the weight of the evidence presented may be drastically reduced, increasing the chances that Trojan horse or "some other dude done it" defenses may be used more effectively.
This renders this type of malware extremely attractive to adversaries wishing to secure a foothold in a network, perform difficult to trace lateral movement and do so in a quick and silent manner, when standard forensic investigatory practices are ill-prepared for the threat.[19][20][21]
References
- ↑ "Advanced volatile threat: New name for old malware technique?". CSO. CSO. 21 February 2013. Retrieved 20 February 2017.
- ↑ "Computer Viruses - Theory and Experiments". University of Michigan. Retrieved 20 February 2017.
- ↑ Sharma, S (2013). "Terminate and Stay Resident Viruses" (PDF). International Journal of Research in Information Technology. 1 (11): 201–210.
- ↑ "A Disembodied Threat". Kaspersky Lab Business. Kaspersky Lab. Retrieved 20 February 2017.
- ↑ Living Off The Land Attacks (LOTL)
- ↑ "The Art of Computer Virus Research and Defense: Memory-Resident Viruses". Retrieved 20 February 2017.
- ↑ "The Number of the Beast". FireEye. Archived from the original on 2017-02-22. Retrieved 2017-02-20.
- ↑ "The Art of Computer Virus Research and Defense: Temporary Memory-Resident Viruses". Retrieved 20 February 2017.
- ↑ "What is Monxla - Monxla Information and Removal". antivirus.downloadatoz.com.
- ↑ "Trojan:W32/Poweliks". F-Secure. 2023. Retrieved 27 December 2023.
- ↑ "Phasebot, the fileless malware sold in the underground". Security Affairs. 23 April 2015.
- 1 2 Global Research & Analysis Team (8 February 2017). "Fileless attacks against enterprise networks". AO Kaspersky Lab. Retrieved 27 December 2023.
- ↑ "mimikatz". GitHub wiki. 30 September 2022.
- ↑ "Trojan.Poweliks". www.symantec.com. Symantec.
- ↑ Morales, M. (7 April 2015). "TROJ_PHASE.A". Trend Micro. Retrieved 27 December 2023.
- ↑ Muller, I.; Striem-Amit, Y.; Serper, A. (2015). "Fileless Malware: An Evolving Threat on the Horizon" (PDF). Cybereason. Retrieved 27 December 2023.
- ↑ Casey, Eoghan (2010). Digital evidence and computer crime : forensic science, computers and the Internet (3rd ed.). London: Academic. p. 189. ISBN 978-0123742681.
- ↑ "ACPO: Good Practice Guide for Computer-Based Electronic Evidence" (PDF). The Crown Prosecution Service. Association of Chief Police Officers. Retrieved 20 February 2017.
- ↑ "POWELIKS Levels Up With New Autostart Mechanism". Trend Micro. Trend Micro. Retrieved 20 February 2017.
- ↑ "Anti-Forensic Malware Widens Cyber-Skills Gap". InfoSecurity Magazine. InfoSecurity Magazine. 8 September 2015. Retrieved 20 February 2017.
- ↑ "Without a Trace: Fileless Malware Spotted in the Wild". Trend Micro. Trend Micro. Retrieved 20 February 2017.
External links
- Fileless malware: An evolving threat on the horizon
- Say Hello to the Super-Stealthy Malware That’s Going Mainstream
- Fileless Malware Takes 2016 By Storm
- New Fileless Attack Using DNS Queries to Carry Out PowerShell Commands
- Kovter becomes almost file-less, creates a new file type, and gets some new certificates