The malware is persistent across system reboots, despite not having any files on disk A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.The concept of “fileless” malware that only exists in the system’s memory is not new, but such threats are rare because they typically don’t survive across system reboots, when the memory is cleared. That’s not the case for Poweliks, which takes a rather new approach to achieve persistence while remaining fileless, according to malware researchers from G Data Software.[Malware infections tripled in late 2013, Microsoft finds]When it infects a system, Poweliks creates a startup registry entry that executes the legitimate rundll32.exe Windows file followed by some encoded JavaScript code. This triggers a process similar in concept to a Matryoshka Russian nesting doll, said Paul Rascagnères, senior threat researcher at G Data, in a blog post. The JavaScript code checks whether Windows PowerShell, a command-line shell and scripting environment, is present on the system. If it isn’t, it downloads and installs it and then it decodes some more code that is actually a PowerShell script.The PowerShell script is executed by using a trick to bypass a default protection in Windows that prevents the launch of unknown PowerShell scripts without user confirmation, Rascagnères said. The script then decodes and executes shellcode which injects a DLL (dynamic link library) directly into the system memory. Once it is running in memory, the rogue DLL component connects to two IP (Internet Protocol) addresses in Kazakhstan to receive commands. It can be used to download and install other threats, depending on the attacker’s needs and intentions.During the entire process, from executing the JavaScript code to the final DLL injection, the malware does not create any malicious files on the hard disk drive, making it difficult for antivirus programs to detect it.Furthermore, the name of the startup registry key created by Poweliks is a non-ASCII character. This is a trick that prevents regedit — the Windows registry editor tool — and possibly other programs from displaying the rogue start-up entry, making it difficult for both users and malware analysts to manually spot the infection.Some Poweliks variants have been distributed through malicious Microsoft Word documents attached to spam emails that purported to come from Canada Post or USPS. The malicious documents exploited a remote code execution vulnerability in Microsoft Office 2003, 2007 and 2010 that was patched by Microsoft in April 2012. However, according to other reports, the malware is also distributed through drive-by download attacks that use Web exploits.[Unique malware evades sandboxes]To block malware like Poweliks, “antivirus solutions have to either catch the file (the initial Word document) before it is executed (if there is one), preferably before it reached the customer’s email inbox,” Rascagnères said. “Or, as a next line of defense, they need to detect the software exploit after the file’s execution, or, as a last step, in-registry surveillance has to detect unusual behavior, block the corresponding processes and alert the user.” Security researchers from Trend Micro, who have also analyzed the threat, believe that other malware creators may adopt the techniques used by Poweliks in the future. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Regulation Regulation news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe