Friday, February 3, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Threat actors behind the legitimate Windows WerFault.exe to inject RAT

Threat actors behind the legitimate Windows WerFault.exe to inject RAT

Threat actors have developed a new method abusing Windows' WerFault.exe error reporting feature to deploy RAT on target systems.


Ezgi Koc Ezgi Koc
January 6, 2023
2 min read
  • Threat actors are now abusing the legitimate Windows WerFault.exe reporting capability using a new method to execute a RAT named Pupy.
  • Pupy is an open-source multi-platform remote access trojan (RAT) utilized by advanced persistent threat (APT) groups.
  • Dynamic-link library (DLL) side-loading is an increasingly popular cyber attack method that takes advantage of how Microsoft Windows applications handle DLLs.

Threat actors have used a new technique to abuse the Windows WerFault.exe reporting feature. Werfault is the system in charge of monitoring the logging and reporting of application issues to help users. It is a step in the reporting procedure for errors. While the WerFault.exe is a legitimate Windows service, the threat actors use it to execute a remote access trojan.

Here is how it works

An ISO image was recently discovered by K7 Security Labs. The ISO consisted of 4 files, Windows’ legitimate WerFault.exe, a harmful DLL called faultrep.dll, a shortcut file called recent inventory & our specialties.lnk and an XLS file named File.xls. When the target runs the shortcut file, WerFault.exe from the ISO is executed using scriptrunner.exe LOLBin through the command line.

Faultrep.dll is essentially the name of the DLL used by WerFault.exe and resides in the standard Windows folder. When WerFault.exe is run, it uses the DLL sideloading technique to load Faultrep.dll from the ISO and, like the original DLL, has a dummy exported function WerpInitiateCrashReporting. This malicious Faultrep.dll is compiled in drive C.

When the DLL is successfully loaded, two threads are created. One loads the DLL (“dll_pupyx64.dll”) of the Pupy Remote Admin Tool into memory and the other opens the contained XLS table.

Chain of Infection | Pupy RAT
Chain of Infection

As the infection completes, the attackers gain full access to the target device and they will be able to remotely execute commands, spread in the network, and steal data.

See more Cybersecurity News


Tags: K7 Security LabsMalwareWindows
Ezgi Koc

Ezgi Koc

Ezgi Koc is an editor at Cloud7 News. She graduated from Ege University with a bachelor's degree in English Language and Literature. She had a great interest in technology, both hardware and software, since her childhood and decided to pursue a career that would enable her to broaden her horizons in this field. She is very passionate about video games as a Twitch affiliate and streams games in her free time.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
7 best gaming chairs

7 best gaming chairs

Related News

LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Radware announces a new partner program

Radware announces a new partner program

February 3, 2023 1:30 pm
APTs are looking for developers to hire with hefty paychecks

APTs are looking for developers to hire with hefty paychecks

February 1, 2023 2:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • LockBit encryptor source code is updated
  • LibreOffice 7.5 Community is released. What’s new?
  • NTT to add Palo Alto Networks’ solution to its portfolio
  • Gcore announces partnership with Super Protocol
  • Fortinet is expanding its SOC offerings portfolio

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.