blog.barracuda.com
Open in
urlscan Pro
4.234.25.19
Public Scan
URL:
https://blog.barracuda.com/2023/12/01/malware-101-file-system-evasion-memory-only-registry-resident
Submission: On January 05 via api from US — Scanned from DE
Submission: On January 05 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://blog.barracuda.com/search
<form method="GET" class="cmp-search-box__form" action="https://blog.barracuda.com/search">
<input class="cmp-search-box__form__input" type="search" name="searchTerm" aria-label="Search for" placeholder="Search" value="" data-cmp-hook-header="searchInput">
<a href="#" class="cmp-search-box__form__search-btn" aria-label="Search" data-cmp-hook-header="searchSubmit">
<span class="cmp-search-box__form__search-btn__icon"></span>
</a>
</form>
Text Content
* Home * Ransomware Protection * Research * AI and Security * Home * Ransomware Protection * Research * AI and Security TYPE AND PRESS ENTER TO SEARCH MALWARE 101: FILE SYSTEM EVASION — MEMORY-ONLY AND REGISTRY-RESIDENT Topics: Dec. 1, 2023 | Jonathan Tanner Tweet Share Share Tweet Share Share Malware detection is easiest when the malware is written to disk or in transit since the file system and network traffic are both simple to observe and scan files from for the presence of malware. With the exception of implants, it is difficult to avoid network traffic scans, but the file system can be avoided somewhat. There are a few different techniques to achieve this of varying complexity. Two such techniques — memory-only and registry-resident — are often referred to as "fileless" malware, which is almost as much a misnomer as "serverless," but nonetheless is a commonly used classification term worth knowing. While "serverless" malware is always still running on servers, just not ones the user has to provision, "fileless" refers to the storage location of the malware itself not being part of the standard file system (or having some layer of abstraction between the malware artifact and the file system). "Fileless" malware always does involve files in the sense that the malware artifact is technically a file, the initial infection method is almost certainly in the form of a file, and, with the exception of memory-only variants, the malware does reside on disk in some form. HOW MEMORY-ONLY AND REGISTRY-RESIDENT MALWARE EVADES DETECTION Memory-only malware, as the name implies, is loaded into memory rather than residing on disk, typically by injecting malicious code into an existing process that is running. As the malware can't materialize out of nowhere into memory, some form of file must be used to load and execute the malware itself. This does, however, make it more difficult for anti-malware software to detect the final payload since scanning memory can be a daunting task as it changes rapidly and without a notification system, whereas updating files on the disk will generate notifications that anti-malware software can hook into. The main drawback of this evasion technique, however, is that memory is cleared when a system restarts, and thus the malware will not longer exist unless there is some system in place for placing it into memory again, which can somewhat defeat the purpose of hiding it in memory in the first place. Of course, this could also be a benefit if the objective of the malware is not long-term because a restart will wipe malware artifact, whereas simply deleting a file will leave behind remnants of the original file (as discussed in the article about deleters). The Windows registry is essentially a key-value store (a type of database). It typically stores information about user preferences and variables used by the operating system and installed software, but technically anything conforming to the storage format can be stored in the registry, including malware. By storing malware in the registry instead of on the file system, attackers can evade anti-malware solutions that don't check the registry for this technique. While the registry itself is still stored as files on disk, there is an extra layer of abstraction to storing malware in the registry rather than on the file system directly. This payload can then be set to launch when the system starts up. USING SYSTEM-PROVIDED TOOLS TO HIDE To further make detection more difficult, memory-only and registry-resident malware will typically utilize tools provided by the operating system as much as possible — referred to as "living off the land." This reduces the amount of actual code — and especially code easily distinguishable as malicious — that can be detected by signatures and static analysis. For example, a simple backdoor only requires opening a port, which is common among legitimate software and a feature provided by operating systems via networking libraries. Using only system-provided tools and features can somewhat limit capabilities, especially for Linux where different distributions may not bundle as many libraries by default. Windows, however, has a wide variety of libraries available for software (and malware) to utilize without worrying about whether or not a particular library has been installed either by the OS itself or as a dependency of the software installed on the system. Hiding malware in memory or the Windows registry can be a very effective evasion technique. For example, Duqu 2.0 was a memory-only worm and spyware that managed to infect numerous telecom companies as well as a company that creates anti-malware software. By hiding malware "deeper" into the system, attackers can more easily evade some antimalware solutions. However, memory and the Windows registry are still places that anti-malware software can access relatively easily if they are programmed to do so (especially the registry). Even more sophisticated types of malware evasion burrow even deeper into the system, which will be covered in part two of file system evasion. You can read the rest of the Malware 101 series here. Jonathan Tanner Jonathan is a Senior Security Researcher at Barracuda Networks. Connect with him on LinkedIn here. Related Posts: Malware 101: Detection and remediation Malware 101: Prevention Malware 101: File system evasion — rootkits and bootkits Malware 101: Using logic bombs to evade detection Tweet Share Share Tweet Share Share -------------------------------------------------------------------------------- Popular Posts How AI is changing ransomware and how you can adapt to stay protected Enhancing email security: Navigating new Google and Yahoo DMARC changes Meet Patrick O’Donnell: Barracuda’s new SVP of Worldwide MSP Sales Password protection in the age of AI Quishing: What you need to know about QR code email attacks Topics 13 Email Threat Types Ransomware Protection Microsoft 365 Email Protection Network Protection Application and Cloud Protection Data Protection and Recovery Healthcare Education Industrial and IoT Security Managed Services Digital Transformation Barracuda Engineering Resources Free Email Threat Scan Cyber Liability Insurance Guide Careers at Barracuda Barracuda Engineering Barracuda News Room 2024 © Journey Notes * Email Protection * Application Protection * Network Protection * Data Protection * Managed XDR HOW BARRACUDA USES COOKIES YOUR PRIVACY YOUR PRIVACY Barracuda Sites may request cookies to be set on your device. We use cookies to let us know when you visit our Barracuda Sites, to understand how you interact with us, to enrich and personalize your user experience, to enable social media functionality and to customize your relationship with Barracuda, including providing you with more relevant advertising. Note that blocking some types of cookies may impact your experience on our Barracuda Sites and the services we are able to offer. * STRICTLY NECESSARY COOKIES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. * ANALYTICS COOKIES ANALYTICS COOKIES Analytics Cookies These cookies help Barracuda to understand how visitors to our pages engage within their session. Analytics Cookies assist in generating reporting site usage statistics which do not personally identify individual users. * PERFORMANCE COOKIES PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. * TARGETING COOKIES TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not directly identify you, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. * FUNCTIONAL COOKIES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID 33ACROSS 33ACROSS View Third Party Cookies * Name cookie name * REPLACE-WITH-DYANMIC-VENDOR-ID 33ACROSS 3 Purposes View Privacy Notice 33ACROSS 3 Purposes View Privacy Notice REPLACE-WITH-DYANMIC-VENDOR-ID Consent Purposes Location Based Ads Consent Allowed Legitimate Interest Purposes Personalize Require Opt-Out Special Purposes Location Based Ads Features Location Based Ads Special Features Location Based Ads Clear Filters Information storage and access Apply Confirm My Choices COOKIE ACCEPTANCE We use cookies to make our website work. We and our partners would also like to set optional cookies for analytics purposes, as well as to measure and improve the performance of the website, and to remember your preferences and provide you enhanced functionality and personalization. Click on the Cookies Preferences button to find out more and set your preferences. Click on the Accept All button if you consent to the use of all such cookies. If you choose to allow the use of such cookies, you will be able to withdraw your consent at any time. Please refer to our Privacy Policy to better understand your rights.Privacy Policy Accept All Cookies Cookie Preferences