Malware

Experts spotted a new undetectable PowerShell Backdoor posing as a Windows update

Cybersecurity researchers warn of a new PowerShell backdoor that disguises itself as part of the Windows update process to avoid detection.

Cybersecurity researchers from SafeBreach a warning of a new PowerShell backdoor masqueraded as a Windows update process to avoid detection.

The backdoor spreads via weaponized Word documents (“Apply Form.docm.”) posing as a LinkedIn-based job application. The malicious document was uploaded from Jordan on August 25, 2022. 

The experts believe the backdoor is distributed as a part of a spear phishing campaign conducted by a sophisticated threat actor.

Upon opening the document and enabling the embedded macro, a PowerShell script is dropped on the victim’s machine. It also achieves persistence by creating a scheduled task posing as part of the Windows update process and executing the script that is located in a fake update folder (“%appdata%\local\Microsoft\Windows“).

Once executed the script, it will launch a second PowerShell script and before executing the scheduled task, two other scripts (Script.ps1 and Temp.ps1) are dropped on the system.

“Before executing the scheduled task, it will create two PowerShell scripts, named Script.ps1 and Temp.ps1. The content of the PowerShell scripts is stored in text boxes inside the Word document and will be saved to the same fake update directory of %AppData%\Local\Microsoft\Windows\Update.” reads the analysis published by SafeBreach.

Both scripts are obfuscated and FUD with a zero detection rate in VirusTotal.

Script.ps1 connects to the C2 servers and sends a victim ID to the operators, then awaits a command. The command is encrypted using AES-256 CBC.

The analysis of the ID count revealed that the attackers C2 have compromised a total of 70 computers.

The Temp.ps1 script decodes the command in the response, executes it, and then uploads the result in encrypted form via a POST request to the C2.

SafeBreach researchers were able to create a script to decrypt the commands sent to each of them.

The experts found the following percentage of each command type waiting for the victims:

  • 66%: Exfiltrate process list command
  • 23%: Empty command – Idle (the command starts with “:”)
  • 7%: Local users enumerations – whoami and whoami /all + process list
  • 2%: Remove files from public folder + net accounts + computer name, IP configurations …
  • 1%: List files in special folders – program files, downloads, desktop, documents, appdata
  • 1%: Entire script for A.D users enumerations and RDP clients enumerations (see Appendix B)

SafeBreach published indicators of compromise (IoCs) for the PowerShell backdoor.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, PowerShell Backdoor)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

7 minutes ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

1 hour ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

6 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

19 hours ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

1 day ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

1 day ago

This website uses cookies.