Windows Troubleshooting Platform 'is serving malware'

Troubleshooting service used as a pathway to con victims into downloading malware

Hackers are abusing Windows Troubleshooting Platform (WTP) to trick users into downloading malware onto their computers.

WTP is a legitimate feature in Windows, intended for troubleshooting problems. However, researchers at Proofpoint have found a social engineering attack that uses this normally helpful service as a vector for infection.

In a blog post, the researchers said: "This attack is particularly effective since execution of WTP is not accompanied by a security warning and users have been conditioned to run the troubleshooter when it appears in Windows. In this case, though, running the troubleshooter leads to the installation of LatentBot, a well-documented modular bot used for surveillance, information stealing, and remote access."

The scam runs like this: The target victim receives an email with a file attachment that, when downloaded and opened, looks as if there is an issue with the computer's font set. The user is prompted to "double-click to auto detect charset", which, if followed, opens a real embedded, digitally signed DIAGCAB file - the extension for a Troubleshooting pack.

Advertisement - Article continues below
Advertisement - Article continues below

Once opened, this displays what Proofpoint calls a "convincingly realistic" download wizard (see below). If the user clicks "next" in this window, the malware payload is then downloaded and executed on the computer.

"This method of malware execution bypasses observation by many existing sandbox products because the malicious activity is carried out outside of the msdt.exe binary loading the .diagcab file," said Proofpoint.

"This continues the trend of malware authors seeking new sandbox evasion methods via COM-based non-standard execution flow; previous examples of these methods are WMI, Office Interoperability, Background Intelligent Transfer Service, and the Task Scheduler."

The method could, the researchers said, "fool even experienced users", due to how convincing it is and the fact it evades detection by many sandboxing techniques.

IT Pro has approached Microsoft for comment, but had received none at the time of publication.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now


Microsoft Windows

Windows 7 security patches officially coming to an end

21 Mar 2019

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Microsoft Windows

The IT Pro Podcast: Farewell Windows 7

17 Jan 2020
Microsoft Windows

Windows 7 ends: what do you do next?

4 Jan 2020

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020