Windows Troubleshooting Platform 'is serving malware'

Troubleshooting service used as a pathway to con victims into downloading malware

Hackers are abusing Windows Troubleshooting Platform (WTP) to trick users into downloading malware onto their computers.

WTP is a legitimate feature in Windows, intended for troubleshooting problems. However, researchers at Proofpoint have found a social engineering attack that uses this normally helpful service as a vector for infection.

In a blog post, the researchers said: "This attack is particularly effective since execution of WTP is not accompanied by a security warning and users have been conditioned to run the troubleshooter when it appears in Windows. In this case, though, running the troubleshooter leads to the installation of LatentBot, a well-documented modular bot used for surveillance, information stealing, and remote access."

Advertisement - Article continues below

The scam runs like this: The target victim receives an email with a file attachment that, when downloaded and opened, looks as if there is an issue with the computer's font set. The user is prompted to "double-click to auto detect charset", which, if followed, opens a real embedded, digitally signed DIAGCAB file - the extension for a Troubleshooting pack.

Once opened, this displays what Proofpoint calls a "convincingly realistic" download wizard (see below). If the user clicks "next" in this window, the malware payload is then downloaded and executed on the computer.

"This method of malware execution bypasses observation by many existing sandbox products because the malicious activity is carried out outside of the msdt.exe binary loading the .diagcab file," said Proofpoint.

Advertisement
Advertisement - Article continues below

"This continues the trend of malware authors seeking new sandbox evasion methods via COM-based non-standard execution flow; previous examples of these methods are WMI, Office Interoperability, Background Intelligent Transfer Service, and the Task Scheduler."

The method could, the researchers said, "fool even experienced users", due to how convincing it is and the fact it evades detection by many sandboxing techniques.

IT Pro has approached Microsoft for comment, but had received none at the time of publication.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/malware/355093/evasive-malware-threats-are-surging
malware

Evasive malware threats doubled in 2019

24 Mar 2020
Visit/laptops/21797/macbook-pro-15in-v-dell-xps-15
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

6 Mar 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

2 Mar 2020
Visit/operating-systems/microsoft-windows/354878/the-autopsy-of-windows-7
Microsoft Windows

The autopsy of Windows 7

29 Feb 2020

Most Popular

Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020