{"id":16280,"date":"2020-10-13T18:49:08","date_gmt":"2020-10-13T16:49:08","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16280"},"modified":"2020-11-24T17:22:51","modified_gmt":"2020-11-24T16:22:51","slug":"windows-update-kann-fr-malware-auslieferung-missbraucht-werden","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/10\/13\/windows-update-kann-fr-malware-auslieferung-missbraucht-werden\/","title":{"rendered":"Windows Update can be abused for malware delivery"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/03\/winb.jpg\" width=\"58\" align=\"left\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/10\/13\/windows-update-kann-fr-malware-auslieferung-missbraucht-werden\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]A nasty thing a security researcher has come across. Windows Update can be tricked into downloading and then running malware. Falls into the category LoLBins (living-off-the-land binaries).<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/3e238b4ceec144b19934f189cc9ac194\" width=\"1\" height=\"1\">I had already reported a problem with LoLBins (living-off-the-land binaries) related to Windows Defender and a new built-in feature in the blog post <a href=\"https:\/\/borncity.com\/win\/2020\/09\/06\/sicherheitsbedenken-wegen-microsoft-defender-download-feature\/\">Security concerns about Microsoft Defender download feature<\/a> in early September 2020. Shortly after the report this feature was removed again.<\/p>\n<h2>What are LOLBINs?<\/h2>\n<p>LOLBIN (living-off-the-land binaries) are any binary file provided by the operating system that is normally used for legitimate purposes. However, LOLBINs can also be misused by malicious actors. Attackers can use LOLBINs to download and execute malware, while keeping these activities hidden. After all, operating system files are also used for this purpose.<\/p>\n<p>LoLBins are used by various attackers in combination with fileless malware and legitimate cloud services to increase the chances of remaining undetected within an organization during the attack phases. The concept of LoLBins is not new and not specific to Windows. Almost all traditional operating systems, starting with early DOS versions and Unix systems, contained executable files that could be exploited by attackers. Talos has published a <a href=\"https:\/\/blog.talosintelligence.com\/2019\/11\/hunting-for-lolbins.html\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a> on this topic. <\/p>\n<h2>Abusing Windows Update as LOLBIN<\/h2>\n<p>I got aware of the topic on Twitter this night via <a href=\"https:\/\/twitter.com\/dtmsecurity\/status\/1315721619147501568\" target=\"_blank\" rel=\"noopener noreferrer\">this tweet<\/a>. A security researcher has taken Windows Update and checked if Windows Update can be misused as LOLBIN.<\/p>\n<p><a href=\"https:\/\/twitter.com\/dtmsecurity\/status\/1315721619147501568\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" title=\"Abusing Windows Update as LOLBIN\" alt=\"Abusing Windows Update as LOLBIN\" src=\"https:\/\/i.imgur.com\/485ZWL4.jpg\"><\/a><br \/>(Abusing Windows Update as LOLBIN)<\/p>\n<p>The WSUS \/ Windows Update Client (wuauclt) is a utility that can be found as an .exe file in the %windir%\\system32\\ folder. The utility gives users <a href=\"https:\/\/docs.microsoft.com\/pt-br\/security-updates\/windowsupdateservices\/18139070\" target=\"_blank\" rel=\"noopener noreferrer\">partial control<\/a> over some features of the Windows Update Agent (and <a href=\"https:\/\/kickthatcomputer.wordpress.com\/2013\/03\/06\/windows-update-command-line-options\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>) from the command line. MDSec researcher David Middlehurst <a href=\"https:\/\/dtm.uk\/wuauclt\/\" target=\"_blank\" rel=\"noopener noreferrer\">has discovered<\/a> that wuauclt can also be used by attackers to execute malicious code on Windows 10 systems. To do this, use the following command line option:<\/p>\n<pre><code>wuauclt.exe \/UpdateDeploymentProvider [path_to_dll] \/RunHandlerComServer<\/code><\/pre>\n<p>The [path_to_dll] is a DLL file that can be configured by the attacker. This DLL file is then executed under the permissions of the Windows Update client.&nbsp; <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"DLL per Update laden\" alt=\"DLL per Update laden\" src=\"https:\/\/dtm.uk\/content\/images\/size\/w2000\/2020\/09\/wuauclt.png\" width=\"666\" height=\"515\"><\/p>\n<p>This attack technique is categorized by MITRE ATT&amp;CK as Signed Binary Proxy Execution via Rundll32. The approach allows attackers to bypass antivirus or other protection mechanisms to protect against viruses, application control and validation of digital certificates. Unsigned code can also be executed via Rundll32. Middlehurst claims to have found an example in the wild (see <a href=\"https:\/\/web.archive.org\/web\/20201020031153\/https:\/\/www.joesandbox.com\/analysis\/215088\/0\/html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>) that exploits this technique. More details can be found in Middlehurst's <a href=\"https:\/\/dtm.uk\/wuauclt\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a> and at <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-update-can-be-abused-to-execute-malicious-programs\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bleeping Computer<\/a>. I assume that Microsoft will patch some wuauclt in the near future. <code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A nasty thing a security researcher has come across. Windows Update can be tricked into downloading and then running malware. Falls into the category LoLBins (living-off-the-land binaries).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195,194],"class_list":["post-16280","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16280"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16280\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}