Virtualization Technology News and Information
A new take on "fileless" malware: Threat actors hide malicious code in event logs

Kaspersky researchers have uncovered a distinctive targeted malware campaign that used Windows event logs for malware storing. The activity also displayed an impressive variety of techniques, including commercial pentesting suites and anti-detection wrappers, which included those compiled with Go, as well as several last stage Trojans.

The targeted malware campaign used a unique technique, hiding "fileless" malware inside Windows event logs. The initial infection of the system was carried out through the dropper module from an archive downloaded by the victim. The attacker used a variety of unparalleled anti-detection wrappers to keep the last stage Trojans even less visible. To further avoid detection, some modules were signed with a digital certificate.

The attackers employed two types of Trojans for the last stage, gaining further access to the system. Commands from control servers were delivered in two ways: over HTTP network communications and engaging the named pipes. Some versions managed to use a command system containing dozens of commands from C2.

The campaign also included commercial pentesting tools, namely SilentBreak and CobaltStrike. It combined well-known techniques with customized decryptors and the first observed use of Windows event logs for hiding shellcodes into the system.

"We witnessed a new targeted malware technique that grabbed our attention," says Denis Legezo, lead security researcher at Kaspersky. "For the attack, the actor kept and then executed an encrypted shellcode from Windows event logs. That's an approach we've never seen before and highlights the importance of staying aware of threats that could otherwise catch you off guard. We believe it's worth adding the event logs technique to MITRE matrix's ‘defense evasion' and ‘hide artifacts' section. The usage of several commercial pentesting suites is also not the kind of thing you see every day."

To learn more about the event logs technique, visit

To protect yourself from fileless malware and similar threats, Kaspersky recommends:

  • Using a reliable endpoint security solution. A dedicated component in Kaspersky Endpoint Security for Business can detect anomalies in files' behavior and reveal any fileless malware activity. 
  • Installing anti-APT and EDR solutions, enabling threat discovery and detection, investigation and timely remediation of incidents capabilities. Additionally, provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training. All of this is available within the Kaspersky Expert Security framework.  
  • Integrating proper endpoint protection and dedicated services that can help protect against high-profile attacks. The Kaspersky Managed Detection and Response service can help identify and stop attacks in their early stages, before attackers can achieve their goals. 
Published Wednesday, May 04, 2022 8:12 AM by David Marshall
Filed under:
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<May 2022>