A file named notepad.exe has been detected which is weaponized by threat actor to perform attack. Such software can be termed as Trojanized open-source software and it is hard to detect as open source software source code is available publicly. The weaponized notepad.exe is being dropped through Windows NT operating system kernel executable (ntoskrnl.exe) by exploiting ntoskrnl.exe or via network shares. The Notepad.exe will call executables ipconfig.exe, net.exe, reg.exe, systeminfo.exe, tasklist.exe. Besides, malicious notepad will search for Config.dat located in C:\Windows\Debug folder which legitimate Notepad will not. The malicious Notepad has additional code to load an encrypted blob file which is Config.dat to decrypt the code and executes it in the memory to ensure persistence of the backdoor.
Unauthorized Code Execution