Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage a Microsoft Help Index File (.mshi) to deploy the PipeMagic backdoor, marking a notable evolution in malware delivery methods.

This development ties into the exploitation of CVE-2025-29824, a zero-day elevation of privilege vulnerability in the Windows Common Log File System (CLFS) driver, which Microsoft patched on April 8, 2025.

The vulnerability allowed attackers to escalate privileges from a standard user account, facilitating ransomware deployment by groups like Storm-2460.

Recent Exploitation Tactics

PipeMagic, first identified in December 2022 during RansomExx campaigns targeting industrial firms in Southeast Asia, has since adapted its tactics.

In 2024, it masqueraded as a fake ChatGPT application to infiltrate organizations in Saudi Arabia, using Rust-based loaders built with Tauri and Tokio frameworks to decrypt and execute encrypted payloads via shellcode.

Blank screen of the fake application

By 2025, infections spread to Brazil and Saudi Arabia, with attackers employing obfuscated C# code in .mshi files to decrypt RC4-encrypted shellcode and inject 32-bit executables.

These loaders dynamically resolve API functions using FNV-1a hashing, creating named pipes like .pipe1. for encrypted communication, while interfacing with a local network endpoint at 127.0.0.1:8082.

Microsoft attributed related activity to post-compromise exploitation, where PipeMagic downloads modules from compromised Azure domains, leading to credential dumping via tools like ProcDump disguised as dllhost.exe.

Technical Analysis of Loaders

The 2025 variants introduce diverse loading mechanisms, including DLL hijacking with legitimate files like googleupdate.dll, where malicious logic resides in DllMain to decrypt AES-encrypted payloads in CBC mode using specific keys and IVs.

PipeMagic Malware
Decrypting the payload using AES

Once deployed, PipeMagic generates random 16-byte arrays for pipe names and supports graphical modes despite lacking a UI, enabling persistence and lateral movement.

Newly discovered modules enhance functionality: an asynchronous communication plugin uses I/O completion ports to handle file operations like reading, writing, and error flagging via a doubly linked list of descriptors, supporting commands for initialization, termination, and data processing.

According to Kaspersky report, a loader module injects 64-bit payloads by parsing resources, relocating imports through name comparison, and invoking exported functions like DllRegisterService for data exchange.

An injector module patches AMSI interfaces in amsi.dll to evade detection, loading .NET payloads via mscoree.dll after checking runtime versions like 4.0.30319 or 2.0.50727.

Post-exploitation involves dumping LSASS memory with renamed ProcDump to extract credentials, mirroring tactics in CVE-2025-29824 exploits that create CLFS BLF files like C:ProgramDataSkyPDFPDUDrv.blf and inject into system processes.

Ransomware indicators include random file extensions, .onion domains in notes, and commands disabling recovery like bcdedit and wbadmin deletions.

Microsoft recommends applying patches, enabling cloud-delivered protections in Defender, and using EDR in block mode to mitigate such threats.

Indicators of Compromise

Indicator Type Value Description
Domain aaaaabbbbbbb.eastus.cloudapp.azure[.]com C2 server used by PipeMagic
Hash (MD5) 5df8ee118c7253c3e27b1e427b56212c metafile.mshi loader
Hash (MD5) 60988c99fb58d346c9a6492b9f3a67f7 chatgpt.exe (2024 variant)
Hash (MD5) 7e6bf818519be0a20dbc9bcb9e5728c6 chatgpt.exe (2025 variant)
Hash (MD5) e3c8480749404a45a61c39d9c3152251 googleupdate.dll hijacker
Hash (MD5) 1a119c23e8a71bf70c1e8edf948d5181 Deployed PE backdoor
Hash (MD5) bddaf7fae2a7dac37f5120257c7c11ba Additional module
Pipe Name .pipe104201.%d Used by injector module
Pipe Name .pipe1.<16-byte hexadecimal string> Generated for communication

AWS Security Services: 10-Point Executive Checklist - Download for Free


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.