AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands

AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands

A sophisticated backdoor in AppSuite PDF Editor that enables threat actors to execute arbitrary commands on compromised Windows systems.

Initially flagged as a potentially unwanted program due to its aggressive installation behavior, AppSuite’s true nature was revealed when its malicious components were deobfuscated and analyzed.

Threat actors exploited high-ranking PDF tool websites to distribute a deceptive MSI installer under the guise of a legitimate productivity application.

These sites, reminiscent of earlier trojan horse campaigns like JustAskJacky, direct victims to download a WiX-built MSI package.

Once executed, the installer fetches the Electron-based PDF Editor from vault.appsuites.ai into the user’s profile and establishes persistence by scheduling future executions with the --cm=--fullupdate switch.

The heart of the compromise resides in pdfeditor.js, an obfuscated JavaScript file containing the backdoor logic.

Supporting files include UtilityAddon.node, a helper DLL employed for persistence via scheduled tasks, and NSIS-based binaries that add registry autorun entries.

The GUI of PDF editor is actually a browser window.

Only 17 of the 3,661 deobfuscated lines relate to the PDF editing GUI; the remainder drives the backdoor’s routines.

Command-Line Switches and “wc Routines”

AppSuite translates user-facing switches (e.g., --install, --ping, --check, --reboot, --cleanup) into internal “wc routines” that perform installation, cleanup, configuration polling, and command execution.

The --partialupdate and --fullupdate switches contact the command-and-control (C2) server to retrieve configurations, browser credentials, and arbitrary command templates, which are then executed on the host.

During the --install routine, the backdoor obtains a system identifier (SID) via the UtilityAddon DLL, registers with the C2 at appsuites.ai/api/s3/new, and stores the installation ID and SID in an encoded LOG1 file.

To do so, it removes all ‘-’ characters from the installation ID string and builds the encryption key by concatenating ‘276409396fcc0a23’ with the first 0x10 bytes of the processed installation ID.

Deobfuscated code for AES-128-CBC encryption and the encrypted ActionRequest struct.
Deobfuscated code for AES-128-CBC encryption and the encrypted ActionRequest struct.

It then creates two scheduled tasks—one to trigger --partialupdate after a one-day delay and another to repeatedly invoke --ping—ensuring stealth by evading sandbox time constraints.

The --cleanup routine, invoked by the uninstaller, unregisters the installation from the server and removes the scheduled tasks.

However, additional tasks created during runtime and residual backdoor access render the official uninstaller ineffective. Full remediation requires repaving the system to eliminate unauthorized persistence.

C2-Supplied Templates

The most severe capability emerges in the --check and --reboot routines. After verifying timing constraints to avoid repeated execution, the backdoor fetches encrypted command templates from sdk.appsuites.ai/api/s3/options and …/config.

These templates allow direct execution of arbitrary commands—such as registry modifications, browser preference manipulation, or launching additional malware—on the infected system.

Additional handlers target Chromium-based browsers and custom applications like OneLaunch and Wave Browser.

They exfiltrate user preferences, decrypt saved credentials via the UtilityAddon DLL, and overwrite local configuration files. Registry keys are modified or added to maintain persistence or disable security tools.

AppSuite PDF Editor is indisputably malicious, combining a functional PDF editor with a fully featured backdoor.

The audacious tactic of submitting the malware for false-positive removal highlights an emerging threat actor strategy.

Security vendors should treat suspicious “productivity tools” with heightened scrutiny, and organizations encountering AppSuite infections must repave affected machines to ensure complete removal.

Free PDF editors remain in high demand, but this incident underscores the critical need for vendor and user vigilance against trojanized software.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.