Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control

Cybersecurity researchers have uncovered a sophisticated web shell attack targeting Microsoft Internet Information Services (IIS) servers, allowing threat actors to achieve complete remote control over compromised systems.

The malicious script, identified as “UpdateChecker.aspx,” represents a significant escalation in web shell complexity, employing advanced obfuscation techniques to evade detection while maintaining persistent access to critical infrastructure.

The attack emerged from a broader investigation into cyber intrusions targeting critical national infrastructure in the Middle East, where threat actors successfully deployed multiple web shell servers across compromised systems.

Google News

Unlike traditional web shells that rely on simple PHP or ASP scripts, this variant leverages heavily obfuscated C# code embedded within an ASPX webpage file, making analysis considerably more challenging for security teams.

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
View of the content of the ASPX file with obfuscated C# code (Source – Fortinet)

Fortinet researchers Xiaopeng Zhang and John Simmons identified the malware during their follow-up analysis of the Middle East infrastructure breach, noting its sophisticated design and potentially devastating impact on affected organizations.

The web shell’s ability to operate seamlessly within Windows IIS environments while maintaining stealth through advanced obfuscation techniques makes it particularly dangerous for enterprise environments.

The malware operates with high severity implications, granting attackers comprehensive control over compromised Windows systems.

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
Debugger view of a parsed command data in the web shell (Source – Fortinet)

Its deployment specifically targets IIS servers, which are commonly used in enterprise environments for hosting web applications and services, making it a valuable asset for threat actors seeking to establish long-term persistence within organizational networks.

Technical Architecture and Obfuscation Mechanisms

The UpdateChecker.aspx web shell demonstrates remarkable technical sophistication through its multi-layered obfuscation approach.

The malware’s C# codebase employs Unicode encoding for all readable elements, including method names, variable names, and class names, which are randomly generated to prevent signature-based detection. Additionally, all constant values, strings, and numerical data undergo encryption or encoding processes before compilation.

The web shell’s communication protocol requires HTTP POST requests with specific content-type headers set to “application/octet-stream.”

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
The HTTP POST traffic between the attacker and the web shell (Source – Fortinet)

Command data transmission follows a structured JSON format that includes mandatory keys such as ProtocolVersion, ModuleName, and RequestName, along with optional parameters depending on the requested operation.

ModuleName RequestName Parameters
Base GetBasicServerInfo
Base GetBasicServerApplicationInfo
CommandShell ExecuteCommand WorkingDirectory, Command
FileManager GetDrives
FileManager GetDriveInformation DriveName
FileManager GetWebRoot
FileManager GetFileSystemsList Path
FileManager CreateDirectory Path, DirectoryName
FileManager CopyDirectory SourcePath, DestinationPath, DirectoryName, OverwriteAllow
FileManager MoveDirectory SourcePath, DestinationPath, DirectoryName, OverwriteAllow
FileManager DeleteDirectory Path
FileManager GetDirectoryInformation Path
FileManager SetDirectoryTime Path, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtc
FileManager SetDirectoryAttributes Path, Attributes
FileManager CreateFile Path, FileName
FileManager CopyFile SourcePath, DestinationPath, OverwriteAllow, FileName
FileManager MoveFile SourcePath, DestinationPath, OverwriteAllow, FileName
FileManager DeleteFile Path
FileManager GetFileContent Path
FileManager SetFileContent Path, FileContent, FileName
FileManager GetFileInformation Path
FileManager SetFileTime Path, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtc
FileManager SetFileAttributes Path, Attributes
FileManager SearchByName Path, Keyword, MatchCase, MatchWord
FileManager SearchByContent Path, FileTypes, Keyword, MatchCase
FileManager ReplaceFileContent Path, FileTypes, FindWhat, ReplaceWith, MatchCase, UseRegularExpression
FileManager GetPathSeparator

The malware implements a dual-encryption scheme where the first 16 bytes contain an encrypted key using hardcoded values, followed by command data encrypted with a derived 15-byte key.

Functionally, the web shell organizes its capabilities into three distinct modules: Base for system reconnaissance, CommandShell for executing Windows commands with IIS privileges, and FileManager for comprehensive file system operations.

This modular architecture enables attackers to perform various malicious activities, from initial system enumeration to advanced file manipulation and command execution, all while maintaining the appearance of legitimate IIS server activity.

Experience faster, more accurate phishing detection and enhanced protection for your business with real-time sandbox analysis-> Try ANY.RUN now


Source link