fsquirt_abuse_malicious_cpl_load.yml #487
Open
+29
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Proxy Execution via fsquirt.exe Loading Control Panel Applet
This PR documents fsquirt.exe as a Windows-signed helper binary that can be abused for execution via implicit Control Panel applet loading.
When executed from a non-system directory, fsquirt.exe resolves and loads bthprops.cpl from its current working directory. This allows execution of a user-supplied Control Panel applet under the context of a trusted Microsoft binary, without directly invoking a suspicious executable.
This behavior has been observed in real-world activity, including campaigns attributed to the SideWinder APT group, where malicious Control Panel applets were used for execution and defense evasion. reference: https://securelist.com/sidewinder-apt/114089/
The included example demonstrates how fsquirt.exe can be combined with a crafted bthprops.cpl to proxy execution through a legitimate Windows component, potentially reducing behavioral detection and alerting.
Simulation Results Step by step
Created and Run under non-system directory
Procmon results for proof
Sysmon EventID 7 result for proof
Own detection file uploaded
image_load_win_fsquirt_dll_load_from_non_system_paths.yml