Windows File Transfer Methods

πŸ’Ύ Windows File Transfer Methods: Intro & APT Example

The Windows OS keeps changing β€” and so do the ways files can be transferred πŸ“‚ These methods can be used by attackers to avoid detection AND defenders to catch them!


🧠 Key Learning: Fileless Threats

🦠 Fileless threats = No obvious file stored on disk Instead, attackers use built-in Windows tools to carry out attacks in memory (sneaky!).


chevron-rightπŸ•΅οΈβ€β™‚οΈ The Astaroth Attack – Step by Stephashtag

The Microsoft Astaroth Attack is used here as an example of an APT (Advanced Persistent Threat). It followed these steps:

  1. 🎣 Phishing Email β†’ victim clicks on an LNK file

  2. πŸ› οΈ This triggers the WMIC tool with the /Format flag

  3. πŸ“œ This executes JavaScript code

  4. 🌐 JavaScript abuses the Bitsadmin tool to download more payloads

  5. πŸ” Payloads are Base64-encoded and decoded using Certutil β†’ DLL files

  6. 🧩 DLLs are loaded using regsvr32

  7. πŸ’£ Final payload (Astaroth) is injected into the Userinit process

🎯 Goal: Fully compromise the system without leaving easy-to-find files!

Last updated