Key Takeaways
CVE-2024-21412 is a flaw allowing a bypass that circumvents Windows Defender SmartScreen. The feature, which is intended to stop phishing attempts and malware, is integrated into Windows 10 and 11. Threat actors can use malicious Internet Shortcut files or other malicious files to exploit this vulnerability. While the flaw has been patched by Microsoft, unpatched systems are still susceptible to this attack.
In January, Trend Micro observed DarkGate being used in a campaign exploiting CVE-2024-21412 via the use of fake software installers. The threat actors used PDFs with Google DoubleClick Digital Marketing redirects, leading victims to compromised sites. The sites hosted the CVE-2024-21412 exploit, leading to a malicious .MSI installer masquerading as a legitimate installer for one of several applications including iTunes, Notion, NVIDIA, and others.
The .MSI file contained a ZIP file in the path exploiting CVE-2023-36025, another Microsoft Windows Defender SmartScreen bypass. The installers used a sideloaded trojanized DLL to infect victims with DarkGate.
IOCs
PolySwarm has multiple samples of DarkGate.
f049356bb6a8a7cd82a58cdc9e48c492992d91088dda383bd597ff156d8d2929
029aeb0be8e690137fa8ef0d58823c28e6701499f9b6d2b2b2d8d2f863fb18c7
12018c2af0600fc1f1a75842a1d4f7777001fadb65f93125e479ec9b949e1773
1de8b971a9da9dcf3c8103699b10632674272d3a23e477b1b20f795fe1bf5bae
2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f
You can use the following CLI command to search for all DarkGate samples in our portal:
$ polyswarm link list -f DarkGate
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.