{"id":90212,"date":"2019-11-26T09:00:56","date_gmt":"2019-11-26T17:00:56","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90212"},"modified":"2023-09-11T15:49:59","modified_gmt":"2023-09-11T22:49:59","slug":"insights-from-one-year-of-tracking-a-polymorphic-threat","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/","title":{"rendered":"Insights from one year of tracking a polymorphic threat"},"content":{"rendered":"

A little over a year ago, in October 2018, our polymorphic outbreak monitoring system detected a large surge in reports, indicating that a large-scale campaign was unfolding. We observed as the new threat attempted to deploy files that changed every 20-30 minutes on thousands of devices. We gave the threat the name \u201cDexphot,\u201d based on certain characteristics of the malware code.<\/p>\n

The Dexphot attack used a variety of sophisticated methods to evade security solutions. Layers of obfuscation, encryption, and the use of randomized file names hid the installation process. Dexphot then used fileless techniques<\/a> to run malicious code directly in memory, leaving only a few traces that can be used for forensics. It hijacked legitimate system processes to disguise malicious activity. If not stopped, Dexphot ultimately ran a cryptocurrency miner on the device, with monitoring services and scheduled tasks triggering re-infection when defenders attempt to remove the malware.<\/p>\n

In the months that followed, we closely tracked the threat and witnessed the attackers upgrade the malware, target new processes, and work around defensive measures:<\/p>\n

\"Timeline<\/p>\n

While Microsoft Defender Advanced Threat Protection<\/a>\u2019s pre-execution detection engines blocked Dexphot in most cases, behavior-based machine learning models<\/a> provided protection for cases where the threat slipped through. Given the threat\u2019s persistence mechanisms, polymorphism, and use of fileless techniques, behavior-based detection was a critical component of the comprehensive protection against this malware and other threats that exhibit similar malicious behaviors.<\/p>\n

Microsoft Defender ATP data shows the effectiveness of behavioral blocking and containment capabilities in stopping the Dexphot campaign. Over time, Dexphot-related malicious behavior reports dropped to a low hum, as the threat lost steam.<\/p>\n

\"Number<\/p>\n

Our close monitoring of Dexphot helped us ensure that our customers were protected from the evolving threat. More importantly, one year\u2019s worth of intelligence helped us gain insight not only into the goals and motivations of Dexphot\u2019s authors, but of cybercriminals in general.<\/p>\n

Complex attack chain<\/h3>\n

The early stages of a Dexphot infection involves numerous files and processes. During the execution stage, Dexphot writes five key files to disk:<\/p>\n

    \n
  1. An installer with two URLs<\/li>\n
  2. An MSI package file downloaded from one of the URLs<\/li>\n
  3. A password-protected ZIP archive<\/li>\n
  4. A loader DLL, which is extracted from the archive<\/li>\n
  5. An encrypted data file that holds three additional executables that are loaded into system processes via process hollowing<\/a><\/li>\n<\/ol>\n

    Except for the installer, the other processes that run during execution are legitimate system processes. This can make detection and remediation more difficult. These legitimate system processes include msiexec.exe<\/em> (for installing MSI packages), unzip.exe<\/em> (for extracting files from the password-protected ZIP archive), rundll32.exe<\/em> (for loading the loader DLL), schtasks.exe<\/em> (for scheduled tasks), powershell.exe<\/em> (for forced updates). In later stages, Dexphot targets a few other system processes for process hollowing: svchost.exe<\/em>, tracert.exe<\/em>, and setup.exe<\/em>.<\/p>\n

    \"Dexphot<\/p>\n

    Multiple layers of security evasion<\/h3>\n

    Based on Microsoft Defender ATP signals, SoftwareBundler:Win32\/ICLoader<\/a> and its variants are primarily used to drop and run the Dexphot installer. The installer uses two URLs to download malicious payloads. These are the same two URLs that Dexphot use later to establish persistence, update the malware, and re-infect the device.<\/p>\n

    The installer downloads an MSI package from one of the two URLs, and then launches msiexec.exe<\/em> to perform a silent install. This is the first of several instances of Dexphot employing living-off-the-land techniques<\/a>, the use of legitimate system processes for nefarious purposes.<\/p>\n

    Dexphot\u2019s package often contains an obfuscated batch script. If the package contains this file, the script is the first thing that msiexec.exe<\/em> runs when it begins the installation process. The said obfuscated script is designed to check for antivirus products. Dexphot halts the infection process immediately if an antivirus product is found running.<\/p>\n

    When we first began our research, the batch script only checked for antivirus products from Avast and AVG. Later, Windows Defender Antivirus was added to the checklist.<\/p>\n

    \"\"<\/p>\n

    If the process is not halted, Dexphot decompresses the password-protected ZIP archive from the MSI package. The password to this archive is within the MSI package. Along with the password, the malware\u2019s authors also include a clean version of unzip.exe<\/em> so that they don\u2019t have to rely on the target system having a ZIP utility. The unzip.exe<\/em> file in the package is usually named various things, such as z.exe<\/em> or ex.exe<\/em>, to avoid scrutiny.<\/p>\n

    The ZIP archive usually contains three files: the loader DLL, an encrypted data file (usually named bin.dat<\/em>), and, often, one clean unrelated DLL, which is likely included to mislead detection.<\/p>\n

    Dexphot usually extracts the decompressed files to the target system\u2019s Favorites folder. The files are given new, random names, which are generated by concatenating words and numbers based on the time of execution (for example, C:\\Users\\<user>\\Favorites\\\\Res.Center.ponse\\<numbers><\/em>). The commands to generate the new names are also obfuscated, for example:<\/p>\n

    \"\"<\/p>\n

    Msiexec.exe<\/em> next calls rundll32.exe<\/em>, specifying loader DLL (urlmon.7z<\/em> in the example above) in order to decrypt the data file. The decryption process involves ADD and XOR operations, using a key hardcoded in the binary.<\/p>\n

    The decrypted data contains three executables. Unlike the files described earlier, these executables are never written to the filesystem. Instead, they exist only in memory, and Dexphot runs them by loading them into other system processes via process hollowing.<\/p>\n

    Stealthy execution through fileless techniques<\/h3>\n

    Process hollowing<\/a> is a technique that can hide malware within a legitimate system process. It replaces the contents of the legitimate process with malicious code. Detecting malicious code hidden using this method is not trivial, so process hollowing has become a prevalent technique used by malware today.<\/p>\n

    This method has the additional benefit of being fileless: the code can be run without actually being saved on the file system. Not only is it harder to detect the malicious code while it\u2019s running, it\u2019s harder to find useful forensics after the process has stopped.<\/p>\n

    To initiate process hollowing, the loader DLL targets two legitimate system processes, for example svchost.exe or nslookup.exe, and spawns them in a suspended state. The loader DLL replaces the contents of these processes with the first and second decrypted executables. These executables are monitoring services for maintaining Dexphot\u2019s components. The now-malicious processes are released from suspension and run.<\/p>\n

    Next, the loader DLL targets the setup.exe<\/em> file in SysWoW64. It removes setup.exe<\/em>\u2019s contents and replaces them with the third decrypted executable, a cryptocurrency miner. Although Dexphot always uses a cryptocurrency miner of some kind, it\u2019s not always the same miner. It used different programs like XMRig and JCE Miner over the course of our research.<\/p>\n

    \"\"<\/p>\n

    Persistence through regularly scheduled malware updates<\/h3>\n

    The two monitoring services simultaneously check the status of all three malicious processes. Having dual monitoring services provides redundancy in case one of the monitoring processes is halted. If any of the processes are terminated, the monitors immediately identify the situation, terminate all remaining malicious processes, and re-infect the device. This forced update\/re-infection process is started by a PowerShell command similar to the one below:<\/p>\n

    \"\"<\/p>\n

    The monitoring components also detect freshly launched cmd.exe<\/em> processes and terminate them promptly. As a final fail-safe, Dexphot uses schtasks.exe<\/em> to create scheduled tasks, with the command below.<\/p>\n

    \"\"<\/p>\n

    This persistence technique is interesting, because it employs two distinct MITRE ATT&CK techniques: Scheduled Task<\/a> and Signed Binary Proxy Execution<\/a>.<\/p>\n

    The scheduled tasks call msiexec.exe<\/em> as a proxy to run the malicious code, much like how msiexec.exe<\/em> was used during installation. Using msiexec.exe<\/em>, a legitimate system process, can make it harder to trace the source of malicious activity.<\/p>\n

    Furthermore, the tasks allow Dexphot to conveniently update the payload from the web every time the tasks run. They automatically update all of Dexphot’s components, both upon system reboot as well as every 90 or 110 minutes while the system is running.<\/p>\n

    Dexphot also generates the names for the tasks at runtime, which means a simple block list of hardcoded task names will not be effective in preventing them from running. The names are usually in a GUID format, although after we released our first round of Dexphot-blocking protections, the threat authors began to use random strings.<\/p>\n

    The threat authors have one more evasion technique for these scheduled tasks: some Dexphot variants copy msiexec.exe<\/em> to an arbitrary location and give it a random name, such as %AppData%\\<random>.exe<\/em>. This makes the system process running malicious code a literal moving target.<\/p>\n

    Polymorphism<\/h3>\n

    Dexphot exhibits multiple layers of polymorphism across the binaries it distributes. For example, the MSI package used in the campaign contains different files, as shown in the table below. The MSI packages generally include a clean version of unzip.exe<\/em>, a password-protected ZIP file, and a batch file that checks for currently installed antivirus products. However, the batch file is not always present, and the names of the ZIP files and Loader DLLs, as well as the password for extracting the ZIP file, all change from one package to the next.<\/p>\n

    In addition, the contents of each Loader DLL differs from package to package, as does the encrypted data included in the ZIP file. This leads to the generation of a different ZIP archive and, in turn, a unique MSI package, each time the attacker bundles the files together. Because of these carefully designed layers of polymorphism, a traditional file-based detection approach wouldn\u2019t be effective against Dexphot.<\/p>\n

     <\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
    MSI package ID<\/strong><\/td>\nMSI package contents<\/strong><\/td>\nPassword for ZIP file<\/strong><\/td>\nContents of encrypted ZIP<\/strong><\/td>\n<\/tr>\n
    Unzip.exe name<\/strong><\/td>\nZIP file name<\/strong><\/td>\nBatch file name<\/strong><\/td>\nLoader DLL file name<\/strong><\/td>\nEncrypted data name<\/strong><\/td>\n<\/tr>\n
    MSI-1<\/td>\nex.exe<\/td>\nwebUI.r0_<\/td>\nf.bat<\/td>\nkjfhwehjkf<\/td>\nIECache.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-2<\/td>\nex.exe<\/td>\nanalog.tv<\/td>\nf.bat<\/td>\nZvDagW<\/td>\nkernel32.bin<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-3<\/td>\nz.exe<\/td>\nyandex.zip<\/td>\nf.bat<\/td>\njeremy<\/td>\nSetupUi.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-4<\/td>\nunzip.exe<\/td>\nERDNT.LOC.zip<\/td>\n<\/td>\niso100<\/td>\nERDNT.LOC<\/td>\ndata.bin<\/td>\n<\/tr>\n
    MSI-5<\/td>\npck.exe<\/td>\nmse.zip<\/td>\n<\/td>\nkika<\/td>\n_steam.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-6<\/td>\nz.exe<\/td>\nmsi.zip<\/td>\n<\/td>\narima<\/td>\nic64.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-7<\/td>\nz.exe<\/td>\nmse.zip<\/td>\nf.bat<\/td>\nkika<\/td>\n_steam.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-8<\/td>\nz.exe<\/td>\nmse.zip<\/td>\n<\/td>\nkika<\/td>\n_steam.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-9<\/td>\nz.exe<\/td>\nyandex.zip<\/td>\nf.bat<\/td>\njeremy<\/td>\nSetupUi.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-10<\/td>\nhf.exe<\/td>\nupdate.dat<\/td>\nf.bat<\/td>\nnamr<\/td>\nx32Frame.dll<\/td>\ndata.bin<\/td>\n<\/tr>\n
    MSI-11<\/td>\nz.exe<\/td>\nyandex.zip<\/td>\nf.bat<\/td>\njeremy<\/td>\nSetupUi.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-12<\/td>\nunzip.exe<\/td>\nPkgMgr.iso.zip<\/td>\n<\/td>\npack<\/td>\nPkgMgr.iso<\/td>\ndata.bin<\/td>\n<\/tr>\n
    MSI-13<\/td>\nex.exe<\/td>\nanalog.tv<\/td>\nf.bat<\/td>\nkjfhwefkjwehjkf<\/td>\nurlmon.7z<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-14<\/td>\nex.exe<\/td>\nicon.ico<\/td>\nf.bat<\/td>\nZDADW<\/td>\ndefault.ocx<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-15<\/td>\nhf.exe<\/td>\nupdate.dat<\/td>\n<\/td>\nnamr<\/td>\nAvastFileRep.dll<\/td>\ndata.bin<\/td>\n<\/tr>\n
    MSI-16<\/td>\npck.exe<\/td>\nmse.zip<\/td>\nf.bat<\/td>\nkika<\/td>\n_steam.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-17<\/td>\nz.exe<\/td>\nmse.zip<\/td>\nf.bat<\/td>\njoft<\/td>\nwin2k.wim<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-18<\/td>\nex.exe<\/td>\nplugin.cx<\/td>\nf.bat<\/td>\nZDW<\/td>\n_setup.ini<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-19<\/td>\nhf.exe<\/td>\nupdate.dat<\/td>\n<\/td>\nnamr<\/td>\nAvastFileRep.dll<\/td>\ndata.bin<\/td>\n<\/tr>\n
    MSI-20<\/td>\nex.exe<\/td>\ninstallers.msu<\/td>\nf.bat<\/td>\n000cehjkf<\/td>\nMSE.Engine.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-21<\/td>\nz.exe<\/td>\nmsi.zip<\/td>\nf.bat<\/td>\narima<\/td>\nic64.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n
    MSI-22<\/td>\nz.exe<\/td>\narchive00.x<\/td>\nf.bat<\/td>\n00Jmsjeh20<\/td>\nchrome_watcher.dll<\/td>\nbin.dat<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

    A multitude of payload hosts<\/h3>\n

    Besides tracking the files and processes that Dexphot uses to execute an attack, we have also been monitoring the domains used to host malicious payloads. The URLs used for hosting all follow a similar pattern. The domain address usually ends in a .info or .net TLD, while the file name for the actual payload consists of random characters, similar to the randomness previously seen being used to generate file names and scheduled tasks. Some examples from our research are shown in the table below.<\/p>\n

     <\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
    Scheduled task name<\/strong><\/td>\nDownload URL<\/strong><\/td>\n<\/tr>\n
    hboavboja<\/td>\nhttps:\/\/supe********709.info\/xoslqzu.pdi<\/td>\n<\/tr>\n
    {C0B15B19-AB02-0A10-259B-1789B8BD78D6}<\/td>\nhttps:\/\/fa*****r.com\/jz5jmdouv4js.uoe<\/td>\n<\/tr>\n
    ytiazuceqeif<\/td>\nhttps:\/\/supe********709.info\/spkfuvjwadou.bbo<\/td>\n<\/tr>\n
    beoxlwayou<\/td>\nhttps:\/\/rb*****.info\/xgvylniu.feo<\/td>\n<\/tr>\n
    {F1B4C720-5A8B-8E97-8949-696A113E8BA5}<\/td>\nhttps:\/\/emp*******winc.com\/f85kr64p1s5k.naj<\/td>\n<\/tr>\n
    gxcxhbvlkie<\/td>\nhttps:\/\/gu*****me.net\/ssitocdfsiu.pef<\/td>\n<\/tr>\n
    {BE7FFC87-6635-429F-9F2D-CD3FD0E6DA51}<\/td>\nhttps:\/\/sy*****.info\/pasuuy\/xqeilinooyesejou.oew<\/td>\n<\/tr>\n
    {0575F553-1277-FB0F-AF67-EB649EE04B39}<\/td>\nhttps:\/\/sumb*******on.info\/gbzycb.kiz<\/td>\n<\/tr>\n
    gposiiobhkwz<\/td>\nhttps:\/\/gu*****me.net\/uyuvmueie.hui<\/td>\n<\/tr>\n
    {EAABDEAC-2258-1340-6375-5D5C1B7CEA7F}<\/td>\nhttps:\/\/refr*******r711.info\/3WIfUntot.1Mb<\/td>\n<\/tr>\n
    zsayuuec<\/td>\nhttps:\/\/gu*****me.net\/dexaeuioiexpyva.dil<\/td>\n<\/tr>\n
    njibqhcq<\/td>\nhttps:\/\/supe********709.info\/aodoweuvmnamugu.fux<\/td>\n<\/tr>\n
    {22D36F35-F5C2-29D3-1CF1-C51AC19564A4}<\/td>\nhttps:\/\/pr*****.info\/ppaorpbafeualuwfx\/hix.ayk<\/td>\n<\/tr>\n
    qeubpmnu<\/td>\nhttps:\/\/gu*****me.net\/ddssaizauuaxvt.cup<\/td>\n<\/tr>\n
    adeuuelv<\/td>\nhttps:\/\/supe********709.info\/tpneevqlqziee.okn<\/td>\n<\/tr>\n
    {0B44027E-7514-5EC6-CE79-26EB87434AEF}<\/td>\nhttps:\/\/sy*****.info\/huauroxaxhlvyyhp\/xho.eqx<\/td>\n<\/tr>\n
    {5A29AFD9-63FD-9F5E-F249-5EC1F2238023}<\/td>\nhttps:\/\/refr*******r711rb.info\/s28ZXoDH4.78y<\/td>\n<\/tr>\n
    {C5C1D86D-44BB-8EAA-5CDC-26B37F92E411}<\/td>\nhttps:\/\/fa*****r.com\/rbvelfbflyvf.rws<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

    Many of the URLs listed were in use for an extended period. However, the MSI packages hosted at each URL are frequently changed or updated. In addition, every few days more domains are generated to host more payloads. After a few months of monitoring, we were able to identify around 200 unique Dexphot domains.<\/p>\n

    Conclusion: Dynamic, comprehensive protection against increasingly complex everyday threats<\/h3>\n

    Dexphot is not the type of attack that generates mainstream media attention; it\u2019s one of the countless malware campaigns that are active at any given time. Its goal is a very common one in cybercriminal circles \u2014 to install a coin miner that silently steals computer resources and generates revenue for the attackers \u2014 yet Dexphot exemplifies the level of complexity and rate of evolution of even everyday threats, intent on evading protections and motivated to fly under the radar for the prospect of profit.<\/p>\n

    To combat threats, several next-generation protection engines<\/a> in Microsoft Defender Advanced Threat Protection<\/a>\u2019s antivirus component detect and stop malicious techniques at multiple points along the attack chain. For Dexphot, machine learning-based detections in the cloud recognize and block the DLLs loaded by rundll32.exe<\/em>, stopping the attack chain in its early stages. Memory scans detect and terminate the loading of malicious code hidden by process hollowing \u2014 including the monitoring processes that attempt to update the malware code and re-infect the machine via PowerShell commands.<\/p>\n

    Behavioral blocking and containment capabilities<\/a> are especially effective in defeating Dexphot\u2019s fileless techniques, detection evasion, and persistence mechanisms, including the periodic and boot-time attempts to update the malware via scheduled tasks. As mentioned, given the complexity of the attack chain and of Dexphot\u2019s persistence methods, we released a remediation<\/a> solution that prevents re-infection by removing artifacts.<\/p>\n

    \"Microsoft<\/p>\n

    The detection, blocking, and remediation of Dexphot on endpoints are exposed in Microsoft Defender Security Center, where Microsoft Defender ATP<\/a>\u2019s rich capabilities like endpoint detection and response, automated investigation and remediation, and others enable security operations teams to investigate and remediate attacks in enterprise environments. With these capabilities, Microsoft Defender ATP provides comprehensive protection against Dexphot and the countless other complex and evolving threats that we face every day.<\/p>\n

     <\/p>\n

    Sample indicators of compromise (IoCs)<\/h3>\n

    Installer (SHA-256):
    \n72acaf9ff8a43c68416884a3fff3b23e749b4bb8fb39e16f9976643360ed391f<\/p>\n

    MSI files (SHA-256):
    \n22beffb61cbdc2e0c3eefaf068b498b63a193b239500dab25d03790c467379e3
    \n65eac7f9b67ff69cefed288f563b4d77917c94c410c6c6c4e4390db66305ca2a
    \nba9467e0d63ba65bf10650a3c8d36cd292b3f846983032a44a835e5966bc7e88<\/p>\n

    Loader DLLs\u00a0 (SHA-256):
    \n537d7fe3b426827e40bbdd1d127ddb59effe1e9b3c160804df8922f92e0b366e
    \n504cc403e0b83233f8d20c0c86b0611facc040b868964b4afbda3214a2c8e1c5
    \naa5c56fe01af091f07c56ac7cbd240948ea6482b6146e0d3848d450977dff152<\/p>\n

     <\/p>\n

     <\/p>\n

     <\/p>\n

    Hazel Kim<\/em><\/strong><\/p>\n

    Microsoft Defender ATP Research Team<\/em><\/p>\n

     <\/p>\n

     <\/p>\n


    \n

    Talk to us<\/h3>\n

    Questions, concerns, or insights on this story? Join discussions at the\u00a0Microsoft Defender ATP community<\/a>.<\/p>\n

    Read all Microsoft security intelligence blog posts<\/a>.<\/p>\n

    Follow us on Twitter @MsftSecIntel<\/strong><\/a>.<\/p>\n

     <\/p>\n","protected":false},"excerpt":{"rendered":"

    We discovered the polymoprhic threat Dexphot in October 2018. In the months that followed, we closely tracked the threat as attackers upgraded the malware, targeted new processes, and worked around defensive measures. One year\u2019s worth of intelligence helped us gain insight not only into the goals and motivations of Dexphot\u2019s authors, but of cybercriminals in general.<\/p>\n","protected":false},"author":68,"featured_media":90225,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[],"threat-intelligence":[3738],"tags":[3921],"coauthors":[1968],"class_list":["post-90212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-threat-intelligence","threat-intelligence-threat-actors","tag-living-off-the-land"],"yoast_head":"\nInsights from one year of tracking a polymorphic threat | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights from one year of tracking a polymorphic threat | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"We discovered the polymoprhic threat Dexphot in October 2018. In the months that followed, we closely tracked the threat as attackers upgraded the malware, targeted new processes, and worked around defensive measures. One year\u2019s worth of intelligence helped us gain insight not only into the goals and motivations of Dexphot\u2019s authors, but of cybercriminals in general.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-26T17:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-11T22:49:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-social-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Defender Security Research Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-social-2.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Defender Security Research Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/windows-defender-research\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Defender Security Research Team\"}],\"headline\":\"Insights from one year of tracking a polymorphic threat\",\"datePublished\":\"2019-11-26T17:00:56+00:00\",\"dateModified\":\"2023-09-11T22:49:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\"},\"wordCount\":2702,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg\",\"keywords\":[\"Living off the land\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\",\"name\":\"Insights from one year of tracking a polymorphic threat | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg\",\"datePublished\":\"2019-11-26T17:00:56+00:00\",\"dateModified\":\"2023-09-11T22:49:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg\",\"width\":440,\"height\":268},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights from one year of tracking a polymorphic threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insights from one year of tracking a polymorphic threat | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/","og_locale":"en_US","og_type":"article","og_title":"Insights from one year of tracking a polymorphic threat | Microsoft Security Blog","og_description":"We discovered the polymoprhic threat Dexphot in October 2018. In the months that followed, we closely tracked the threat as attackers upgraded the malware, targeted new processes, and worked around defensive measures. One year\u2019s worth of intelligence helped us gain insight not only into the goals and motivations of Dexphot\u2019s authors, but of cybercriminals in general.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-11-26T17:00:56+00:00","article_modified_time":"2023-09-11T22:49:59+00:00","og_image":[{"width":760,"height":380,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-social-2.png","type":"image\/png"}],"author":"Microsoft Defender Security Research Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-social-2.png","twitter_misc":{"Written by":"Microsoft Defender Security Research Team","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/windows-defender-research\/","@type":"Person","@name":"Microsoft Defender Security Research Team"}],"headline":"Insights from one year of tracking a polymorphic threat","datePublished":"2019-11-26T17:00:56+00:00","dateModified":"2023-09-11T22:49:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/"},"wordCount":2702,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg","keywords":["Living off the land"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/","name":"Insights from one year of tracking a polymorphic threat | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg","datePublished":"2019-11-26T17:00:56+00:00","dateModified":"2023-09-11T22:49:59+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/11\/dexphot-blog.jpg","width":440,"height":268},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/26\/insights-from-one-year-of-tracking-a-polymorphic-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Insights from one year of tracking a polymorphic threat"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90212"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90212"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90212\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90225"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90212"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90212"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90212"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=90212"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=90212"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}