2024 MSC Malware Trend Report

2024 MSC Malware Trend Report

With the decrease in distribution of MS Office document-type malware, the distribution of malware in various formats such as LNK and CHM is on the rise. In the second quarter of this year, malware in the MSC (snap-ins/Management Saved Console) file format used in Microsoft Management Console (MMC) was identified. MSC files are in an XML-based format, and various tasks such as registering and executing script codes, command commands, or programs can be performed. The identified MSC file-type malware includes a type that exploits a vulnerability (CVE-2024-43572) in apds.dll and a type that executes a command line via MMC Console Taskpad.

 

The distribution status of MSC format malware confirmed until October 2024 is as follows.

※ The values in the graph range from 0 to 5. A higher value indicates a higher distribution of malware.

 


Figure 1. Distribution of malware in MSC format

 

The threat actor seems to be distributing malware in an unfamiliar format to allow users to execute the malware without suspicion. General users may find it difficult to guess the exact purpose and behavior of MSC files, and the fact that they can be easily executed with a double-click may lead to continued distribution.

 

  • Type 1

 

This type exploits a vulnerability (CVE-2024-43572) in apds.dll to execute a malicious payload. Since the icon of the file can be freely set, there have been multiple cases of distribution with icons of PDF or Word documents to disguise as a legitimate document.

The icon and file name of the distributed file are as follows.

 


Figure 2. Icon of the confirmed MSC file

File Name

Translated File Name

Japan’s Attempts to Strengthen Its Defense Capabilities and Revive Its Defense Industry
readme(解压密码).msc readme (Decryption Code).msc
民意信箱滿意度調查表.msc Feedback Mailbox Satisfaction Survey Form.msc
經濟部水利署第五河川分署水域污染詳細訊息.msc Details of the Water Pollution in the Economic and Natural Resource Bureau of the Ministry of Water Resources in the People’s Republic of China.msc

Table 1. Names of confirmed files

  • Type 2

 

This type executes command commands using the MMC’s Console Taskpad. Like Type 1, it also disguises itself with a document file or folder icon. The Kimsuky group has been identified as distributing this malware to South Korean users, and it has the characteristic of executing bait documents during its operation.

The following are the icons, execution screens, and file names of the distributed files.


Figure 3. Icon of the confirmed MSC file


Figure 4. Screen of executing the MSC file

File name

[DOS] Jess Taylor’s Piece.msc
[DOS] Secure Document-Jess.msc
[WSJ] Interview Memo with Dr. Kyung*** Lee(202409).msc
North Korea’s New Suicide Drone.msc
0808-DWnews.msc
240422 264-24 SOLO airfield surveys.msc
240801_Narang_Conversation_Secretary.msc

Table 2. Confirmed File Names

 

MD5

026a6ed068b12ea1447ca20d4f82452f
032fd60659a82b9b0fefe1eb1728259d
06745253f1daec97554abab0b5ac6568
0efa89b5a10d42c3c4ca2620f28ea770
14d4bc28f58affbb03b0afd2d756c716