2 less known tricks of spoofing extensions on Windows

Well-known tricks#

Malware often tries to hide itself from being an obvious executable.

Windows malwares may:

  • have crafted icons that are pretending to be real document files.
  • use double extensions such as .pdf.exe or .doc.exe, this is effective because by default Windows hides the extension so not aware users wouldn't notice this an an executable as they are only seeing .pdf or .doc.
  • use lesser known extensions of executable format like .scr.
  • put white spaces between a false and the true extension in order to hide the true extension in the file explorer, ex: file.pdf [100_white_spaces_here] .exe. APT1 used about 100 white spaces to trick the user in some spear phishing campaigns.

PIF extension#

This trick is very effective because it hides the real extension even if the extension hiding feature is disabled. The .pif extension is hidden and the original icon too but the file is still executable.

PIF means Program Information file, historically it was used for DOS program and is not used today because there is no more DOS applications. But Creating a PIF file for a DOS-based program creates a shortcut to the program executable and all the settings saved in the PIF are contained in the shortcut.

This trick was used in 2016 by a Petya/Mischa campaign in Poland.

RTLO trick#

RTLO (Right To Left Override) trick uses the fact that some languages are being written from right side towards left but not the majority of countries. In order to support such languages, a Unicode character (U+202e) is used to do the switch between those two modes. It can be use maliciously, in order to displace the displayed extensions.

You can use this site to see how it works.

file.exe (unicode text) = \u0066\u0069\u006c\u0065\u002e\u0065\u0078\u0065 (unicode)

Just add the \u202e reverse character before the dot and you get:

file‮.exe (unicode text) = \u0066\u0069\u006c\u0065\u202e\u002e\u0065\u0078\u0065 (unicode)

Now add the spoofed extension (e.g. txt works very well because its reverse is also txt):

file‮txt.exe (unicode text) = \u0066\u0069\u006c\u0065\u202e\u0074\u0078\u0074\u002e\u0065\u0078\u0065 (unicode)

We get a file.txt.exe that looks like fileexe.txt. To be even less suspicious APT1 used to name some files ending with annexe or some other name ending with exe, ex: document_annexe.txt, to hide the weird exe.

Some other tricks about visual spoofing can be found here.

Source: malwarebytes.com

Share