A Sophisticated Malware Campaign Unveiled
A new and intricate malware operation has surfaced, capitalizing on counterfeit online speed test applications. These deceptive tools deploy obfuscated JavaScript payloads on Windows systems, posing a considerable cyber threat.
These nefarious applications present themselves as legitimate utilities for network speed evaluation, PDF manipulation, manual reading, and various search functionalities. By doing so, they lure unsuspecting users into installing perilous code that surreptitiously runs in the background.
The infiltration process initiates when users download what seems to be an authentic speed testing application from maliciously compromised domains, such as onlinespeedtestservice[.]com.
Following installation, the application provides the expected speed test features, cultivating an illusion of safety while it simultaneously activates a concealed Node.js runtime environment complemented by heavily obfuscated JavaScript files.
The functional executable helps maintain user trust, even as the malevolent components integrate themselves unnoticed into the system.
Security experts from Security Magic have pinpointed that these applications utilize Inno-Packer installers, which amalgamate genuinely useful functionalities with malicious elements—these include a portable Node runtime, scheduled task arrangements, and obfuscated JavaScript payloads irrelevant to the application’s fundamental operations.
The malware operates distinctively from the main executable, significantly enhancing the attack surface and granting threat actors enduring access to compromised systems.
The infection ensures persistence through scheduled tasks, executing the malicious JavaScript payload approximately every twelve hours.
This JavaScript component fosters encrypted connections with command and control servers, notably cloud.appusagestats.com, and is capable of executing arbitrary code delivered remotely.
Furthermore, the malware systematically gathers system information, including the Windows registry key HKLM\Software\Microsoft\Cryptography\MachineGuid, to relay machine identification data back to its operators.
Advanced Obfuscation Techniques and Execution Mechanisms
The malicious JavaScript payload employs sophisticated obfuscation methodologies, obscuring its genuine intent from security analysts.
Investigators have uncovered that the obfuscated code contains encoded strings, which can be deciphered by manipulating the return statement within the decode function.
Upon decoding, the JavaScript articulates its communication protocol with the command and control framework. The transmitted data is formatted in JSON, encompassing version details, system identifiers, and capability flags.

Network communication analyses indicate that the payload can receive and execute PowerShell commands, with instances of test executions yielding message boxes through Windows Forms assemblies.
The command execution framework harnesses Node.js child_process modules to instantiate system processes, facilitating arbitrary code execution under user privileges, all while maintaining stealth through hidden window configurations and no-profile PowerShell executions.
Source link: Cybersecuritynews.com.