Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Finding Minhook in a sideloading attack – and Sweden too

0
Medium
Published: Thu May 01 2025 (05/01/2025, 14:50:09 UTC)
Source: AlienVault OTX General

Description

A threat actor campaign observed in late 2023 and early 2024 targeted multiple regions, initially in the Far East and later Sweden, using DLL sideloading techniques combined with the Minhook library to intercept Windows API calls. The attackers leveraged compromised digital signatures, including an expired signature from a Korean game developer, to sign components and evade detection. The final payload deployed was Cobalt Strike, a known post-exploitation tool. Three distinct sideloading scenarios were identified: MiracastView, PrintDialog, and SystemSettings. The clean loader used in the attack was sourced from infected systems rather than bundled with the sideloading package, complicating detection. Indicators include multiple file hashes and suspicious domains. This campaign demonstrates sophisticated use of API hooking and sideloading to maintain persistence and evade security controls, posing a medium severity risk to affected organizations, especially in Sweden.

AI-Powered Analysis

AILast updated: 12/10/2025, 16:22:40 UTC

Technical Analysis

This threat campaign employs DLL sideloading, a technique where malicious DLLs are placed alongside legitimate executables to be loaded by the system, thereby bypassing standard security controls. The attackers utilize the Minhook library, a popular API hooking framework, to detour Windows API calls, enabling them to manipulate system behavior stealthily. The campaign was first observed targeting the Far East and later shifted focus to Sweden, indicating possible strategic targeting or expansion. Components used in the attack are signed with compromised digital certificates, including an expired signature from a Korean game developer, which helps evade signature-based detection mechanisms. The clean loader, responsible for loading malicious payloads, is not included in the sideloading package but is instead harvested from already infected systems, increasing operational complexity and stealth. Three sideloading scenarios—MiracastView, PrintDialog, and SystemSettings—were identified, each exploiting different legitimate Windows executables to load malicious DLLs. The final payload is Cobalt Strike, a widely used penetration testing and post-exploitation tool that enables attackers to maintain persistence, move laterally, and exfiltrate data. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1573.001 (Encrypted Channel), T1553.002 (Code Signing), T1140 (Deobfuscate/Decode Files or Information), T1036 (Masquerading), T1055 (Process Injection), T1218 (Signed Binary Proxy Execution), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol), and T1574.002 (DLL Side-Loading). Indicators of compromise include numerous file hashes and suspicious domains, which can be used for detection and response. No known exploits in the wild have been reported, but the sophistication and use of trusted signatures increase the risk of successful compromise.

Potential Impact

For European organizations, particularly those in Sweden, this threat poses a significant risk due to its stealthy nature and use of trusted digital signatures, which can bypass traditional security controls such as antivirus and endpoint detection systems. The deployment of Cobalt Strike as the final payload enables attackers to conduct extensive post-exploitation activities, including lateral movement, credential theft, and data exfiltration, potentially leading to severe confidentiality breaches and operational disruptions. The use of DLL sideloading and API hooking complicates detection and mitigation efforts, increasing the likelihood of prolonged undetected presence within networks. Organizations in critical infrastructure, government, and industries with high-value intellectual property or sensitive data are especially vulnerable. The campaign's shift to Sweden suggests targeted interest, possibly linked to geopolitical or economic factors, increasing the threat relevance to Swedish entities and their partners. The absence of a patch or direct exploit mitigations means that detection and response capabilities are crucial to limit impact.

Mitigation Recommendations

1. Implement strict application whitelisting policies that verify the integrity and origin of executables and DLLs, including monitoring for unexpected DLL loads alongside legitimate binaries like MiracastView, PrintDialog, and SystemSettings. 2. Enforce robust digital signature validation policies, including revocation checks and scrutiny of expired or suspicious certificates, to detect and block components signed with compromised or expired certificates. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting API hooking and unusual process behaviors indicative of Minhook usage and DLL sideloading. 4. Monitor network traffic for Cobalt Strike command and control patterns, including encrypted channels and anomalous application layer protocols, using threat intelligence feeds and behavioral analytics. 5. Conduct regular threat hunting exercises focusing on the identified indicators of compromise (file hashes and domains) and the specific sideloading scenarios to identify potential infections early. 6. Educate users about the risks of executing untrusted software and implement controls to limit user execution privileges, reducing the risk of initial infection via user execution (T1204.002). 7. Maintain an updated inventory of software and digital certificates in use to quickly identify anomalies or unauthorized changes. 8. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about evolving tactics and indicators related to this campaign.

Affected Countries

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://news.sophos.com/en-us/2025/04/29/finding-minhook-in-a-sideloading-attack-and-sweden-too"]
Adversary
null
Pulse Id
68138a216574269c2912f720
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash370ff523e530887fdaeb537ee3764e9e
hash9ed71db2c29203e785fa532a6261e416
hash4b3b1ca685b6998b4d1f78a926173ff7284fa387
hash77e9aa544efce588b70b2f7841e80d77ea773cb3
hash3f4cac516b8f2ccb6f10042100369c018d8671972fad360977fe522fd47e06c6
hash402be231f1c9258bb1510962b15c3ea5410e54f97e3269cd6cd4c355822798d1
hash47f60c25ab5bb07dc3f65694302991a0796a29021b570a2335acda8196dd2b52
hash7b952d83286157163b655917188b2eaf92a50fe3058922810d47b25eaf6eb9fc
hash880dea11f75380e300bfd5c8054a655eacb2aa0da2c0d89fef3c32666df9a533
hashb72daf654fc83cd6ccccedbf57a102b48af42f410dbc48f69ec5c8c62545dc18
hashbc56676f0da4b0fba57aaa51d390732e40ef713909e5a70bb30264b724a65921
hashbddd6adaee8ab13eabaa7c73c97718cee1437db2054ca713ec7cc86e8002a300
hashdb7349a2cf678d5ddbbeb989f0893a146ae536c9169c3940c6caac9cafb3de62
hashf87cb46cac1fa44c9f1430123fb23e179e3d653a0e4094e0c133fa48a924924f
hashfd93d7a9f884e0b63106e669a10b8faeaaafda49fac05a66d8581c9e9aa31ad3

Domain

ValueDescriptionCopy
domainbostik.cmsnet.se
domainnote.dnsrd.com
domainnote.googlestaic.com
domainprdelb.dubya.net

Threat ID: 69399ca086adcdec9b1a61b5

Added to database: 12/10/2025, 4:15:28 PM

Last enriched: 12/10/2025, 4:22:40 PM

Last updated: 12/11/2025, 7:49:42 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats