Finding Minhook in a sideloading attack – and Sweden too
A threat actor campaign observed in late 2023 and early 2024 targeted multiple regions, initially in the Far East and later Sweden, using DLL sideloading techniques combined with the Minhook library to intercept Windows API calls. The attackers leveraged compromised digital signatures, including an expired signature from a Korean game developer, to sign components and evade detection. The final payload deployed was Cobalt Strike, a known post-exploitation tool. Three distinct sideloading scenarios were identified: MiracastView, PrintDialog, and SystemSettings. The clean loader used in the attack was sourced from infected systems rather than bundled with the sideloading package, complicating detection. Indicators include multiple file hashes and suspicious domains. This campaign demonstrates sophisticated use of API hooking and sideloading to maintain persistence and evade security controls, posing a medium severity risk to affected organizations, especially in Sweden.
AI Analysis
Technical Summary
This threat campaign employs DLL sideloading, a technique where malicious DLLs are placed alongside legitimate executables to be loaded by the system, thereby bypassing standard security controls. The attackers utilize the Minhook library, a popular API hooking framework, to detour Windows API calls, enabling them to manipulate system behavior stealthily. The campaign was first observed targeting the Far East and later shifted focus to Sweden, indicating possible strategic targeting or expansion. Components used in the attack are signed with compromised digital certificates, including an expired signature from a Korean game developer, which helps evade signature-based detection mechanisms. The clean loader, responsible for loading malicious payloads, is not included in the sideloading package but is instead harvested from already infected systems, increasing operational complexity and stealth. Three sideloading scenarios—MiracastView, PrintDialog, and SystemSettings—were identified, each exploiting different legitimate Windows executables to load malicious DLLs. The final payload is Cobalt Strike, a widely used penetration testing and post-exploitation tool that enables attackers to maintain persistence, move laterally, and exfiltrate data. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1573.001 (Encrypted Channel), T1553.002 (Code Signing), T1140 (Deobfuscate/Decode Files or Information), T1036 (Masquerading), T1055 (Process Injection), T1218 (Signed Binary Proxy Execution), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol), and T1574.002 (DLL Side-Loading). Indicators of compromise include numerous file hashes and suspicious domains, which can be used for detection and response. No known exploits in the wild have been reported, but the sophistication and use of trusted signatures increase the risk of successful compromise.
Potential Impact
For European organizations, particularly those in Sweden, this threat poses a significant risk due to its stealthy nature and use of trusted digital signatures, which can bypass traditional security controls such as antivirus and endpoint detection systems. The deployment of Cobalt Strike as the final payload enables attackers to conduct extensive post-exploitation activities, including lateral movement, credential theft, and data exfiltration, potentially leading to severe confidentiality breaches and operational disruptions. The use of DLL sideloading and API hooking complicates detection and mitigation efforts, increasing the likelihood of prolonged undetected presence within networks. Organizations in critical infrastructure, government, and industries with high-value intellectual property or sensitive data are especially vulnerable. The campaign's shift to Sweden suggests targeted interest, possibly linked to geopolitical or economic factors, increasing the threat relevance to Swedish entities and their partners. The absence of a patch or direct exploit mitigations means that detection and response capabilities are crucial to limit impact.
Mitigation Recommendations
1. Implement strict application whitelisting policies that verify the integrity and origin of executables and DLLs, including monitoring for unexpected DLL loads alongside legitimate binaries like MiracastView, PrintDialog, and SystemSettings. 2. Enforce robust digital signature validation policies, including revocation checks and scrutiny of expired or suspicious certificates, to detect and block components signed with compromised or expired certificates. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting API hooking and unusual process behaviors indicative of Minhook usage and DLL sideloading. 4. Monitor network traffic for Cobalt Strike command and control patterns, including encrypted channels and anomalous application layer protocols, using threat intelligence feeds and behavioral analytics. 5. Conduct regular threat hunting exercises focusing on the identified indicators of compromise (file hashes and domains) and the specific sideloading scenarios to identify potential infections early. 6. Educate users about the risks of executing untrusted software and implement controls to limit user execution privileges, reducing the risk of initial infection via user execution (T1204.002). 7. Maintain an updated inventory of software and digital certificates in use to quickly identify anomalies or unauthorized changes. 8. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about evolving tactics and indicators related to this campaign.
Affected Countries
Sweden
Indicators of Compromise
- hash: 370ff523e530887fdaeb537ee3764e9e
- hash: 9ed71db2c29203e785fa532a6261e416
- hash: 4b3b1ca685b6998b4d1f78a926173ff7284fa387
- hash: 77e9aa544efce588b70b2f7841e80d77ea773cb3
- hash: 3f4cac516b8f2ccb6f10042100369c018d8671972fad360977fe522fd47e06c6
- hash: 402be231f1c9258bb1510962b15c3ea5410e54f97e3269cd6cd4c355822798d1
- hash: 47f60c25ab5bb07dc3f65694302991a0796a29021b570a2335acda8196dd2b52
- hash: 7b952d83286157163b655917188b2eaf92a50fe3058922810d47b25eaf6eb9fc
- hash: 880dea11f75380e300bfd5c8054a655eacb2aa0da2c0d89fef3c32666df9a533
- hash: b72daf654fc83cd6ccccedbf57a102b48af42f410dbc48f69ec5c8c62545dc18
- hash: bc56676f0da4b0fba57aaa51d390732e40ef713909e5a70bb30264b724a65921
- hash: bddd6adaee8ab13eabaa7c73c97718cee1437db2054ca713ec7cc86e8002a300
- hash: db7349a2cf678d5ddbbeb989f0893a146ae536c9169c3940c6caac9cafb3de62
- hash: f87cb46cac1fa44c9f1430123fb23e179e3d653a0e4094e0c133fa48a924924f
- hash: fd93d7a9f884e0b63106e669a10b8faeaaafda49fac05a66d8581c9e9aa31ad3
- domain: bostik.cmsnet.se
- domain: note.dnsrd.com
- domain: note.googlestaic.com
- domain: prdelb.dubya.net
Finding Minhook in a sideloading attack – and Sweden too
Description
A threat actor campaign observed in late 2023 and early 2024 targeted multiple regions, initially in the Far East and later Sweden, using DLL sideloading techniques combined with the Minhook library to intercept Windows API calls. The attackers leveraged compromised digital signatures, including an expired signature from a Korean game developer, to sign components and evade detection. The final payload deployed was Cobalt Strike, a known post-exploitation tool. Three distinct sideloading scenarios were identified: MiracastView, PrintDialog, and SystemSettings. The clean loader used in the attack was sourced from infected systems rather than bundled with the sideloading package, complicating detection. Indicators include multiple file hashes and suspicious domains. This campaign demonstrates sophisticated use of API hooking and sideloading to maintain persistence and evade security controls, posing a medium severity risk to affected organizations, especially in Sweden.
AI-Powered Analysis
Technical Analysis
This threat campaign employs DLL sideloading, a technique where malicious DLLs are placed alongside legitimate executables to be loaded by the system, thereby bypassing standard security controls. The attackers utilize the Minhook library, a popular API hooking framework, to detour Windows API calls, enabling them to manipulate system behavior stealthily. The campaign was first observed targeting the Far East and later shifted focus to Sweden, indicating possible strategic targeting or expansion. Components used in the attack are signed with compromised digital certificates, including an expired signature from a Korean game developer, which helps evade signature-based detection mechanisms. The clean loader, responsible for loading malicious payloads, is not included in the sideloading package but is instead harvested from already infected systems, increasing operational complexity and stealth. Three sideloading scenarios—MiracastView, PrintDialog, and SystemSettings—were identified, each exploiting different legitimate Windows executables to load malicious DLLs. The final payload is Cobalt Strike, a widely used penetration testing and post-exploitation tool that enables attackers to maintain persistence, move laterally, and exfiltrate data. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1573.001 (Encrypted Channel), T1553.002 (Code Signing), T1140 (Deobfuscate/Decode Files or Information), T1036 (Masquerading), T1055 (Process Injection), T1218 (Signed Binary Proxy Execution), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol), and T1574.002 (DLL Side-Loading). Indicators of compromise include numerous file hashes and suspicious domains, which can be used for detection and response. No known exploits in the wild have been reported, but the sophistication and use of trusted signatures increase the risk of successful compromise.
Potential Impact
For European organizations, particularly those in Sweden, this threat poses a significant risk due to its stealthy nature and use of trusted digital signatures, which can bypass traditional security controls such as antivirus and endpoint detection systems. The deployment of Cobalt Strike as the final payload enables attackers to conduct extensive post-exploitation activities, including lateral movement, credential theft, and data exfiltration, potentially leading to severe confidentiality breaches and operational disruptions. The use of DLL sideloading and API hooking complicates detection and mitigation efforts, increasing the likelihood of prolonged undetected presence within networks. Organizations in critical infrastructure, government, and industries with high-value intellectual property or sensitive data are especially vulnerable. The campaign's shift to Sweden suggests targeted interest, possibly linked to geopolitical or economic factors, increasing the threat relevance to Swedish entities and their partners. The absence of a patch or direct exploit mitigations means that detection and response capabilities are crucial to limit impact.
Mitigation Recommendations
1. Implement strict application whitelisting policies that verify the integrity and origin of executables and DLLs, including monitoring for unexpected DLL loads alongside legitimate binaries like MiracastView, PrintDialog, and SystemSettings. 2. Enforce robust digital signature validation policies, including revocation checks and scrutiny of expired or suspicious certificates, to detect and block components signed with compromised or expired certificates. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting API hooking and unusual process behaviors indicative of Minhook usage and DLL sideloading. 4. Monitor network traffic for Cobalt Strike command and control patterns, including encrypted channels and anomalous application layer protocols, using threat intelligence feeds and behavioral analytics. 5. Conduct regular threat hunting exercises focusing on the identified indicators of compromise (file hashes and domains) and the specific sideloading scenarios to identify potential infections early. 6. Educate users about the risks of executing untrusted software and implement controls to limit user execution privileges, reducing the risk of initial infection via user execution (T1204.002). 7. Maintain an updated inventory of software and digital certificates in use to quickly identify anomalies or unauthorized changes. 8. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about evolving tactics and indicators related to this campaign.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://news.sophos.com/en-us/2025/04/29/finding-minhook-in-a-sideloading-attack-and-sweden-too"]
- Adversary
- null
- Pulse Id
- 68138a216574269c2912f720
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash370ff523e530887fdaeb537ee3764e9e | — | |
hash9ed71db2c29203e785fa532a6261e416 | — | |
hash4b3b1ca685b6998b4d1f78a926173ff7284fa387 | — | |
hash77e9aa544efce588b70b2f7841e80d77ea773cb3 | — | |
hash3f4cac516b8f2ccb6f10042100369c018d8671972fad360977fe522fd47e06c6 | — | |
hash402be231f1c9258bb1510962b15c3ea5410e54f97e3269cd6cd4c355822798d1 | — | |
hash47f60c25ab5bb07dc3f65694302991a0796a29021b570a2335acda8196dd2b52 | — | |
hash7b952d83286157163b655917188b2eaf92a50fe3058922810d47b25eaf6eb9fc | — | |
hash880dea11f75380e300bfd5c8054a655eacb2aa0da2c0d89fef3c32666df9a533 | — | |
hashb72daf654fc83cd6ccccedbf57a102b48af42f410dbc48f69ec5c8c62545dc18 | — | |
hashbc56676f0da4b0fba57aaa51d390732e40ef713909e5a70bb30264b724a65921 | — | |
hashbddd6adaee8ab13eabaa7c73c97718cee1437db2054ca713ec7cc86e8002a300 | — | |
hashdb7349a2cf678d5ddbbeb989f0893a146ae536c9169c3940c6caac9cafb3de62 | — | |
hashf87cb46cac1fa44c9f1430123fb23e179e3d653a0e4094e0c133fa48a924924f | — | |
hashfd93d7a9f884e0b63106e669a10b8faeaaafda49fac05a66d8581c9e9aa31ad3 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbostik.cmsnet.se | — | |
domainnote.dnsrd.com | — | |
domainnote.googlestaic.com | — | |
domainprdelb.dubya.net | — |
Threat ID: 69399ca086adcdec9b1a61b5
Added to database: 12/10/2025, 4:15:28 PM
Last enriched: 12/10/2025, 4:22:40 PM
Last updated: 12/11/2025, 7:49:42 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-10
MediumReact2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
MediumNorth Korean Hackers Deploy EtherRAT Malware in React2Shell Exploits
MediumAI-Poisoning & AMOS Stealer: How Trust Became the Biggest Mac Threat
MediumThe ChimeraWire trojan boosts website popularity by skillfully pretending to be human
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.