• Fileless malware is malware that does not store its body directly onto a disk. This type of malware became more popular in 2017 because of the increasing complexity of its detection and remediation. Although such techniques were limited to targeted attacks in recent years, today they proliferate more and more in the current threat landscape, and Kaspersky Lab registers new families of trojan-clickers or even adware with fileless components.

    The following fileless techniques are broadly used in attacks:

    • Malicious script stored in Windows Management Instrumentation subscription (WMI)
    • Malicious script directly passed as command line parameter to PowerShell
    • Malicious script stored in registry and/or OS scheduler task, and executed by OS scheduler
    • Malicious executable extracted and executed directly in memory without saving on disk via .Net reflection technique
    • And others

    Threat actors deliver fileless payloads to a victim’s machine via the following methods:

    1. Vulnerability exploitation
    2. Malicious document with macros
    3. Simple executable file

    The following are examples of how legitimate applications are used to execute malicious scripts which are not stored on a disk. These techniques used for their persistence approach, become a true challenge for security solutions.


    Executing malicious script with the help of mshta application


    Using rundll32 application to execute malicious javascript script


    Example of malicious WMI subscription

    As part of its multi-layered, next generation protection, Kaspersky Lab offers several components that help to detect and protect from fileless threats:

    • Threat Behavior Engine, contains components of
      1. Behavior detection
      2. Remediation Engine
      3. Exploit Prevention (EP) to prevent on stage of exploitation
    • Engine for scanning critical areas (including tasks in OS Scheduler, Windows Management Instrumentation subscriptions (WMI), registry, etc.


    • Behavioral analysis allows efficient detection of fileless threats on execution stage. Behavior-based heuristics are analyzing execution patterns of any process in the system (including legitimate utilities) to detect attempts to perform malicious actions.

      Among other examples of such heuristics is the analysis of command line parameters of executed process and the context of execution:

      • The parent process of executed application (office application, script host, etc)
      • What activity was on system prior to execution
      • Were there any probable suspicious activity on the system (strange network activity, application crash, strange URL request, etc)
      It is also helpful to take advantage of technologies embedded into OS Windows, such as Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI) used in role of event sources.

Related Products

Operation Daybreak

Read more

Fileless attacks against enterprise networks

Read more

US 7472420 B1

Method and system for detection of previously unknown malware components

Read more

US 8042186 B1

System and method for detection of complex malware

Read more

US 8566943 B2

Asynchronous processing of events for malware detection

Read more

Related Technologies

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Accept and Close