By using Windows Calculator, the QBot malware operators are able to side-load their malicious payload onto the computers that are compromised. In short, Windows Calculator is being used to distribute dangerous code.
A method of attack known as DLL side-loading is a form of attack that is frequently used in Windows in order to exploit the way Dynamic Link Libraries (DLLs) are regulated.
A spoof DLL is created by assuming the identity of a legitimate DLL, placing the false DLL in an operating system directory, and using the false DLL instead of the real one to load it.
QBot (aka Qakbot) is originally a banking trojan but evolved into a malware dropper as it evolved into a more persistent malware strain attacking Windows systems.
When ransomware gangs launch their attack, Cobalt Strike beacons are the first step in the attack, which is a process carried out by this malware.
Currently, the Windows 7 Calculator app has been being exploited by QBot in order to carry out DLL side-loading attacks since July 11. Malspam campaigns are still using this method in order to send spam.
A new infection chain of QBot has been reported by researchers at Cyble to assist defenders in protecting against this new threat.
The latest campaign used emails with the attachment of an HTML file in them. This HTML file attachment downloads a password-protected ZIP archive containing an ISO file that is attached to emails used in the latest campaign.
An HTML file included with the ZIP file contains a password that can be used to open the ZIP file. It is intended to evade detection by antivirus software by locking the archive.
There are several things included in the ISO, and here below we have mentioned them all:-
Upon mounting the ISO file, the user is only able to see the .LNK file that is in the ISO file. This malicious file was disguised to look like a PDF file or a Microsoft Edge browser document that contained important information.
In the properties dialog for the files, the shortcut points to Windows’ Calculator application. When you click the shortcut, a command prompt window will open and you will be prompted to run the Calc.exe file.
A legitimate WindowsCodecs DLL file is automatically searched for on the first launch and attempted to be loaded by Windows 7 Calculator when it is loaded.
Windows 10 Calc.exe and later no longer support the DLL side loading security flaw. That’s why the threat actors target the Windows 7 version. Here are the mitigations recommended by the security analysts:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…
ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…
Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…
Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…
Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…