3.4.3 How Attackers Use Shims

The following steps describe the manner in which an attacker may shim an application and install it on a victim system:

  • An attacker creates an application compatibility database (shim database) for the target application (such as notepad.exe, or any legitimate third-party application frequently used by the victim). An attacker can choose a single shim, such as InjectDllor multiple shims.
  • The attacker saves the shim database (.sdb file) created for the target application.
  • The .sdb file is delivered and dropped on the victim system (mostly via malware), and it is installed, typically using the sdbinst utility.
  • The attacker invokes the target application or waits for the user to execute the target application. ...

Get Learning Malware Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.