The Curious Case of QUEENCREEK

Software that runs automatically can be a blessing or a curse. Malware loves to hide in the shadows of legitimate automated executables, waiting for their chance to wreak havoc. Sysinternals Autoruns allows users to explore and clean up suspicious entries that may be hiding malware. However, even verified, digitally signed binaries can be used by malware developers to execute malicious actions. This is exemplified by the case of QUEENCRACK, a seemingly innocent executable that actually belongs to the Intel PROSet/Wireless WiFi Software. The convoluted chain of events triggered by QUEENCRACK mimics techniques commonly employed by malware, highlighting the importance of vigilance and caution when dealing with automated software.

https://mobeigi.com/blog/security/malware/the-curious-case-of-queencreek/

To top