December 25, 2025
A deep technical guide to fileless malware, memory-based attacks, and modern detection strategies.
Mohammed Khalil

Introduction: Fileless malware aka memory based or zero footprint malware refers to threats that execute without dropping a visible file on the hard drive. Instead of installing a malicious EXE, the attack injects code into memory or leverages trusted system processes PowerShell, WMI, Regsvr32, etc. to run its payload. This approach means there is no new file for AV scanners to detect it may only live in RAM or in entries like the Windows Registry. For example, one analyst describes fileless attacks as injecting malicious code directly in memory or a medium which allows the malicious code to execute without touching the disk, leaving minimal or no artifacts on the hard drive.
Fileless malware is especially relevant today because modern attackers increasingly favor stealthy, fileless techniques in spearphishing, advanced persistent threats APTs, and ransomware campaigns. These attacks often start with everyday tools a PowerShell command from a phishing email or a compromised website that silently run malicious code. Once inside, attackers use fileless methods like loading code from registry keys or using signed system binaries to avoid detection. This tactic is common on enterprise endpoints and networks, where patch gaps or misconfigurations can expose living off the land vectors. As a result, fileless malware is a core concern for defenders: it underpins sophisticated intrusion chains and makes traditional defenses less effective.
Fileless attacks follow a multi stage process similar to other intrusions but replace disk based payloads within memory or legitimate tool execution. A typical chain might look like this:
Throughout this flow, the key is that the malicious code lives in volatile locations or trusted processes. The Securonix Threat Lab showed how an advanced backdoor subtly named SUBTLE#PAWS worked: it dumped large chunks of obfuscated PowerShell into HKCU\System registry keys, then used Get ItemProperty and Invoke Expression to execute them in memory. In effect, even though functions were stored persistently, the execution never touched disk the code went straight from the registry into RAM.
Similarly, another fileless technique is memory injection. As Qualys documented, an HTA/VBScript can download a PowerShell payload which reconstructs shellcode and uses Win32 APIs VirtualAlloc, CallWindowProc, etc. to execute a RAT in memory. In their Remcos RAT case, the 24.ps1 script simply assembled two Base64 blobs into memory and ran them without any EXE dropped on disk. The diagram below Figure illustrates this attack flow: a malicious .lnk launches mshta which downloads 24.ps1, and that PowerShell script itself allocates memory and executes the Remcos payload directly.
Figure: Example of a fileless Remcos RAT attack via malicious LNK→HTA→PowerShell. The loader script 24.ps1 reconstructs and runs the RAT entirely in memory, with no file written to disk.
Beyond scripts and registry tricks, fileless malware can also use legitimate living off the land binaries. For example, attackers might call Windows’ rundll32.exe, wmic.exe, or certutil.exe with special parameters to download or execute remote code. In one threat report, Storm 0249 used just curl.exe Windows 10+ built in to fetch a PowerShell loader from a spoofed Microsoft URL, then ran it with no user visible output. In another step, the group used reg.exe and findstr.exe to harvest the machine’s GUID but because those commands ran under a trusted SentinelOne process, most security tools simply don’t question them.
Fileless techniques have been observed across many recent attacks. Below are notable examples 2024–2025 illustrating how adversaries use fileless malware:
These examples show that fileless malware is not just a theoretical trick it is actively used by ransomware gangs and APT actors alike. In each case, the malware resided in memory or trusted storage like registry keys, not as a standalone EXE. Defenders must therefore focus on detecting behaviors and telemetry around these steps, not just scanning for malicious files.
Fileless malware is critically important because it undercuts many standard security measures. Traditional antivirus and endpoint protection rely on identifying malicious files, but fileless attacks leave minimal or no artifacts for such tools. As Securonix explains, executing code straight from memory or registry allows modern malware to sidestep traditional detection methods. In practice, this means many fileless incidents go unnoticed until after data is stolen or systems are encrypted.
For organizations, this invisibility poses severe risks. Fileless attacks can lay dormant inside networks, using legitimate tools as cover. By blending into normal processes or Windows signed binaries, they evade signatures and whitelists. One analysis noted that when attackers ran reg.exe and findstr.exe under a trusted security process, the activity is unlikely to raise any red flags. This stealth buys attackers time to move laterally, harvest credentials, or stage ransomware without triggering alarms.
Operationally, fileless malware complicates incident response. With no dropped file to analyze, forensic recovery is harder. Investigators must rely on memory dumps and log analysis. For example, an IR team might need to search process memory or registry snapshots for injected shellcode. If memory is cleared e.g. system reboot or logging was not enabled, evidence may vanish.
The business impact can be high. Successful fileless breaches have enabled massive exfiltration or ransomware deployment without immediate detection, leading to extended outages and costly remediation. In some statistics, memory only attacks have been found to succeed far more often than file based ones though those are older Ponemon figures. What matters today is that as one expert put it, fileless attacks are 10 times more likely to succeed because they slip past endpoint defenses. In short, fileless malware demands that security teams adopt advanced detection behavioral analysis, memory forensics and assume that any system may already be compromised unless proven otherwise.
Attackers favor fileless techniques for their stealth and versatility. Why it’s effective: By using legitimate system tools, a fileless attack piggybacks on trusted functionality. Security products that allow PowerShell, WMI, or signed binaries to run normally give attackers free rein. For example, Storm 0249’s use of curl.exe under a signed process illustrates this: the adversary executed malicious steps in an environment the endpoint defense assumed was safe. This living off the land strategy means the malicious activity blends into routine operations, making it extremely hard to distinguish.
Abuse scenarios: Fileless methods are often part of multifaceted intrusion chains. An attacker may start with phishing or a drive-by exploit to drop a small script, then use it to roll out more powerful in-memory implants across the domain. Ransomware groups have also embraced fileless techniques for instance, embedding their payload in a macro and calling PowerShell so that no executable is ever written to disk. In a sense, any dual use admin tool becomes a weapon. Even Windows Event Viewer or Task Scheduler can be misused to reload malicious code from the registry or a hidden service.
Detection difficulty: Since fileless malware leaves little for signature scanning, defenders must look for anomalies. Securonix warns that such tactics are increasingly relevant and rely on manipulating trusted processes, so by the time conventional defenses notice something is wrong, the attacker may have already extracted data or encrypted systems. In short, attackers abuse fileless techniques to bypass whitelists and AV, and they do it by executing all steps in memory or via native functionality.
Detecting fileless attacks hinges on monitoring behavior and telemetry, since traditional file based indicators may be absent. Key sources include endpoint logs and audit data:
Common blind spots: Fileless attacks thrive when logging is not comprehensive. For example, if PowerShell logging is disabled, or if Sysmon/EDR is not installed on a host, the fileless steps may leave no record. Also, memory only payloads leave no forensic traces on disk, making post mortem analysis difficult. This underscores the need for proactive monitoring of Sysmon, PowerShell logs, EDR and threat hunting: teams should assume an attacker could already be on the network and look for unusual behavior patterns.
A defense in depth approach is required to block fileless malware:
In summary, there is no single silver bullet. Mitigating fileless threats requires layering controls script restriction, EDR, network policy and assuming attackers will try to hide in plain sight. Behavioral and architectural defenses are key, since signature scans alone will miss fileless techniques.
Fileless malware overlaps with several broader concepts:
Together, these concepts emphasize that combating fileless malware isn’t isolated, it ties into the overall defense strategy against stealthy, advanced threats.
Traditional malware typically involves installing a program or dropping a malicious file on disk. Fileless malware avoids this by executing in memory or using built in tools. For example, instead of running a bad .exe, it might execute a PowerShell script in memory. The result is fewer disk artifacts; security software that scans files will often miss it.
Common delivery methods include phishing attachments or compromised websites. For instance, an email might contain an Office document with a malicious macro that launches a PowerShell command. Or a malicious link might exploit a browser to run code in memory. Once the attacker has initial access, they often use native tools PowerShell, WMI, regsvr32, etc. to fetch and execute the payload directly in RAM.
You must rely on behavior and logs. Key indicators include unusual process activity e.g. powershell.exe launching from Word, or mshta.exe running unexpectedly and registry changes containing script code. Enabling Sysmon and PowerShell ScriptBlock logging is critical. For example, look for Sysmon Event ID 13 entries where the transactionstring contains Base64 or PowerShell commands. Also monitor PowerShell logs Event ID 4104 for encoded commands or abnormal cmdlet usage like Set ItemProperty with Invoke Expression. Any sign of scripting commands running without a file is suspicious. Network telemetry can help too a host making odd outbound connections after an internal exploit may indicate fileless C2.
If the malware truly lived only in volatile memory, a reboot would wipe it out and all RAM clears on shutdown. In fact, some sources note that since fileless code exists in RAM, a reboot halts the breach. However, attackers often establish persistence before reboot by writing a startup script or registry entry. For example, they might set a reg key under HKCU\Run or WMI subscription that re launches the payload after reboot. So a reboot may temporarily eject the attacker, but they can simply reinfect via the persistence mechanism. Full remediation requires disabling the persistence e.g. cleaning the registry or scheduled task and then rebooting.
LotL means using legitimate system utilities as malware launchers. It is a common technique in fileless attacks. For example, an attacker might use the signed binary regsvr32.exe with a malicious script or call powershell.exe to run an attack script. By doing this, the malicious action is hidden inside a trusted process. As one threat report noted, running reg.exe and findstr.exe under a legitimate SentinelOne process meant the actions are unlikely to raise any red flags. The LotL approach is essentially the core of many fileless schemes.
Attackers write to places like the Registry or create scheduled tasks instead of files. For instance, they might add a command in the Windows Run keys or use a Sticky Keys or Ease of Access backdoor trick to launch code at login. They could also install a WMI event subscription to re-trigger their code on certain events. In every case, something on disk registry entries or settings causes the in memory code to run, even though the main payload file itself never existed. Persistence is often achieved by abusing these legitimate startup mechanisms.
Signature based AV generally struggles with fileless threats, since there is no malicious file to hash or scan. Modern AV/EDR products rely on behavioral analysis or memory scanning to catch fileless attacks. For example, they may detect suspicious scripting activity or anomalous process injection. Ensuring endpoint protection has script monitoring and applying rules like Microsoft’s Attack Surface Reduction policies is important. In short, you need behavior based or managed detection, not just classic AV signatures.
Fileless malware is a stealthy category of attack that abuses native system tools and memory to run without touching disk. It is important because it circumvents many traditional defenses, making breaches harder to detect and investigate. Defenders should assume attackers will attempt fileless methods and therefore focus on behavioral indicators: enable advanced logging Sysmon, PowerShell, watch for anomalous script execution, and use EDR/Endpoint tools that scan memory or hook native APIs. Strict application controls blocking unnecessary scripting, least privilege policies, and threat hunting are key to mitigating fileless attacks. In short, combating fileless malware means shifting from file based defenses to monitoring what actions are happening in the system, so that even in memory exploits and payloads trigger alerts and can be stopped.
About the Author
Mohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today
Contact Us