CYFIRMA identified a multi-stage intrusion that used a weaponized PowerShell payload disguised as sysupdate.jpeg to deploy a trojanized ConnectWise ScreenConnect instance for covert remote access. The campaign relied on AMSI bypass, on-host .NET compilation, a fileless UAC bypass, and encrypted command-and-control through legitserver.theworkpc[.]com and 45.138.16[.]64. #ConnectWiseScreenConnect #ComputerDefaults.exe #legitserver.theworkpc.com #sysupdate.jpeg #OneDriveServers
Keypoints
- CYFIRMA analyzed a stealth-focused intrusion chain built around a malicious PowerShell loader disguised as a JPEG file named sysupdate.jpeg.
- The attack deployed a trojanized ConnectWise ScreenConnect framework to provide persistent covert remote access inside the victim environment.
- The malware abused Microsoft LOLBins including csc.exe, cvtres.exe, and ComputerDefaults.exe to compile payloads and bypass UAC.
- A registry-based ms-settings hijack enabled fileless privilege escalation without showing a visible UAC prompt.
- The payload established persistence through a malicious Windows service masquerading as OneDriveServers and used encrypted C2 communications.
- Static analysis showed support for credential interception, hidden desktop interaction, surveillance, remote command execution, and SYSTEM-level operations.
- The threat used extensive obfuscation, anti-analysis measures, and signed binary abuse to reduce detection and forensic visibility.
MITRE Techniques
- [T1566.001] Phishing: Spearphishing Attachment â The infection likely began through deceptive delivery of the weaponized file via phishing emails or malicious attachments (âphishing emails, malicious attachmentsâ).
- [T1204.002] User Execution: Malicious File â The victim was tricked into executing a spoofed image file masquerading as harmless content (âa malicious file named sysupdate.jpegâ).
- [T1059.001] Command and Scripting Interpreter: PowerShell â PowerShell was the primary loader and execution mechanism for staging, downloading, and running payloads (âPowerShell payload disguised as a legitimate JPEG image fileâ).
- [T1136.001] Create Account: Local Account â The framework supported hidden local account creation and management (âfull lifecycle management of local Windows user accountsâ).
- [T1543.003] Create or Modify System Process: Windows Service â Persistence was established by creating a service masquerading as OneDriveServers (âpersistent service masquerading as OneDriveServersâ).
- [T1548.002] Abuse Elevation Control Mechanism: Bypass User Account Control â The malware abused ComputerDefaults.exe and an ms-settings registry hijack to gain elevated execution (âperform a fileless UAC bypassâ).
- [T1134.001] Access Token Manipulation: Token Impersonation/Theft â The framework included token manipulation and privilege handling capabilities (âDuplicateToken()â, âImpersonateLoggedOnUser()â).
- [T1036.005] Masquerading: Match Legitimate Name or Location â It hid under legitimate-looking paths and names such as C:Systems and OneDriveServers (âC:Systems mimics legitimate Windows paths; OneDriveServer mimics Microsoft OneDriveâ).
- [T1036.008] Masquerading: Masquerade File Type â The malware disguised a script as a JPEG image to mislead users (ârenaming malicious .ps1 payloads to .jpeg extensionsâ).
- [T1027] Obfuscated Files or Information â The loader used string reconstruction and runtime manipulation to hide malicious logic (âstring concatenation and replacement operationsâ).
- [T1027.010] Obfuscated Files or Information: Command Obfuscation â The PowerShell commands were fragmented and rebuilt at runtime to evade detection (âfragmented string reconstruction and runtime replacement logicâ).
- [T1027.004] Obfuscated Files or Information: Compile After Delivery â The attacker compiled a launcher on the victim machine using csc.exe (âdynamically compile a malicious launcher binary directly on the victim systemâ).
- [T1553.002] Subvert Trust Controls: Code Signing â The threat abused legitimately signed ConnectWise binaries to blend in (âabused legitimately signed ConnectWise binariesâ).
- [T1562.001] Impair Defenses: Disable or Modify Tools â AMSI bypass logic was used to reduce inspection (âdesigned to bypass the Windows Anti-Malware Scan Interface (AMSI)â).
- [T1070.004] Indicator Removal on Host: File Deletion â The malware deleted artifacts and self-removed registry keys to reduce traces (âregistry keys self-removedâ).
- [T1112] Modify Registry â The malicious ms-settings handler was created in the registry to enable UAC bypass (âcreates a malicious ms-settings protocol handler inside the registryâ).
- [T1564.001] Hide Artifacts: Hidden Files and Directories â The campaign used hidden staging directories and concealed accounts (âhidden staging inside C:Systemsâ).
- [T1218] System Binary Proxy Execution â Legitimate binaries such as ComputerDefaults.exe and csc.exe were abused to execute malicious code (âabuse of ComputerDefaults.exe, csc.exe, and trusted Windows binariesâ).
- [T1497] Virtualization/Sandbox Evasion â Delayed execution and anti-analysis behavior were used to avoid automated detection (âwaits approximately two seconds after executionâ).
- [T1056.001] Input Capture: Keylogging â The framework included keyboard hook-based input capture (âLowLevelKeyboardHooker leveraging SetWindowsHookEx()â).
- [T1555] Credentials from Password Stores â Credential storage and handling used DPAPI-protected secrets (âDPAPI-protected credential storageâ).
- [T1056] Input Capture â The malware intercepted credentials through the Windows logon flow (âcredential interception frameworkâ).
- [T1113] Screen Capture â Screen capture functionality was built into the malware (âCaptureScreen(), RecordScreen(), and GetDIBits()â).
- [T1123] Audio Capture â The framework supported microphone monitoring (âCaptureMicrophoneSound()â).
- [T1115] Clipboard Data â Clipboard interception was supported for collection (âclipboard interception and keystroke injection operationsâ).
- [T1518.001] Software Discovery: Security Software Discovery â The malware enumerated antivirus products via WMI (âenumerate installed antivirus solutionsâ).
- [T1082] System Information Discovery â It profiled hardware, OS, and telemetry details from victims (âextensive victim profiling and hardware telemetry collectionâ).
- [T1087] Account Discovery â The malware collected user and session context information (âenumeration of active sessions and user account contextsâ).
- [T1047] Windows Management Instrumentation â WMI was used to query security products and environment details (ârootSecurityCenter2 namespaceâ).
- [T1127.001] Trusted Developer Utilities Proxy Execution â The attacker used csc.exe and related developer tools to compile payloads (âabuse of csc.exe and developer utilitiesâ).
- [T1071.001] Application Layer Protocol: Web Protocols â Encrypted network communications were used for C2 transport (âencrypted communicationâ).
- [T1105] Ingress Tool Transfer â Additional payloads were downloaded from attacker infrastructure (âDownload of OneDriveServer.zipâ).
- [T1219] Remote Access Software â The campaign weaponized ConnectWise ScreenConnect for remote access (âweaponization of ConnectWise ScreenConnectâ).
- [T1573] Encrypted Channel â PBKDF2/HMAC-SHA256 was used to secure bidirectional C2 traffic (âencrypted bidirectional command-and-controlâ).
- [T1041] Exfiltration Over C2 Channel â File transfer and data movement occurred over the C2 channel (âFile transfer through VirtualStreamSender and VirtualStreamReceiverâ).
- [T1021] Remote Services â The attacker executed remote commands and sessions through the RMM framework (âRemote process execution and session token abuseâ).
- [T1529] System Shutdown/Reboot â The malware could force reboots into Safe Mode (âRemote reboot functionality including Safe Mode restart operationsâ).
Indicators of Compromise
- [IP Address] attacker-controlled C2 infrastructure and host mapping â 45.138.16[.]64
- [Domain/Sub-domain] remote ScreenConnect infrastructure used for encrypted sessions â legitserver.theworkpc[.]com
- [SHA256] malicious payload hashes identified for blocking â 7adffc1c0b3fdcba46e8d0a81203c955976d4ef39893c98d0b2dbfbb8d6a8ec3, ecd5ed16975d556d1d17bc980f248f8a5262bed11df9d9cf999efd9c273c11df
- [SHA256] additional malicious payload hashes identified for blocking â cea1d85967d2c456fccecae3a70ff2adfe4c113aacf9d18c35906c2ed24ca9b4, e4c9f3bb4a65c640795bfc1a56c0b56485b849ccd97027eed7ad9aa78a732a4f
- [SHA256] additional malicious payload hashes identified for blocking â ee3d776cdaf82335e4293e19ee313cc35eee49cde9963b96766a8f9c89d44a79, 4d8ac85c5b98c69ba44146df61183e9bf613edd796aa516c3ae73611b7d77c06
- [File/Script Name] weaponized loader and compiled launcher artifacts â sysupdate.jpeg, uds.exe
- [File/Archive Name] staged payload and service-related components referenced during execution â OneDriveServer.zip, OneDriveServers
- [File/Script Path] staging and execution directories used by the intrusion â C:Systems, C:WindowsSystemTempScreenConnect
- [Windows Binary Names] abused LOLBins and legitimate executables used for staging, bypass, and compilation â ComputerDefaults.exe, csc.exe, cvtres.exe
Read more: https://www.cyfirma.com/research/operation-silentcanvas-jpeg-based-multistage-powershell-intrusion/