Google Threat Intelligence Group attributes a multistage intrusion to UNC6692 that used persistent social engineering via Microsoft Teams, a malicious phishing landing page, and staged downloads to deliver a modular SNOW malware ecosystem (SNOWBELT, SNOWGLAZE, SNOWBASIN) that enabled internal reconnaissance, credential theft, lateral movement, and exfiltration. The campaign abused trusted cloud services (AWS S3, CloudFront, Heroku) for C2 and payload hosting and relied on a malicious Chromium extension and AutoHotKey-based persistence to maintain long-term access. #UNC6692 #SNOWBELT
Keypoints
- UNC6692 conducted a Teams-based phishing campaign that directed victims to a convincing âMailbox Repairâ landing page which harvested credentials and staged malicious payloads from attacker-controlled AWS S3 buckets.
- The attackers delivered a renamed AutoHotKey binary and script which launched SNOWBELT (a malicious Chromium extension) and installed Scheduled Tasks and Startup-folder shortcuts for persistence.
- The SNOW ecosystem is modular: SNOWBELT (browser extension/backdoor), SNOWGLAZE (Python-based WebSocket tunneler and SOCKS proxy), and SNOWBASIN (Python local HTTP backdoor) that together enable remote command execution, file staging, and exfiltration.
- UNC6692 performed internal reconnaissance (port scans for 135/445/3389), used PsExec and RDP via the SNOWGLAZE tunnel for lateral movement, and extracted LSASS memory and AD artifacts (NTDS.dit, SAM, SYSTEM) which were exfiltrated via LimeWire.
- The campaign used robust anti-analysis and environment enforcement (URL/email parameter checks, forcing Edge via microsoft-edge: URI scheme, time-based DGA and AES-GCM protected manifests) to evade sandboxes and maintain covert C2 channels.
- Defenders are advised to monitor browser activity, unauthorized cloud uploads/downloads, extension installations, and outbound WebSocket/SOCKS-like traffic to detect similar living-off-the-cloud intrusions.
MITRE Techniques
- [T1566.002 ] Spearphishing Link â Delivered phishing link via Microsoft Teams to lure the user into the malicious landing page. (âthe attacker sent a phishing message via Microsoft Teams, posing as helpdesk personnelâ)
- [T1053 ] Scheduled Task/Job â Created scheduled tasks to launch headless Edge with the malicious extension and to monitor/restore SNOWBELT. (âtwo additional scheduled tasks were installedâ)
- [T1053.005 ] Scheduled Task â Used Windows Scheduled Task arguments to start Edge with âload-extension pointing to the SNOWBELT extension. (ââload-extension=âC:UsersAppDataLocalMicrosoftEdgeExtension DataSysEventsââ)
- [T1059 ] Command and Scripting Interpreter â Used multiple scripting interpreters (AutoHotKey, Python, cmd/powershell) for execution and orchestration. (âAutoHotKey execution was recorded immediately following the downloadsâ)
- [T1059.001 ] PowerShell â Executed commands using powershell.exe via SNOWBASIN to perform remote command execution. (âexecutes commands via cmd.exe or powershell.exeâ)
- [T1059.003 ] Windows Command Shell â Used cmd.exe for command execution and cleanup tasks. (âRun âcmd /c start ââ âC:Program Files (x86)MicrosoftEdgeApplicationmsedge.exeâ âŚâ)
- [T1059.006 ] Python â SNOWGLAZE and SNOWBASIN are Python-based tools used for tunneling and as a local HTTP backdoor. (âSNOWGLAZE is a Python-based tunnelerâ)
- [T1059.007 ] JavaScript â SNOWBELT is a JavaScript-based browser backdoor implemented as an extension. (âSNOWBELT is a JavaScript-based backdoor implemented as a Chromium browser extension.â)
- [T1059.010 ] AutoHotKey & AutoIT â Delivered and executed a renamed AutoHotKey binary and script to bootstrap persistence and extension installation. (âdownloaded a renamed AutoHotKey binary and an AutoHotkey scriptâ)
- [T1204.001 ] Malicious Link â The Teams message directed users to a malicious link that initiated the staged attack. (âprompted to click a link to install a local patchâ)
- [T1204.002 ] Malicious File â The landing page staged malicious files (RegSrvc.exe, Protected.ahk) for local execution. (âRegSrvc.exe AutoHotKey Executable: Masquerading as a âRegistration Service.ââ)
- [T1559 ] Inter-Process Communication â SNOWBELT used chrome.runtime.connectNative and custom protocol handlers to bridge privileged local functionality. (âuses chrome.runtime.connectNative to establish I/O pipes with local applicationsâ)
- [T1569.002 ] Service Execution â Launched Edge in a windowless/headless mode via scheduled tasks to execute the extension. (âstart ââ âC:Program Files (x86)MicrosoftEdgeApplicationmsedge.exeâ âuser-data-dir=⌠âheadless=new âload-extension=âŚâ)
- [T1176.001 ] Browser Extensions â Deployed SNOWBELT as a Chromium extension to gain persistent browser-level foothold. (âSNOWBELT serves as the initial foothold and the primary âeyesâ of the operationâ)
- [T1543 ] Create or Modify System Process â Created or modified system processes and tasks to maintain persistence and run headless browsers. (âa Scheduled Task was presentâ)
- [T1543.003 ] Windows Service â Used files masquerading as services (RegSrvc.exe) and service-like persistence mechanisms. (âRegSrvc.exe ⌠Masquerading as a âRegistration Service.ââ)
- [T1547.001 ] Registry Run Keys / Startup Folder â Added a shortcut to the Windows Startup folder to ensure AutoHotKey script runs at logon. (âa shortcut to an AutoHotKey script was added to the Windows Startup folderâ)
- [T1547.009 ] Shortcut Modification â Modified shortcuts for persistence and verification of SNOWBELT execution. (âa shortcut to an AutoHotKey script was added to the Windows Startup folder, which verified SNOWBELT was runningâ)
- [T1068 ] Exploitation for Privilege Escalation â Took actions to obtain elevated credentials and leverage them to access higher-privilege hosts. (âAfter gaining access to the backup server the threat actor utilized the local administrator accountâ)
- [T1027 ] Obfuscated Files or Information â Employed obfuscation and encoded communications to hinder analysis and detection. (âT1027: Obfuscated Files or Informationâ)
- [T1027.010 ] Command Obfuscation â Used obfuscated command flows within scripts and extension code. (ââcommand obfuscationââ)
- [T1027.015 ] Compression â Used compressed archives and packaged portable executables for staging. (âCompressionâ)
- [T1036.005 ] Match Legitimate Resource Name or Location â Masqueraded the extension and files under legitimate-sounding names like âMS Heartbeatâ or âSystem Heartbeat.â (âmasquerading under names like âMS Heartbeatâ or âSystem Heartbeatââ)
- [T1055 ] Process Injection â Employed techniques to run malicious functionality within or alongside legitimate processes (e.g., headless Edge cleaning and CoreUIComponents checks). (âtasklist /M CoreUIComponents.dll | findstr â%pââ)
- [T1070.004 ] File Deletion â Removed downloaded artifacts and caches via internal extension commands like delete_cache. (ââdelete_cacheâ===cmdTypeâ)
- [T1112 ] Modify Registry â Performed registry queries and potential modifications as part of discovery and persistence. (âQuery Registryâ)
- [T1134 ] Access Token Manipulation â Used credential tooling and pass-the-hash style techniques to impersonate elevated accounts. (âPass-The-Hash is a common technique used by threat actorsâ)
- [T1134.001 ] Token Impersonation/Theft â Leveraged stolen credentials and extracted memory to impersonate accounts. (âutilized the local administrator account to extract the systemâs LSASS process memoryâ)
- [T1140 ] Deobfuscate/Decode Files or Information â Decrypted manifests and C2 data (AES-GCM) to obtain configuration and commands. (âThe manifest retrieved from this registry is decrypted via AES-GCM using a key derived from SHA256â)
- [T1202 ] Indirect Command Execution â Relayed commands through SNOWBELT to SNOWBASIN which executed them locally. (âIt relays decrypted C2 commands ⌠to SNOWBASIN via HTTP POST requestsâ)
- [T1562.001 ] Disable or Modify Tools â Performed cleanup of non-conforming headless Edge processes to maintain malicious runtime. (âThe threat actor uses this command to essentially âclean upâ headless Edge processes that execute their malware.â)
- [T1564.001 ] Hidden Files and Directories â Hid components within browser extension directories and local AppData paths to avoid detection. (âC:UsersAppDataLocalMicrosoftEdgeExtension DataSysEventsbackground.jsâ)
- [T1622 ] Debugger Evasion â Used gatekeeper checks and sandbox evasion logic on the landing page to avoid automated analysis. (âgatekeeper script designed to ensure the payload is delivered only to intended targets while evading automated security sandboxes.â)
- [T1003.001 ] LSASS Memory â Extracted LSASS process memory from a backup server to obtain credentials. (âextract the systemâs LSASS process memory with Windows Task Manager.â)
- [T1003.002 ] Security Account Manager â Collected SAM registry hives via FTK Imager for credential extraction. (âFTK Imager wrote the ⌠Security Account Manager (SAM) , SYSTEM, and SECURITY registry hives to the Downloads folder.â)
- [T1003.003 ] NTDS â Extracted NTDS.dit from a Domain Controller using FTK Imager to harvest AD credentials. (âFTK Imager wrote the Active Directory database file (NTDS.dit) ⌠to the Downloads folder.â)
- [T1110.001 ] Password Guessing â Harvested user credentials via a deceptive credential prompt that intentionally rejects entries to capture repeated correct passwords. (âit is programmed to reject the first and second password attempt as incorrectâ)
- [T1110.003 ] Password Spraying â Conducted large email volume and likely multi-account engagement to create opportunity and potential credential misuse. (âconducted a large email campaign designed to overwhelm the target with messagesâ)
- [T1552.001 ] Credentials In Files â Uploaded harvested credentials and metadata to attacker-controlled S3 buckets. (âvalidated credentials and metadata are uploaded directly to an attacker-controlled Amazon S3 bucketâ)
- [T1007 ] System Service Discovery â Performed reconnaissance and service checks during internal discovery and lateral movement. (âinitial reconnaissance commands and the installation of SNOWBELTâ)
- [T1012 ] Query Registry â Queried registry and system configuration as part of discovery and persistence. (âQuery Registryâ)
- [T1016 ] System Network Configuration Discovery â Scanned the local network for open ports (135, 445, 3389) to identify lateral movement targets. (âusing a Python script to scan the local network for ports 135, 445, and 3389.â)
- [T1018 ] Remote System Discovery â Used network scanning and enumeration tools to find remote systems and services for lateral movement. (âscan the local network for ports 135, 445, and 3389â)
- [T1033 ] System Owner/User Discovery â Executed commands to enumerate users and local admin accounts for targeted credential collection. (âexecute commands to enumerate local administrator accounts.â)
- [T1046 ] Network Service Discovery â Conducted port scans to discover vulnerable or accessible services (RPC, SMB, RDP). (âscan the local network for ports 135, 445, and 3389â)
- [T1057 ] Process Discovery â Queried running processes and DLL mappings to identify and manage headless Edge instances. (âtasklist /M SHELL32.dll ^| findstr âmsedge.exeââ)
- [T1082 ] System Information Discovery â Collected host and system details during reconnaissance and staging. (âinitial reconnaissance commandsâ)
- [T1083 ] File and Directory Discovery â SNOWBASIN supports directory listings and file readings for data staging. (âIf a folder is provided, it returns a full directory listingâ)
- [T1087.001 ] Local Account â Enumerated local accounts and administrative users to identify escalation paths. (âenumerate local administrator accountsâ)
- [T1518 ] Software Discovery â Identified installed software and processes to inform exploitation and persistence choices. (âSoftware Discoveryâ)
- [T1021.001 ] Remote Desktop Protocol â Initiated an RDP session via the SNOWGLAZE tunnel to a backup server for further access. (âinitiated an RDP session via the SNOWGLAZE tunnel from the victim system to a backup server.â)
- [T1021.002 ] SMB/Windows Admin Shares â Enumerated authenticated SMB shares as a potential credential or data discovery vector. (âauthenticated Server Message Block (SMB) share enumerationâ)
- [T1005 ] Data from Local System â Collected files (NTDS.dit, SAM, SYSTEM, SECURITY) and staged them for exfiltration. (âFTK Imager wrote the Active Directory database file (NTDS.dit) ⌠The extracted files were then exfiltrated from the network via LimeWire.â)
- [T1074 ] Data Staged â Staged extracted artifacts in the Domain Administratorâs Downloads folder and via SNOWBASIN buffers for exfiltration. (âFTK Imager ⌠wrote ⌠to the Downloads folder.â)
- [T1113 ] Screen Capture â Captured screenshots of active sessions and targeted applications on Domain Controllers. (âEDR telemetry logged the threat actor performing screen captures on the Domain Controllersâ)
- [T1560 ] Archive Collected Data â Packaged artifacts for exfiltration (ZIP archives and archived tool outputs). (âdownloaded a ZIP archive containing a portable Python executable and required libraries.â)
- [T1560.001 ] Archive via Utility â Used utilities (FTK Imager) to create copies/archives of critical system/data artifacts. (âFTK Imager executed and mounted the local storage driveâ)
- [T1020 ] Automated Exfiltration â Automated exfiltration of staged artifacts via cloud and peer-to-peer channels (LimeWire). (âexfiltrated it via LimeWire.â)
- [T1567 ] Exfiltration Over Web Service â Uploaded stolen credentials and data to attacker-controlled cloud storage (S3). (âuploaded directly to an attacker-controlled Amazon S3 bucketâ)
- [T1567.002 ] Exfiltration to Cloud Storage â Specifically used AWS S3 buckets to receive stolen credentials and artifacts. (âservice-page-18968-2419-outlook.s3.us-west-2.amazonaws.comâ)
- [T1071.001 ] Web Protocols â Used WebSocket (wss) and HTTP(S) protocols for C2 and proxying. (âestablishes a WebSocket connection to a static C2 host using hard-coded credentials.â)
- [T1090 ] Proxy â SNOWGLAZE provided SOCKS proxy capability via WebSocket tunnels to proxy arbitrary TCP traffic. (âfacilitates SOCKS proxy operations, allowing arbitrary TCP traffic to be routed through the infected host.â)
- [T1105 ] Ingress Tool Transfer â Downloaded tools and payloads (AutoHotKey binary, portable Python, FTK Imager) from cloud-hosted locations. (âdownloaded a renamed AutoHotKey binary ⌠from a threat actor-controlled AWS S3 bucket.â)
- [T1572 ] Protocol Tunneling â Wrapped TCP traffic in JSON/Base64 over WebSockets to tunnel traffic through compromised hosts. (âmasks malicious traffic by wrapping data in JSON objects and Base64 encoding it for transfer via WebSockets.â)
- [T1489 ] Service Stop â Terminated non-conforming Edge processes and used taskkill to remove interfering instances. (âtaskkill /F /PID %pâ)
- [T1608.002 ] Upload Tool â Used cloud uploads (S3 PUT) to transfer harvested credentials and artifacts to the attackerâs infrastructure. (âThe validated credentials and metadata are uploaded directly to an attacker-controlled Amazon S3 bucketâ)
- [T1608.005 ] Link Target â Hosted phishing landing pages and staged payloads on attacker-controlled S3 URLs and CloudFront subdomains. (âhttps://service-page-25144-30466-outlook.s3.us-west-2.amazonaws.com/update.html?email=.comâ)
Indicators of Compromise
- [Domain/URL ] Phishing and payload hosting â service-page-25144-30466-outlook.s3.us-west-2.amazonaws[.]com, service-page-18968-2419-outlook.s3.us-west-2.amazonaws[.]com
- [WebSocket/C2 ] SNOWGLAZE C2 â wss://sad4w7h913-b4a57f9c36eb.herokuapp[.]com:443/ws (hard-coded WebSocket Secure URL)
- [File Paths / Filenames ] Malicious extension and staged files â C:UsersAppDataLocalMicrosoftEdgeExtension DataSysEventsbackground.js (SNOWBELT), RegSrvc.exe (AutoHotKey executable masquerading as Registration Service)
- [File Hashes ] Malware binaries and scripts â SNOWGLAZE (2fa987b9ed6ec6d09c7451abd994249dfaba1c5a7da1c22b8407c461e62f7e49), SNOWBELT background.js (7f1d71e1e079f3244a69205588d504ed830d4c473747bb1b5c520634cc5a2477) and 3 more hashes
Read more: https://cloud.google.com/blog/topics/threat-intelligence/unc6692-social-engineering-custom-malware/