This report describes how threat actors abuse WebDAV access via Windows File Explorer to deliver remote access trojans (RATs) by hosting payloads on short-lived Cloudflare Tunnel demo domains. Campaigns use .url and .lnk shortcuts, UNC paths, and script chains to fetch payloads such as XWorm, Async RAT, and DcRAT from trycloudflare[.]com instances #WebDAV #CloudflareTunnel
Keypoints
- WebDAV is a legacy HTTP-based file management protocol natively accessible via Windows File Explorer (deprecated as of November 2023) and rarely recognized by typical users.
- Threat actors exploit File Explorerβs WebDAV support to bypass web browser download controls and sometimes evade EDRs by delivering files outside normal browser flows.
- Adversaries host short-lived WebDAV servers on Cloudflare Tunnel demo instances (trycloudflare[.]com) to expose payloads and make detection harder.
- Delivery chains commonly use .url and .lnk shortcut files, UNC paths, direct File Explorer links, and multiple script payloads to download and execute RATs (notably XWorm, Async RAT, and DcRAT); 87% of observed ATRs delivered multiple RATs.
- URL shortcut files with UNC paths can trigger automatic DNS lookups and outbound connections (example resolved to 104[.]16[.]231[.]132), potentially notifying threat actors when a victim browses a directory.
- Mitigations include user education to check File Explorer address bars, EDR behavioral detections for .url/.lnk that execute remote files, and threat hunting for demo Cloudflare Tunnel domains on trycloudflare[.]com.
MITRE Techniques
Indicators of Compromise
- [Domain ] WebDAV servers and Cloudflare Tunnel demo hosts β module-brush-sort-factory[.]trycloudflare[.]com, frontier-shops-timothy-cal[.]trycloudflare[.]com, and many other trycloudflare[.]com demo domains
- [IP Address ] Observed network artifact from a demo domain resolution β 104[.]16[.]231[.]132
- [File Name ] Malicious script and payload filenames referenced in delivery chains β rec.wsh, dat.wsh, and other WSH script files
- [Shortcut/File Type ] Shortcut types used to invoke File Explorer retrieval and execution β .url (InternetShortcut) and .lnk files used to open/run remote files
- [UNC Path ] Windows UNC/WebDAV path examples used to access remote files β harbor-microwave-called-teams[.]trycloudflare[.]comnew, exampledomain[.]comDavWWWRootMy_Files
Read more: https://cofense.com/blog/abusing-windows-file-explorer-and-webdav-for-malware-delivery