LevelBlue analyzed a multi-stage infection chain that started with MicrosoftToolkit.exe, used script masquerading and AutoIt-based staging, and ended with communication tied to Vidar infrastructure. The activity included defense evasion, payload extraction, self-cleanup, and likely credential-stealing behavior via C2 over public web services and DNS infrastructure. #MicrosoftToolkit #AutoIt #Repliesscr #Vidar #telegramme #technicalprorjxyz
Keypoints
- The infection chain began with MicrosoftToolkit.exe, a commonly abused hack tool that spawned cmd.exe to start the next stage.
- A disguised .dot file was renamed to a .bat script and executed, showing file extension masquerading to bypass security controls.
- The attack used tasklist and findstr for process discovery and possible security-tool identification before deeper payload staging.
- Payload extraction was performed with extract32.exe, followed by execution of the AutoIt loader Replies.scr with an external argument.
- Network activity from Replies.scr matched Vidar-associated infrastructure, indicating deployment of an information-stealing payload.
- The malware used anti-analysis and defense-evasion behavior, including debugger checks, indicator removal, file deletion, and self-termination.
- Observed communications included telegram.me, steamcommunity.com, and gz.technicalprorj.xyz, along with a Vidar-associated IP address.
MITRE Techniques
- [T1204.002] User Execution: Malicious File â The attack relied on the user running a hack tool to begin execution (âUser downloaded and executed MicrosoftToolkit.exeâ and âUser executed microsofttoolkit.exeâ).
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell â cmd.exe was spawned to continue the staged execution (âspawn of cmd.exeâ).
- [T1036] Masquerading â The threat renamed a .dot file to a .bat file to hide the true file type (âRenaming and execution of swingers.dot as swingers.dot.batâ).
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell â Batch/script behavior was used to stage and run additional commands (ârenaming and execution of swingers.dot as swingers.dot.batâ).
- [T1082] System Information Discovery â tasklist and findstr were used to enumerate running processes and identify security-related tooling (âProcess discovery (tasklist, findstr)â).
- [T1027] Obfuscated Files or Information â Payloads were staged in disguised or embedded file formats, requiring extraction (âPayload extraction via extract32.exeâ and âpayload container formatâ).
- [T1140] Deobfuscate/Decode Files or Information â extract32.exe was used to unpack the next-stage payload (âPayload extraction via extract32.exeâ).
- [T1059] Command and Scripting Interpreter â Replies.scr executed scripted loader logic with an external parameter (âExecution of replies.scr with parameter Dâ).
- [T1218] Signed Binary Proxy Execution â The .scr AutoIt-compiled binary was abused as a loader to execute malicious logic (âExecution of replies.scrâ).
- [T1027.005] Indicator Removal from Tools â The malware used staged and disguised components plus cleanup to reduce visibility (âfile-based stagingâ, âremoval of execution artifactsâ).
- [T1562.001] Disable or Modify Security Tools â The malware attempted to identify and potentially disrupt security-related processes (âattempts to identify security-related processesâ).
- [T1057] Process Discovery â tasklist and related checks were used to discover running processes (âtasklist, findstrâ).
- [T1070.004] Indicator Removal on Host: File Deletion â The malware deleted dropped and staged files to erase traces (âDeletion of dropped or staged files from the diskâ).
- [T1489] Service Stop â The malware terminated its own processes and other processes during cleanup (âTermination of its own processesâ).
- [T1497.001] Virtualization/Sandbox Evasion: System Checks â ZwQueryInformationProcess was used to detect debugging and instrumentation callbacks (âdetect the presence of a debuggerâ and âinstrumentation callbacksâ).
- [T1105] Ingress Tool Transfer â The loader reconstructed and loaded a payload from a separate file into memory (âreads it into memory for decryption and executionâ).
- [T1071.001] Application Layer Protocol: Web Protocols â C2 communication used HTTP/HTTPS via WinINet and HTTP requests (âInternetConnectAâ, âHttpOpenRequestAâ, âHttpSendRequestAâ).
- [T1573] Encrypted Channel â Communication occurred over HTTPS to hide traffic content (âhttps[:]//telegram[.]me/âŚâ).
- [T1071.004] Application Layer Protocol: DNS â The malware used DNS resolution for dynamic infrastructure (âDNS resolution for gz[.]technicalprorj[.]xyz via public DNSâ).
- [T1041] Exfiltration Over C2 Channel â Observed activity aligned with Vidar data theft over the C2 path (âlikely exfiltration of credentials, browser dataâ).
Indicators of Compromise
- [SHA-256 ] Malware samples and staged payloads â fc27479ff929d846e7c5c5d147479c81e483a2ec911bd1501a53aa646a29620d, d4fe9f48178cdf375a3be30d17f1dc016b5861dff8683f0bb35a0ba8d44f892f, and 3 more hashes
- [File names ] Dropped/executed files seen in the chain â MicrosoftToolkit.exe, swingers.dot.bat, and 3 more files
- [IP address ] Vidar-associated C2 infrastructure â 149.154.167[.]99
- [Domain names ] C2 and related network destinations â telegram[.]me, gz[.]technicalprorj[.]xyz
- [URL paths ] Observed request targets used in C2 communication â /sre22qe, /profiles/76561198777118079