Microsoft Defender Experts (DEX) observed a campaign beginning in late February 2026 that uses WhatsApp messages to deliver malicious Visual Basic Script (VBS) files. Once executed, these scripts initiate a multi-stage infection chain designed to establish persistence and enable remote access.
The campaign relies on a combination of social engineering and living-off-the-land techniques. It uses renamed Windows utilities to blend into normal system activity, retrieves payloads from trusted cloud services such as AWS, Tencent Cloud, and Backblaze B2, and installs malicious Microsoft Installer (MSI) packages to maintain control of the system. By combining trusted platforms with legitimate tools, the threat actor reduces visibility and increases the likelihood of successful execution.
This campaign demonstrates a sophisticated infection chain combining social engineering (WhatsApp delivery), stealth techniques (renamed legitimate tools, hidden attributes), and cloud-based payload hosting. The attackers aim to establish persistence and escalate privileges, ultimately installing malicious MSI packages on victim systems.

The campaign begins with the delivery of malicious Visual Basic Script (VBS) files through WhatsApp messages, exploiting the trust users place in familiar communication platforms. Once executed, these scripts create hidden folders in C:\ProgramData and drop renamed versions of legitimate Windows utilities such as curl.exe renamed as netapi.dll and bitsadmin.exe as sc.exe. By disguising these tools under misleading names, attackers ensure they blend seamlessly into the system environment. Notably, these renamed binaries Notably, these renamed binaries retain their original PE (Portable Executable) metadata, including the OriginalFileName field which still identifies them as curl.exe and bitsadmin.exe. This means Microsoft Defender and other security solutions can leverage this metadata discrepancy as a detection signal, flagging instances where a file’s name does not match its embedded OriginalFileName.
However, for environments where PE metadata inspection is not actively monitored, defenders may need to rely on command line flags and network telemetry to hunt for malicious activity. The scripts execute these utilities with downloader flags, initiating the retrieval of additional payloads.
After establishing a foothold, the malware advances to its next phase: downloading secondary droppers like auxs.vbs and WinUpdate_KB5034231.vbs. These files are hosted on trusted cloud platforms such as AWS S3, Tencent Cloud, and Backblaze B2, which attackers exploit to mask malicious activity as legitimate traffic.
In the screenshot below, the script copies legitimate Windows utilities (curl.exe, bitsadmin.exe) into a hidden folder under C:\ProgramData\EDS8738, renaming them as netapi.dll and sc.exe respectively. Using these renamed binaries with downloader flags, the script retrieves secondary VBS payloads (auxs.vbs, 2009.vbs) from cloud-hosted infrastructure. This technique allows malicious network requests to blend in as routine system activity.

By embedding their operations within widely used cloud services, adversaries make it difficult for defenders to distinguish between normal enterprise activity and malicious downloads. This reliance on cloud infrastructure demonstrates a growing trend in cybercrime, where attackers weaponize trusted technologies to evade detection and complicate incident response.
Once the secondary payloads are in place, the malware begins tampering with User Account Control (UAC) settings to weaken system defenses. It continuously attempts to launch cmd.exe with elevated privileges retrying until UAC elevation succeeds or the process is forcibly terminated modifying registry entries under HKLM\Software\Microsoft\Win, and embedding persistence mechanisms to ensure the infection survives system reboots.

These actions allow attackers to escalate privileges, gain administrative control, and maintain a long‑term presence on compromised devices. The malware modifies the ConsentPromptBehaviorAdmin registry value to suppress UAC prompts, silently granting administrative privileges without user interaction by combining registry manipulation with UAC bypass techniques, the malware ensures that even vigilant users or IT teams face significant challenges in removing the infection.
In the final stage, the campaign delivers malicious MSI installers, including Setup.msi, WinRAR.msi, LinkPoint.msi, and AnyDesk.msi. all of which are unsigned. The absence of a valid code signing certificate is a notable indicator, as legitimate enterprise software of this nature would typically carry a trusted publisher signature. These installers enable attackers to establish remote access, giving them the ability to control victim systems directly.
The use of MSI packages also helps the malware blend in with legitimate enterprise software deployment practices, reducing suspicion among users and administrators. Once installed, tools like AnyDesk provide attackers with persistent remote connectivity, allowing them to exfiltrate data, deploy additional malware, or use compromised systems as part of a larger network of infected devices.
Microsoft recommends the following mitigations to reduce the impact of the WhatsApp VBS Malware Campaign discussed in this report. These recommendations draw from established Defender blog guidance patterns and align with protections offered across Microsoft Defender.
Organizations can follow these recommendations to mitigate threats associated with this threat:
Microsoft also recommends the following mitigations to reduce the impact of this threat:
The following mitigations apply specifically to Microsoft Defender Endpoint security
Microsoft Defender customers can refer to the list of applicable detections below. Microsoft Defender coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.
Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.
| Tactic | Observed activity | Microsoft Defender coverage |
| Initial Access | Users downloaded malicious VBS scripts delivered via WhatsApp. | Microsoft Defender Antivirus – Trojan:VBS/Obfuse.KPP!MTB |
| Execution/ Defense Evasion | Malicious VBS scripts were executed on the endpoint. Legitimate system utilities (e.g., curl, bitsadmin.exe) were renamed to evade detection. | Microsoft Defender for Endpoint – Suspicious curl behavior |
| Privilege Escalation | Attempt to read Windows UAC settings, to run cmd.exe with elevated privileges to execute registry modification commands | Microsoft Defender Antivirus – Trojan:VBS/BypassUAC.PAA!MTB |
Microsoft Defender customers can use the following threat analytics reports in the Defender portal (requires license for at least one Defender product) to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.
Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace.
Microsoft Security Copilot customers can also use the Microsoft Security Copilot integration in Microsoft Defender Threat Intelligence, either in the Security Copilot standalone portal or in the embedded experience in the Microsoft Defender portal to get more information about this threat actor.
Microsoft Defender customers can run the following query to find related activity in their networks:
Malicious script execution
DeviceProcessEvents
| where InitiatingProcessFileName has "wscript.exe"
| where InitiatingProcessCommandLine has_all ("wscript.exe",".vbs")
| where ProcessCommandLine has_all ("ProgramData","-K","-s","-L","-o", "https:")
Malicious next stage VBS payload drop
DeviceFileEvents | where InitiatingProcessFileName endswith ".dll" | where InitiatingProcessVersionInfoOriginalFileName contains "curl.exe" | where FileName endswith ".vbs"
Malicious installer payload drop
DeviceFileEvents | where InitiatingProcessFileName endswith ".dll" | where InitiatingProcessVersionInfoOriginalFileName contains "curl.exe" | where FileName endswith ".msi"
Malicious outbound network communication
DeviceNetworkEvents
| where InitiatingProcessFileName endswith ".dll"
| where InitiatingProcessVersionInfoOriginalFileName contains "curl.exe"
| where InitiatingProcessCommandLine has_all ("-s","-L","-o", "-k")
Initial Stage: VBS Scripts delivered via WhatsApp
| Indicator | Type | Description |
| a773bf0d400986f9bcd001c84f2e1a0b614c14d9088f3ba23ddc0c75539dc9e0 | SHA-256 | Initial VBS Script from WhatsApp |
| 22b82421363026940a565d4ffbb7ce4e7798cdc5f53dda9d3229eb8ef3e0289a | SHA-256 | Initial VBS Script from WhatsApp |
Next Stage VBS payload/Dropper dropped from cloud storage
| 91ec2ede66c7b4e6d4c8a25ffad4670d5fd7ff1a2d266528548950df2a8a927a | SHA-256 | Malicious Script dropped from cloud storage |
| 1735fcb8989c99bc8b9741f2a7dbf9ab42b7855e8e9a395c21f11450c35ebb0c | SHA-256 | Malicious Script dropped from cloud storage |
| 5cd4280b7b5a655b611702b574b0b48cd46d7729c9bbdfa907ca0afa55971662 | SHA-256 | Malicious Script dropped from cloud storage |
| 07c6234b02017ffee2a1740c66e84d1ad2d37f214825169c30c50a0bc2904321 | SHA-256 | Malicious Script dropped from cloud storage |
| 630dfd5ab55b9f897b54c289941303eb9b0e07f58ca5e925a0fa40f12e752653 | SHA-256 | Malicious Script dropped from cloud storage |
| 07c6234b02017ffee2a1740c66e84d1ad2d37f214825169c30c50a0bc2904321 | SHA-256 | Malicious Script dropped from cloud storage |
| df0136f1d64e61082e247ddb29585d709ac87e06136f848a5c5c84aa23e664a0 | SHA-256 | Malicious Script dropped from cloud storage |
| 1f726b67223067f6cdc9ff5f14f32c3853e7472cebe954a53134a7bae91329f0 | SHA-256 | Malicious Script dropped from cloud storage |
| 57bf1c25b7a12d28174e871574d78b4724d575952c48ca094573c19bdcbb935f | SHA-256 | Malicious Script dropped from cloud storage |
| 5eaaf281883f01fb2062c5c102e8ff037db7111ba9585b27b3d285f416794548 | SHA-256 | Malicious Script dropped from cloud storage |
| 613ebc1e89409c909b2ff6ae21635bdfea6d4e118d67216f2c570ba537b216bd | SHA-256 | Malicious Script dropped from cloud storage |
| c9e3fdd90e1661c9f90735dc14679f85985df4a7d0933c53ac3c46ec170fdcfd | SHA-256 | Malicious Script dropped from cloud storage |
MSI installers (Final payload)
| dc3b2db1608239387a36f6e19bba6816a39c93b6aa7329340343a2ab42ccd32d | SHA-256 | Installer dropped from cloud storage |
| a2b9e0887751c3d775adc547f6c76fea3b4a554793059c00082c1c38956badc8 | SHA-256 | Installer dropped from cloud storage |
| 15a730d22f25f87a081bb2723393e6695d2aab38c0eafe9d7058e36f4f589220 | SHA-256 | Installer dropped from cloud storage |
Cloud storage URLs: Payload hosting
| hxxps[:]//bafauac.s3.ap-southeast-1.amazonaws[.]com | URL | Amazon S3 Bucket |
| hxxps[:]//yifubafu.s3.ap-southeast-1.amazonaws[.]com | URL | Amazon S3 Bucket |
| hxxps[:]//9ding.s3.ap-southeast-1.amazonaws[.]com | URL | Amazon S3 Bucket |
| hxxps[:]//f005.backblazeb2.com/file/bsbbmks | URL | Backblaze B2 Cloud Storage |
| hxxps[:]sinjiabo-1398259625[.]cos.ap-singapore.myqcloud.com | URL | Tencent Cloud storage |
Command and control (C2) infrastructure
| Neescil[.]top | Domain | Command and control domain |
| velthora[.]top | Domain | Command and control domain |
This research is provided by Microsoft Defender Security Research with contributions from Sabitha S and other members of Microsoft Threat Intelligence.
Review our documentation to learn more about our real-time protection capabilities and see how to enable them within your organization.
Learn more about Protect your agents in real-time during runtime (Preview) – Microsoft Defender for Cloud Apps
Explore how to build and customize agents with Copilot Studio Agent Builder
Microsoft 365 Copilot AI security documentation
How Microsoft discovers and mitigates evolving attacks against AI guardrails
Learn more about securing Copilot Studio agents with Microsoft Defender