Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report

FAUX#ELEVATE: Obfuscated VBS Campaign Targeting Enterprise HR System

Amber | Attack Report
Download PDF

Summary

What appears to be a harmless job application quickly unravels into a targeted enterprise compromise under the campaign FAUX#ELEVATE. Aimed at HR teams and recruitment departments, the FAUX#ELEVATE attack leverages a deeply obfuscated VBScript that quietly filters for domain-joined systems, ensuring it lands only on high-value corporate environments. The FAUX#ELEVATE campaign, first seen in 2025, targets France-based Windows systems in human resources and recruitment departments. Once executed, the FAUX#ELEVATE malware disables key security defenses, establishes a backdoor, siphons credentials from multiple browsers, and deploys a stealthy Monero cryptominer, all while exfiltrating sensitive data over encrypted email channels using hardcoded mail.ru accounts. The FAUX#ELEVATE campaign stands out for its precision and discipline, evading sandbox analysis through timing checks, bypassing low-value targets by verifying domain membership, and cleaning up its initial traces to leave behind a persistent foothold and a silent monetization pipeline targeting enterprise HR systems.

Attack Details

Phishing Delivery and Heavy Obfuscation Targeting HR Teams

What looks like an ordinary job application quickly turns into a carefully staged compromise. The FAUX#ELEVATE campaign attack begins with a phishing email targeting HR and recruitment teams, carrying a VBScript file. When opened, the FAUX#ELEVATE VBScript displays a convincing French error message suggesting the file is corrupted, while quietly executing malicious code in the background. Beneath this simple lure lies heavy obfuscation in the FAUX#ELEVATE script; only a tiny fraction of the script’s massive 224,000+ lines contains real logic, with the rest padded by meaningless comments. Critical strings in the FAUX#ELEVATE malware are deliberately fragmented and reconstructed at runtime, making analysis and detection significantly harder for security tools.

Domain-Joined Environment Checks and Sandbox Evasion

Before deploying its payload, the FAUX#ELEVATE script performs a series of environment checks to ensure it is running on a valuable target. The FAUX#ELEVATE malware avoids reinfecting systems using a mutex mechanism and, more importantly, verifies whether the machine is part of a corporate domain, effectively filtering out home users. Sandbox evasion is built into FAUX#ELEVATE through timing checks that detect accelerated execution environments. If administrative privileges are missing, the FAUX#ELEVATE script aggressively loops UAC prompts until elevation is granted. Once elevated, FAUX#ELEVATE weakens system defenses by disabling UAC, adding broad Windows Defender exclusions across multiple drives, and removing its own footprint from disk.

Dropbox-Hosted Toolkit Deployment and App-Bound Encryption Bypass

With defenses lowered, the FAUX#ELEVATE dropper retrieves additional components. The FAUX#ELEVATE malware downloads a renamed 7-Zip utility along with two password-protected archives hosted on Dropbox, extracting them into a public system directory at C:\Users\Public\WindowsUpdate. These FAUX#ELEVATE archives unpack a full toolkit: a backdoor for remote access, a Monero cryptominer, multiple credential stealers targeting Chromium-based browsers and Firefox, and utilities for harvesting desktop files. Notably, the FAUX#ELEVATE credential theft mechanism leverages techniques to bypass Chromium’s App-Bound Encryption, enabling the extraction of sensitive data such as cookies, saved credentials, and payment information without requiring elevated privileges.

Encrypted Email Exfiltration and Stealth Cryptomining

Exfiltration is handled with equal precision in the FAUX#ELEVATE campaign. Stolen data is bundled and sent via SMTP over SSL using hardcoded mail.ru accounts (olga.aitsaid@mail.ru, 3pw5nd9neeyn@mail.ru), with email subjects tagged by victim geography and data type for easy classification by FAUX#ELEVATE operators. Meanwhile, the FAUX#ELEVATE cryptominer fetches its configuration from a compromised website (lmtop.ma), disguising it as an encoded image file to evade detection, and connects to a mining pool (pool.supportxmr.com) using stealth options that pause activity during user interaction. In parallel, the FAUX#ELEVATE backdoor establishes persistent command-and-control communication via dynamic DNS infrastructure (eufr18-166.workdns.com), ensuring continuous remote access.

Persistence, Cleanup, and Long-Term Enterprise Foothold

To maintain long-term control while minimizing exposure, the FAUX#ELEVATE malware establishes multiple persistence mechanisms through registry keys and scheduled tasks. Once data theft is complete, FAUX#ELEVATE performs a thorough cleanup, removing scripts and tooling associated with the initial infection chain. The FAUX#ELEVATE campaign process injection into explorer.exe enables persistent C2 beaconing on non-standard ports 7077 and 62046, maintaining a silent foothold in enterprise HR environments.

Recommendations

Block VBScript Execution via Group Policy

Configure Windows Group Policy to prevent wscript.exe and cscript.exe from executing VBS files downloaded from the internet. This directly mitigates the initial FAUX#ELEVATE dropper execution vector used in this campaign where a .vbs file disguised as a resume is the entry point.

Monitor C:\Users\Public\ and Subfolders for Suspicious Activity

Deploy endpoint detection rules to alert on file creation, script execution, and binary drops within world-writable directories such as C:\Users\Public\WindowsUpdate, which was used as the staging directory for the full FAUX#ELEVATE malware toolkit in this campaign.

Detect Anomalous wscript.exe and cscript.exe Behavior

Create detection rules for wscript.exe or cscript.exe processes that spawn child processes (cmd.exe, powershell.exe, schtasks.exe, netsh.exe), make outbound network connections, modify registry Run keys, or invoke PowerShell with Add-MpPreference -ExclusionPath commands, all indicators of FAUX#ELEVATE activity.

Monitor explorer.exe for Unexpected Outbound Connections

Create alerts for explorer.exe establishing network connections to non-Microsoft IPs, particularly on non-standard ports such as 7077 and 62046. In the FAUX#ELEVATE campaign, the RAT component injected into explorer.exe for persistent C2 beaconing.

Restrict Dropbox and Cloud Storage Access on Endpoints Where Not Required

Where feasible, limit or monitor access to Dropbox CDN URLs from non-browser processes. The FAUX#ELEVATE campaign uses Dropbox links for payload delivery, and blocking these at the proxy level for non-approved applications can disrupt the delivery mechanism.

MITRE ATT&CK TTPs

Resource Development:

  • T1583: Acquire Infrastructure
    • T1583.001: Domains
  • T1584: Compromise Infrastructure
    • T1584.004: Server

Initial Access:

  • T1566: Phishing
    • T1566.001: Spearphishing Attachment

Execution:

  • T1059: Command and Scripting Interpreter
    • T1059.005: Visual Basic
  • T1204: User Execution
    • T1204.002: Malicious File

Persistence:

  • T1547: Boot or Logon Autostart Execution
    • T1547.001: Registry Run Keys / Startup Folder
  • T1053: Scheduled Task/Job
    • T1053.005: Scheduled Task

Privilege Escalation:

  • T1548: Abuse Elevation Control Mechanism
    • T1548.002: Bypass User Account Control

Defense Evasion:

  • T1027: Obfuscated Files or Information
  • T1562: Impair Defenses
    • T1562.001: Disable or Modify Tools
  • T1036: Masquerading
    • T1036.005: Match Legitimate Name or Location
  • T1070: Indicator Removal
    • T1070.004: File Deletion
  • T1055: Process Injection
  • T1102: Web Service

Credential Access:

  • T1555: Credentials from Password Stores
    • T1555.003: Credentials from Web Browsers

Discovery:

  • T1082: System Information Discovery
  • T1016: System Network Configuration Discovery

Collection:

  • T1005: Data from Local System

Command and Control:

  • T1071: Application Layer Protocol
    • T1071.001: Web Protocols
  • T1572: Protocol Tunneling

Exfiltration:

  • T1048: Exfiltration Over Alternative Protocol
    • T1048.002: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

Impact:

  • T1496: Resource Hijacking

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox