SOC Prime Bias: Critical

06 May 2026 14:19

UAT-8302 and the Malware Toolkit Behind Its Attacks

Author Photo
SOC Prime Team linkedin icon Follow
UAT-8302 and the Malware Toolkit Behind Its Attacks
shield icon

Detection stack

  • AIDR
  • Alert
  • ETL
  • Query

Summary

Cisco Talos has linked a China-nexus APT group tracked as UAT-8302 to attacks against government organizations in South America since late 2024 and in southeastern Europe throughout 2025. The group deploys a broad malware toolkit that includes NetDraft, CloudSorcerer v3, VSHELL, SNOWLIGHT, SNOWRUST, and additional custom components. Its operations also rely on open-source tools such as Impacket, proxying utilities, and tailored scripts to support reconnaissance, credential theft, and lateral movement across victim environments.

Investigation

Talos documented the group’s malware delivery chain, its use of scheduled tasks for persistence, and its abuse of trusted services such as Microsoft Graph for command-and-control. Researchers also observed DLL sideloading loaders, reconnaissance commands, network scanning utilities, and infrastructure dedicated to payload delivery and remote access. The report further noted overlaps in tooling and tradecraft with other China-linked clusters, including Jewelbug, Earth Estries, and several UNC-tracked groups.

Mitigation

Organizations should patch the referenced vulnerabilities, including CVE-2025-0994, CVE-2025-20333, and CVE-2025-20362, and apply strict controls to Office 365 and OneDrive APIs that could be abused for command-and-control. Defenders should also block the known malicious domains and IP addresses, disable unnecessary services, and restrict remote execution tools such as Impacket and WMI wherever possible. Monitoring should focus on the identified scheduled task names and DLL sideloading patterns associated with the campaign.

Response

Security teams should alert on the listed indicators of compromise, isolate affected systems, and collect relevant logs and forensic artifacts for analysis. Credentials should be rotated promptly, and Active Directory should be reviewed carefully for signs of compromise or unauthorized access. Detection content should also be updated to cover the observed command lines and scheduled tasks, while defenders hunt for additional implants from the same malware families across the environment.

"graph TB %% Class definitions classDef action fill:#99ccff classDef tool fill:#ffcc99 classDef malware fill:#ff9999 classDef process fill:#cccccc classDef operator fill:#ff9900 %% Initial Access initial_access["<b>Action</b> – <b>T1190 Exploit Public-Facing Application</b><br/><b>Description</b>: Exploit a vulnerable internetu2011facing service to gain initial foothold."] class initial_access action vuln_app["<b>Tool</b> – <b>Name</b>: Cityworks (vulnerable)<br/><b>Description</b>: Publicu2011facing application containing CVEu20112025u20110994."] class vuln_app tool %% Execution u2013 System Binary Proxy exec_proxy["<b>Action</b> – <b>T1218.002 System Binary Proxy Execution</b><br/><b>Description</b>: Abuse trusted system binaries to proxy execution of malicious code."] class exec_proxy action control_panel["<b>Tool</b> – <b>Name</b>: Control Panel<br/><b>Description</b>: Legitimate binary used as proxy."] class control_panel tool %% Execution u2013 Trusted Developer Utilities Proxy (MSBuild) exec_msbuild["<b>Action</b> – <b>T1127.001 Trusted Developer Utilities Proxy Execution</b><br/><b>Description</b>: Use MSBuild to load malicious DLLs via sideu2011loading."] class exec_msbuild action msbuild["<b>Tool</b> – <b>Name</b>: MSBuild<br/><b>Description</b>: Microsoft build engine used to execute project files."] class msbuild tool %% Execution u2013 Shared Modules (DLL Sideu2011Loading) exec_shared["<b>Action</b> – <b>T1129 Shared Modules</b><br/><b>Description</b>: Load malicious DLLs by placing them next to benign executables."] class exec_shared action yandex_exe["<b>Tool</b> – <b>Name</b>: Yandex.exe<br/><b>Description</b>: Legitimate executable used as dropper."] class yandex_exe tool vmtools_exe["<b>Tool</b> – <b>Name</b>: VMtools.exe<br/><b>Description</b>: VMware tools binary leveraged for sideu2011loading."] class vmtools_exe tool malware_nedraft["<b>Malware</b> – <b>Name</b>: NetDraft"] class malware_nedraft malware malware_cloudsorcerer["<b>Malware</b> – <b>Name</b>: CloudSorcerer"] class malware_cloudsorcerer malware malware_vshell["<b>Malware</b> – <b>Name</b>: VSHELL"] class malware_vshell malware %% Persistence u2013 Scheduled Task persistence_task["<b>Action</b> – <b>T1053 Scheduled Task/Job</b><br/><b>Description</b>: Create scheduled tasks to run malicious binaries persistently."] class persistence_task action scheduled_task["<b>Tool</b> – <b>Name</b>: Microsoft\Maps\{…}<br/><b>Description</b>: Scheduled task used for persistence."] class scheduled_task tool %% Defense Evasion u2013 Exploitation for Evasion defev_evasion["<b>Action</b> – <b>T1211 Exploitation for Defense Evasion</b><br/><b>Description</b>: Leverage vulnerabilities to bypass security controls."] class defev_evasion action %% Defense Evasion u2013 Subvert Trust Controls (Code Signing) defev_signing["<b>Action</b> – <b>T1553.006 Subvert Trust Controls</b><br/><b>Description</b>: Modify code signing policies to trust malicious binaries."] class defev_signing action %% Defense Evasion u2013 Preu2011OS Boot (ROMMONkit) defev_rommon["<b>Action</b> – <b>T1542.004 Preu2011OS Boot: ROMMONkit</b><br/><b>Description</b>: Install malicious driver during firmware boot."] class defev_rommon action rommon_driver["<b>Tool</b> – <b>Name</b>: Hades HIPS driver"] class rommon_driver tool %% Discovery u2013 Account and Group discovery_account["<b>Action</b> – <b>T1087.002 Account Discovery: Domain Account</b><br/><b>Description</b>: Enumerate domain user accounts."] class discovery_account action discovery_groups["<b>Action</b> – <b>T1069.002 Permission Groups Discovery: Domain Groups</b><br/><b>Description</b>: Enumerate domain groups."] class discovery_groups action %% Discovery u2013 Network discovery_netconn["<b>Action</b> – <b>T1049 System Network Connections Discovery</b><br/><b>Description</b>: Identify active network connections."] class discovery_netconn action discovery_remotes["<b>Action</b> – <b>T1018 Remote System Discovery</b><br/><b>Description</b>: Find remote systems on the network."] class discovery_remotes action discovery_scanning["<b>Action</b> – <b>T1595.001 Active Scanning: Scanning IP Blocks</b><br/><b>Description</b>: Scan IP ranges for live hosts."] class discovery_scanning action discovery_netconfig["<b>Action</b> – <b>T1016.001 System Network Configuration Discovery: Internet Connection Discovery</b><br/><b>Description</b>: Gather network configuration details."] class discovery_netconfig action discovery_cloud["<b>Action</b> – <b>T1526 Cloud Service Discovery</b><br/><b>Description</b>: Identify cloud service usage."] class discovery_cloud action discovery_cfg_repo["<b>Action</b> – <b>T1602 Data from Configuration Repository</b><br/><b>Description</b>: Dump network device configuration via SNMP MIB."] class discovery_cfg_repo action %% Lateral Movement u2013 Exploitation of Remote Services lateral_wmi["<b>Action</b> – <b>T1210 Exploitation of Remote Services</b><br/><b>Description</b>: Use WMI or SMB to execute code on remote hosts."] class lateral_wmi action lateral_smb["<b>Action</b> – <b>T1021.002 Remote Services: SMB/Windows Admin Shares</b><br/><b>Description</b>: Access admin shares for lateral movement."] class lateral_smb action lateral_transfer["<b>Action</b> – <b>T1570 Lateral Tool Transfer</b><br/><b>Description</b>: Transfer tools to remote systems."] class lateral_transfer action lateral_taint["<b>Action</b> – <b>T1080 Taint Shared Content</b><br/><b>Description</b>: Poison shared files to spread malware."] class lateral_taint action lateral_cloud["<b>Action</b> – <b>T1021.007 Remote Services: Cloud Services</b><br/><b>Description</b>: Use OneDrive or GitHub for lateral movement."] class lateral_cloud action lateral_rats["<b>Action</b> – <b>T1219 Remote Access Tools</b><br/><b>Description</b>: Deploy tools such as gogo, httpx, SNOWRUST."] class lateral_rats action tool_gogo["<b>Tool</b> – <b>Name</b>: gogo"] class tool_gogo tool tool_httpx["<b>Tool</b> – <b>Name</b>: httpx"] class tool_httpx tool tool_snowrust["<b>Tool</b> – <b>Name</b>: SNOWRUST"] class tool_snowrust tool %% Privilege Escalation u2013 Account Manipulation priv_esc["<b>Action</b> – <b>T1098.007 Account Manipulation: Additional Local or Domain Groups</b><br/><b>Description</b>: Add compromised accounts to privileged groups."] class priv_esc action %% Command and Control u2013 Proxy (multiu2011hop) c2_proxy["<b>Action</b> – <b>T1090 Proxy</b><br/><b>Description</b>: Route traffic through internal, external and multiu2011hop proxies."] class c2_proxy action c2_proxy_int["<b>Tool</b> – <b>Name</b>: Internal Proxy"] class c2_proxy_int tool c2_proxy_ext["<b>Tool</b> – <b>Name</b>: External Proxy"] class c2_proxy_ext tool %% Command and Control u2013 Protocol Tunneling c2_tunnel["<b>Action</b> – <b>T1572 Protocol Tunneling</b><br/><b>Description</b>: Encapsulate C2 traffic inside allowed protocols."] class c2_tunnel action %% Command and Control u2013 Cloud API c2_cloudapi["<b>Action</b> – <b>T1059.009 Command and Scripting Interpreter: Cloud API</b><br/><b>Description</b>: Use OneDrive, GitHub, GameSpot APIs for C2."] class c2_cloudapi action c2_onedrive["<b>Tool</b> – <b>Name</b>: OneDrive"] class c2_onedrive tool c2_github["<b>Tool</b> – <b>Name</b>: GitHub"] class c2_github tool c2_gamespot["<b>Tool</b> – <b>Name</b>: GameSpot"] class c2_gamespot tool %% Command and Control u2013 Web Protocols c2_web["<b>Action</b> – <b>T1071.001 Application Layer Protocol: Web Protocols</b><br/><b>Description</b>: Communicate over HTTP/HTTPS."] class c2_web action %% Command and Control u2013 Multiu2011Stage Channels c2_multi["<b>Action</b> – <b>T1104 Multiu2011Stage Channels</b><br/><b>Description</b>: Chain multiple C2 channels for resilience."] class c2_multi action %% Exfiltration u2013 Over Web Service exfil_web["<b>Action</b> – <b>T1567.002 Exfiltration Over Web Service</b><br/><b>Description</b>: Upload stolen data to cloud storage services."] class exfil_web action %% Connections u2013 Attack Flow initial_access –>|exploits| vuln_app vuln_app –>|enables| exec_proxy exec_proxy –>|uses| control_panel exec_proxy –>|leads_to| exec_msbuild exec_msbuild –>|uses| msbuild exec_msbuild –>|facilitates| exec_shared exec_shared –>|leverages| yandex_exe exec_shared –>|leverages| vmtools_exe exec_shared –>|loads| malware_nedraft exec_shared –>|loads| malware_cloudsorcerer exec_shared –>|loads| malware_vshell exec_shared –>|creates| persistence_task persistence_task –>|creates| scheduled_task scheduled_task –>|maintains| defev_evasion defev_evasion –>|includes| defev_signing defev_signing –>|modifies| rommon_driver defev_evasion –>|includes| defev_rommon defev_rommon –>|installs| rommon_driver %% Discovery Flow scheduled_task –>|gathers| discovery_account scheduled_task –>|gathers| discovery_groups scheduled_task –>|gathers| discovery_netconn scheduled_task –>|gathers| discovery_remotes scheduled_task –>|gathers| discovery_scanning scheduled_task –>|gathers| discovery_netconfig scheduled_task –>|gathers| discovery_cloud scheduled_task –>|gathers| discovery_cfg_repo %% Lateral Movement Flow discovery_remotes –>|enables| lateral_wmi lateral_wmi –>|uses| lateral_smb lateral_smb –>|transfers| lateral_transfer lateral_transfer –>|moves| lateral_cloud lateral_cloud –>|uses| c2_onedrive lateral_cloud –>|uses| c2_github lateral_cloud –>|uses| c2_gamespot lateral_wmi –>|executes| lateral_rats lateral_rats –>|uses| tool_gogo lateral_rats –>|uses| tool_httpx lateral_rats –>|uses| tool_snowrust %% Privilege Escalation Flow discovery_groups –>|supports| priv_esc %% Command and Control Flow priv_esc –>|reports to| c2_proxy c2_proxy –>|routes through| c2_proxy_int c2_proxy –>|routes through| c2_proxy_ext c2_proxy –>|uses| c2_tunnel c2_tunnel –>|establishes| c2_cloudapi c2_cloudapi –>|communicates via| c2_onedrive c2_cloudapi –>|communicates via| c2_github c2_cloudapi –>|communicates via| c2_gamespot c2_cloudapi –>|uses| c2_web c2_web –>|enables| c2_multi c2_multi –>|delivers| exfil_web %% Styling class initial_access,exec_proxy,exec_msbuild,exec_shared,persistence_task,defev_evasion,defev_signing,defev_rommon,discovery_account,discovery_groups,discovery_netconn,discovery_remotes,discovery_scanning,discovery_netconfig,discovery_cloud,discovery_cfg_repo,lateral_wmi,lateral_smb,lateral_transfer,lateral_taint,lateral_cloud,lateral_rats,priv_esc,c2_proxy,c2_tunnel,c2_cloudapi,c2_web,c2_multi,exfil_web action class vuln_app,control_panel,msbuild,yandex_exe,vmtools_exe,malware_nedraft,malware_cloudsorcerer,malware_vshell,scheduled_task,rommon_driver,tool_gogo,tool_httpx,tool_snowrust,tool_gogo,tool_httpx,tool_snowrust,c2_proxy_int,c2_proxy_ext,c2_onedrive,c2_github,c2_gamespot tool class rommon_driver malware "

Attack Flow

Detections

Suspicious CURL Usage (via cmdline)

SOC Prime Team
05 May 2026

Possible Cloudflare Development Domain Abuse (via dns)

SOC Prime Team
05 May 2026

Possible Impacket Command Line Patterns (via cmdline)

SOC Prime Team
05 May 2026

Possible Usage of Sysinternals Tools (via cmdline)

SOC Prime Team
05 May 2026

Powershell Executing File In Suspicious Directory Using Bypass Execution Policy (via cmdline)

SOC Prime Team
05 May 2026

Possible System Enumeration (via cmdline)

SOC Prime Team
05 May 2026

Possible Remote System Discovery or Connectivity Check (via cmdline)

SOC Prime Team
05 May 2026

Possible Admin Account or Group Enumeration (via cmdline)

SOC Prime Team
05 May 2026

Suspicious Domain Trusts Discovery (via cmdline)

SOC Prime Team
05 May 2026

Possible System Network Configuration Discovery (via cmdline)

SOC Prime Team
05 May 2026

Schtasks Points to Suspicious Directory / Binary / Script (via cmdline)

SOC Prime Team
05 May 2026

LOLBAS wmic (via cmdline)

SOC Prime Team
05 May 2026

Using Certutil for Data Encoding and Cert Operations (via cmdline)

SOC Prime Team
05 May 2026

Suspicious Execution from Public User Profile (via process_creation)

SOC Prime Team
05 May 2026

Possible Data Collection [7zip] (via cmdline)

SOC Prime Team
05 May 2026

Suspicious Files in Public User Profile (via file_event)

SOC Prime Team
05 May 2026

Suspicious File Download Direct IP (via proxy)

SOC Prime Team
05 May 2026

IOCs (HashSha256) to detect: UAT-8302 and its box full of malware

SOC Prime AI Rules
05 May 2026

IOCs (SourceIP) to detect: UAT-8302 and its box full of malware

SOC Prime AI Rules
05 May 2026

IOCs (DestinationIP) to detect: UAT-8302 and its box full of malware

SOC Prime AI Rules
05 May 2026

Scheduled Task and WMIC Process Creation by UAT-8302 [Windows Process Creation]

SOC Prime AI Rules
05 May 2026

Detect UAT-8302 PowerShell Reconnaissance Activity [Windows Powershell]

SOC Prime AI Rules
05 May 2026

Simulation Execution

Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.

Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic.

  • Attack Narrative & Commands:
    An adversary who has obtained a foothold on a domain‑joined Windows host wishes to conduct rapid reconnaissance of Active Directory and security logs, mirroring the known UAT‑8302 playbook. To avoid detection, the attacker first disables PowerShell transcription, then issues the three exact command lines that the Sigma rule is tuned to capture:

    1. Deploy a temporary script (whatpc.ps1) to the Temp folder and execute it with a bypassed execution policy.
    2. Enumerate all AD users and selected properties in a single pipeline.
    3. List the Security event log configuration to gauge what can be read or cleared later.

    These commands generate PowerShell operational events (EventID 4104) whose CommandLine fields match the rule’s selection1‑3 clauses, therefore should fire an alert.

  • Regression Test Script:

    # -------------------------------------------------
    # UAT‑8302 Reconnaissance Simulation Script
    # -------------------------------------------------
    # 1. Deploy and run a dummy script (whatpc.ps1)
    $scriptPath = "$env:windirTempwhatpc.ps1"
    Set-Content -Path $scriptPath -Value '# Dummy script for detection testing' -Encoding ASCII
    powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File $scriptPath
    
    # 2. AD user enumeration (requires RSAT AD module)
    powershell -Command "Get-ADUser -Filter * -Property * | Select-Object Name, DisplayName, LastLogonDate, PasswordLastSet, PasswordExpired, Description, EmailAddress, homeDirectory, scriptPath"
    
    # 3. Security log enumeration
    powershell -Command "Get-WinEvent -ListLog Security | Format-List LogName, FileSize, LogMode, MaximumSizeInBytes, RecordCount"
    # -------------------------------------------------
  • Cleanup Commands:

    # Remove the temporary script
    Remove-Item -Path "$env:windirTempwhatpc.ps1" -Force
    
    # Optionally clear PowerShell session history (if persisted)
    Clear-History