Inside a Multi-Stage Windows Malware Campaign
A sophisticated multi-stage malware campaign targeting Windows users in Russia has been identified. The attack chain begins with social engineering lures and progresses to a full system compromise, including security bypass, surveillance, and ransomware delivery. It abuses Defendnot to disable Microsoft Defender and uses modular hosting across cloud services. The attack employs various techniques such as PowerShell scripts, obfuscated VBScript, and COM object manipulation. It deploys Amnesia RAT for data theft and surveillance, Hakuna Matata ransomware for file encryption, and a WinLocker component for system lockout. The campaign demonstrates how full system compromise can be achieved without exploiting software vulnerabilities, instead relying on social engineering and abuse of legitimate Windows features.
AI Analysis
Technical Summary
This multi-stage Windows malware campaign is a complex attack sequence targeting Windows users, initially observed in Russia. It begins with social engineering tactics to trick users into executing malicious payloads. The attackers use Defendnot, a tool to disable Microsoft Defender, effectively bypassing native Windows security controls. The malware employs a variety of scripting techniques including PowerShell scripts, obfuscated VBScript, and COM object manipulation to evade detection and maintain persistence. The modular nature of the campaign is supported by hosting components across multiple cloud services, complicating takedown efforts and detection. The campaign deploys Amnesia RAT, a remote access trojan designed for data theft and surveillance, enabling attackers to exfiltrate sensitive information. Following reconnaissance and data theft, the Hakuna Matata ransomware encrypts files, while a WinLocker component locks the system to deny user access, increasing pressure for ransom payment. Notably, the campaign achieves full system compromise without exploiting software vulnerabilities, relying instead on social engineering and abuse of legitimate Windows features and administrative tools. The attack chain covers multiple MITRE ATT&CK techniques such as disabling security tools (T1562.004), command and scripting interpreter use (T1059.001), credential dumping (T1003), and ransomware deployment (T1486). Indicators of compromise include multiple file hashes linked to the campaign. No known exploits in the wild or CVEs are associated, and the campaign is rated medium severity by the source. However, the sophistication and multi-stage nature indicate a significant threat to targeted environments.
Potential Impact
For European organizations, this campaign poses a substantial risk especially to entities with Windows-based infrastructure and users susceptible to social engineering. The ability to disable Microsoft Defender and use legitimate Windows features for persistence and execution means traditional antivirus solutions may be less effective without proper configuration. The deployment of Amnesia RAT threatens confidentiality through data theft and surveillance, potentially exposing sensitive corporate or personal data. The subsequent ransomware and system lockout components threaten integrity and availability, risking operational disruption and financial loss. Organizations in Europe with remote or hybrid workforces may be particularly vulnerable due to increased phishing attack surfaces. The modular cloud-hosted infrastructure used by attackers complicates detection and response, potentially allowing longer dwell times. Although the campaign currently targets Russia, the techniques and tools could be adapted or spread to European targets, especially those with geopolitical or economic ties to Russia or those using similar Windows environments. The absence of software vulnerability exploitation means patching alone is insufficient; user behavior and endpoint security posture are critical factors. The campaign could impact critical infrastructure, government agencies, and private sector organizations, leading to data breaches, operational downtime, and ransom payments.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic advice: 1) Enhance user awareness training focused on recognizing social engineering and phishing attempts, emphasizing the risks of executing unsolicited scripts or attachments. 2) Harden endpoint security by configuring Microsoft Defender and other antivirus tools to detect and block Defendnot and similar tools that disable security features; enable tamper protection and monitor for unusual Defender service stoppages. 3) Employ application whitelisting and restrict execution of PowerShell scripts and VBScript to trusted contexts; use constrained language mode where possible. 4) Monitor for suspicious COM object usage and unusual network connections to cloud services, leveraging endpoint detection and response (EDR) tools with behavioral analytics. 5) Implement strict least privilege policies to limit user and process permissions, reducing the impact of credential dumping and lateral movement. 6) Regularly audit and monitor for indicators of compromise such as the provided file hashes and unusual file system or registry changes. 7) Maintain robust offline backups and test recovery procedures to mitigate ransomware impact. 8) Use network segmentation to contain infections and limit attacker lateral movement. 9) Collaborate with threat intelligence sharing groups to stay updated on campaign developments and IoCs. 10) Consider deploying deception technologies to detect early stages of the attack chain.
Affected Countries
Russia, Germany, France, United Kingdom, Italy, Poland, Netherlands
Indicators of Compromise
- hash: ea498b9d0f0ad35c8ea2c21bf98cc557
- hash: 00f66065a4af319947a1004bb1dbb2c24b5e7fa3
- hash: 1828614be6d9bdd92f7ee30e12c8aac8eba33a6df2c92995f9bf930c3f1b992b
- hash: 263b5ba921e478215dc9e3a397157badab415fc775cfb4681821b7446c14fb1a
- hash: 359fe8df31c903153667fbe93795929ad6172540b3ee7f9eff4bcc1da6d08478
- hash: 3aa6ebb73390d304eef8fd897994906c05f3e967f8f6f6a7904c6156cf8819f9
- hash: 45e942ba59f3876b263a03ed7e5d5b1b250e84a0a4b4093b3c13b5fca4e12b21
- hash: 5443232a367a83ac2899b37c066dae3ec2010df292291db24ce3d744133218a6
- hash: 6222775b877b4be4f5407525d52c5889739b96c302e5a204ef369b4a51c6dab2
- hash: 71069a5d2a80a047ca36ca82e630d353829726d4f03a74c7522b7700c5c2bb59
- hash: 7b8cf0ef390a7d6126c5e7bf835af5c5ce32c70c0d58ca4ddc9c238b2d3f059a
- hash: 7de56603a7b41fca9313231df6105dbb8148d3b0d80dfbc00e71e1d88f871915
- hash: e6ca6bab85ae1eff08a59b46b7905ae0568110da172dec8367f32779094bdd08
Inside a Multi-Stage Windows Malware Campaign
Description
A sophisticated multi-stage malware campaign targeting Windows users in Russia has been identified. The attack chain begins with social engineering lures and progresses to a full system compromise, including security bypass, surveillance, and ransomware delivery. It abuses Defendnot to disable Microsoft Defender and uses modular hosting across cloud services. The attack employs various techniques such as PowerShell scripts, obfuscated VBScript, and COM object manipulation. It deploys Amnesia RAT for data theft and surveillance, Hakuna Matata ransomware for file encryption, and a WinLocker component for system lockout. The campaign demonstrates how full system compromise can be achieved without exploiting software vulnerabilities, instead relying on social engineering and abuse of legitimate Windows features.
AI-Powered Analysis
Technical Analysis
This multi-stage Windows malware campaign is a complex attack sequence targeting Windows users, initially observed in Russia. It begins with social engineering tactics to trick users into executing malicious payloads. The attackers use Defendnot, a tool to disable Microsoft Defender, effectively bypassing native Windows security controls. The malware employs a variety of scripting techniques including PowerShell scripts, obfuscated VBScript, and COM object manipulation to evade detection and maintain persistence. The modular nature of the campaign is supported by hosting components across multiple cloud services, complicating takedown efforts and detection. The campaign deploys Amnesia RAT, a remote access trojan designed for data theft and surveillance, enabling attackers to exfiltrate sensitive information. Following reconnaissance and data theft, the Hakuna Matata ransomware encrypts files, while a WinLocker component locks the system to deny user access, increasing pressure for ransom payment. Notably, the campaign achieves full system compromise without exploiting software vulnerabilities, relying instead on social engineering and abuse of legitimate Windows features and administrative tools. The attack chain covers multiple MITRE ATT&CK techniques such as disabling security tools (T1562.004), command and scripting interpreter use (T1059.001), credential dumping (T1003), and ransomware deployment (T1486). Indicators of compromise include multiple file hashes linked to the campaign. No known exploits in the wild or CVEs are associated, and the campaign is rated medium severity by the source. However, the sophistication and multi-stage nature indicate a significant threat to targeted environments.
Potential Impact
For European organizations, this campaign poses a substantial risk especially to entities with Windows-based infrastructure and users susceptible to social engineering. The ability to disable Microsoft Defender and use legitimate Windows features for persistence and execution means traditional antivirus solutions may be less effective without proper configuration. The deployment of Amnesia RAT threatens confidentiality through data theft and surveillance, potentially exposing sensitive corporate or personal data. The subsequent ransomware and system lockout components threaten integrity and availability, risking operational disruption and financial loss. Organizations in Europe with remote or hybrid workforces may be particularly vulnerable due to increased phishing attack surfaces. The modular cloud-hosted infrastructure used by attackers complicates detection and response, potentially allowing longer dwell times. Although the campaign currently targets Russia, the techniques and tools could be adapted or spread to European targets, especially those with geopolitical or economic ties to Russia or those using similar Windows environments. The absence of software vulnerability exploitation means patching alone is insufficient; user behavior and endpoint security posture are critical factors. The campaign could impact critical infrastructure, government agencies, and private sector organizations, leading to data breaches, operational downtime, and ransom payments.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic advice: 1) Enhance user awareness training focused on recognizing social engineering and phishing attempts, emphasizing the risks of executing unsolicited scripts or attachments. 2) Harden endpoint security by configuring Microsoft Defender and other antivirus tools to detect and block Defendnot and similar tools that disable security features; enable tamper protection and monitor for unusual Defender service stoppages. 3) Employ application whitelisting and restrict execution of PowerShell scripts and VBScript to trusted contexts; use constrained language mode where possible. 4) Monitor for suspicious COM object usage and unusual network connections to cloud services, leveraging endpoint detection and response (EDR) tools with behavioral analytics. 5) Implement strict least privilege policies to limit user and process permissions, reducing the impact of credential dumping and lateral movement. 6) Regularly audit and monitor for indicators of compromise such as the provided file hashes and unusual file system or registry changes. 7) Maintain robust offline backups and test recovery procedures to mitigate ransomware impact. 8) Use network segmentation to contain infections and limit attacker lateral movement. 9) Collaborate with threat intelligence sharing groups to stay updated on campaign developments and IoCs. 10) Consider deploying deception technologies to detect early stages of the attack chain.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.fortinet.com/blog/threat-research/inside-a-multi-stage-windows-malware-campaign"]
- Adversary
- null
- Pulse Id
- 696fc0723c9020d483708e56
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashea498b9d0f0ad35c8ea2c21bf98cc557 | — | |
hash00f66065a4af319947a1004bb1dbb2c24b5e7fa3 | — | |
hash1828614be6d9bdd92f7ee30e12c8aac8eba33a6df2c92995f9bf930c3f1b992b | — | |
hash263b5ba921e478215dc9e3a397157badab415fc775cfb4681821b7446c14fb1a | — | |
hash359fe8df31c903153667fbe93795929ad6172540b3ee7f9eff4bcc1da6d08478 | — | |
hash3aa6ebb73390d304eef8fd897994906c05f3e967f8f6f6a7904c6156cf8819f9 | — | |
hash45e942ba59f3876b263a03ed7e5d5b1b250e84a0a4b4093b3c13b5fca4e12b21 | — | |
hash5443232a367a83ac2899b37c066dae3ec2010df292291db24ce3d744133218a6 | — | |
hash6222775b877b4be4f5407525d52c5889739b96c302e5a204ef369b4a51c6dab2 | — | |
hash71069a5d2a80a047ca36ca82e630d353829726d4f03a74c7522b7700c5c2bb59 | — | |
hash7b8cf0ef390a7d6126c5e7bf835af5c5ce32c70c0d58ca4ddc9c238b2d3f059a | — | |
hash7de56603a7b41fca9313231df6105dbb8148d3b0d80dfbc00e71e1d88f871915 | — | |
hashe6ca6bab85ae1eff08a59b46b7905ae0568110da172dec8367f32779094bdd08 | — |
Threat ID: 696fc78c4623b1157c44328d
Added to database: 1/20/2026, 6:21:00 PM
Last enriched: 1/20/2026, 6:35:19 PM
Last updated: 2/6/2026, 11:31:27 PM
Views: 362
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Technical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumThey Got In Through SonicWall. Then They Tried to Kill Every Security Tool
MediumHundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.