Silver Fox Expands: Winos 4.0 Malware Targets Southeast Asia with Privilege Escalation

By using the cutting-edge remote access trojans Winos 4.0 and HoldingHands RAT, a sophisticated cyber espionage campaign attributed to the Chinese threat group Silver Fox has extended its objectives beyond China and Taiwan to include Japan and Malaysia. The malware, which is distributed by phishing emails containing malicious PDFs and SEO-poisoned bogus software websites, uses Task Scheduler abuse, DLL sideloading, and privilege escalation through TrustedInstaller impersonation to avoid detection and stay persistent. Expanded targeting of industries like finance, cryptocurrencies, and government institutions is highlighted by the campaign, which is thought to concentrate on gathering intelligence locally. This emphasizes the critical need for improved user awareness, endpoint hardening, and proactive threat detection.

Technical Description

In order to deliver a multi-stage Windows infection, the campaign uses phishing (booby-trapped PDFs and LNK resume hooks) and SEO-poisoned websites. It starts with an executable sideloading a malicious DLL to load a shellcode loader (“sw.dat”), conducting anti-VM checks, and listing/terminating antivirus processes; it leaves artifacts in C Drive. It obtains persistence by manipulating Task Scheduler, causing svchost.exe to later load the malicious TimeBrokerClient.dll that allocates and decrypts shellcode (e.g., svchost.ini with a VirtualAlloc RVA, TimeBrokerClient.dll renamed to BrokerClientCallback.dll, msvchost.dat, system.dat). In order to modify protected files, the loader escalates privileges by enabling SeDebugPrivilege, stealing the Winlogon token, and posing as TrustedInstaller. It then launches HoldingHands/Winos payloads that can update C2 via the registry, attempt AV disabling and uninstall procedures, maintain a 60-second C2 heartbeat, and accept remote commands (exfiltration, screenshots, arbitrary execution). The details and technicalities of the attack campaign are discussed further:

Delivery and Infection Chain:

The main vectors are spear-phishing emails (booby-trapped PDFs and.LNK resume/portfolio lures) and fraudulent software/landing pages that ask users to download ZIP/EXE payloads. Phishing and SEO poisoning are the main vectors. In order to deceive victims into retrieving the original downloader, SEO-poisoned pages pose as well-known software (such as Chrome, Telegram, WPS, etc.); PDFs mimic official documents (such as tax or ministry drafts) that contain dangerous links. The Infection chain was identified as follows:

  • Victim opens a malicious PDF or .LNK (resume), clicks link or triggers embedded shortcut and downloads a ZIP or EXE (often presented as an audit/tax or installer).
  • The EXE sideloads a renamed/legitimate DLL (DLL side‑loading) which acts as a shellcode loader and drops files.
  • Loader (sw.dat) enables SeDebugPrivilege, steals the Winlogon token, impersonates TrustedInstaller to rename/protect system DLLs and create a Task Scheduler trigger so svchost.exe will load the malicious TimeBrokerClient.dll.
  • dll allocates memory using the RVA from svchost.ini, decrypts shellcode from msvchost.dat/system.dat, and launches HoldingHands/Winos which establishes a persistent C2 channel (60‑second heartbeat) and awaits commands.

Technical Capabilities:

The deployed payloads (Winos 4.0, HoldingHands, HiddenGh0st variants) are full‑featured RATs include arbitrary command execution, file download/execution, exfiltration, credential, and metadata harvesting, process and service enumeration, AV/product detection and termination procedures, and anti-VM and anti-analysis checks. Task Scheduler abuse and DLL sideloading are employed to establish persistence; RVA pointers (notably svchost.ini → VirtualAlloc) are used to dynamically invoke memory allocation and decryption; and the virus can adjust its C2 address using a registry item.

The use of DLL sideloading + TrustedInstaller impersonation for strong persistence and stealth, SEO poisoning to increase reach, multi-stage socially engineered delivery (localized lures), and selective AV disabling (including attempts to uninstall security products) are all examples of the actor’s sophisticated operational tradecraft. Additionally, they reuse/adapt Gh0st RAT lineage code and employ BYOVD techniques (abuse of weak drivers), demonstrating a nimble team that combines espionage and crimeware approaches for gathering intelligence in the region.

Attribution and Evolution:

The Silver Fox cluster, also known as SwimSnake, Valley Thief, UTG-Q-1000, and Void Arachne, was identified through tooling, TTPs, and reuse of Gh0st-derived code. The family has evolved from SEO-poisoned HiddenGh0st distributions and resume-based LNK droppers to modular multi-stage loaders (Winos 4.0) and a distinct HoldingHands RAT. This includes registry-driven C2 updates, Task Scheduler triggers, and TrustedInstaller escalation to increase survivability and complicate behavior-based detection.

Active Campaign and Geographic Spread:

The Campaigns recent initiatives (recorded until mid-2024 – 2025 activity) expanded from China and Taiwan to Japan and Malaysia, using targeted emails and localized decoys for Japanese, Chinese, and Malay speakers. Infrastructure has included U.S.-hosted C2 in some operations (e.g., Operation Silk Lure) and bespoke phishing landing sites for each region to maximize credibility and click-through.

Conclusion:

In order to achieve stealthy, long-lived access that prioritizes intelligence collection and disruption of security controls, the Silver Fox campaigns show a step-change in regional targeting and operational resilience. The attackers use multi-stage loaders, DLL sideloading, Task Scheduler abuse, and convincing, localized social engineering and SEO poisoning. Organizations should treat any successful phish or unexpected installer as potentially persistent and capable of deep system compromise due to the malware family’s modularity and ongoing evolution. As a result, detection must go beyond signature checks and include monitoring for unusual DLL loads, privilege escalation events, abnormal Scheduled Tasks use, and registry changes to C2 configuration.

Impact

Long-term espionage is made possible by compromised hosts: clipboard data, screenshots, credentials, system metadata, and arbitrary command capabilities can result in data theft, operational interruption (AV termination, task/service manipulation), and possible lateral movement. The danger of intellectual property loss, regulatory exposure, and reputational harm is higher for targets in the banking, cryptocurrency, trading platforms, government, and human resources sectors.

IOC and Context Details

Topics Details
Tactic Name Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Command & Control, Exfiltration
Technique Name Phishing (malicious PDF, LNK)
SEO-poisoning
DLL sideloading (DLL search order hijack)
Scheduled Task abuse
Token impersonation / privilege enabling
AV / service termination
Registry-based C2 update
Remote Access Trojan (RAT) operation
Sub Technique Name Spear-phishing with booby-trapped PDFs
.LNK résumé lures
Drive-by downloads via SEO-poisoned pages
DLL side-loading (renamed TimeBrokerClient.dllBrokerClientCallback.dll)
Create or modify Scheduled Tasks to launch svchost.exe and load malicious DLLs
Enable SeDebugPrivilege and steal Winlogon token to impersonate TrustedInstaller
Terminate or uninstall antivirus products
Store or update C2 address in the Windows Registry
Attack Type Malware
Targeted Applications Fake installers impersonating Google Chrome, Telegram, Youdao, Sogou AI, WPS Office
Region Impacted China, Taiwan, Japan, Malaysia
Industry Impacted Finance
Cryptocurrency
Trading Platforms
Government Agencies
IOC’s SHA-256
d0f86cd6be44f534ec118e3517cdedcb63e301187c1e4fe66ca35570f5c8b4aa
e3d7b17b317606e245d1bcbecf5c5e41bf0e4e51d9d7e82543f81f4da8f715a3
3ee3491eb9321394d188cf224b721e195d0b5aca3fb5fc3fa03b80d7aac13e0e
c7fbdc12b19f8267f68b468b0458ad5678d85e19665281c2da0228b62fa64ec0
e7396a73516cc82be0cd2b829d6bb0da1659b4f8d45d630aa3de372315a709e9
9c41cac9b575074989db607e935428a824a8eeba119df800e874cc71c58a158f
6215afc394294ae21c66ecfddf0fd7919430505f62c9c01889fe25c2be8faee2
16006f9a47680d90f6ebe14d913575e7a747c5f434d725d4b56cae8b847356fb
5d502e26873c2a0fbcb4fef7217853776de1ce3cff6b94774ef4763e151f41c9
d01a2fb66e6de2d079865445e106535c7522dfc1c406de70423221941f2c1793
4101ac94a21601935bfcd2a6ebfeaabd7c2c10bf7a72bc363e8c7b1e541b362c
4307cb04d923254df31aa5c133dd6c5e17cc367351e902d336fed2ccbf12b5d2
e0a444eabd9edbb0a12978aab8b58883fc251f47bbb8a01448962c1bd6a1e5e7

IP Address
154.209.5.135
CVE NA

Recommended Actions

  • Block and monitor access to known malicious domains and phishing URLs used in this campaign.
  • Deploy EDR rules to detect suspicious Scheduled Task creation and abnormal DLL loads from System32.
  • Harden endpoint protection by enforcing application allowlisting (e.g., AppLocker or WDAC).
  • Restrict and audit use of SeDebugPrivilege and monitor token impersonation activities.
  • Train users, especially HR and finance teams, to recognize document-based phishing lures.
  • Patch or block vulnerable drivers and implement a denylist for known BYOVD abuse cases.
  • Inspect outbound traffic for 60-second beaconing patterns and unusual registry-based C2 configurations.
  • Establish an incident response playbook focused on multi-stage loader and RAT-based intrusions.

References

https://app.daily.dev/posts/silver-fox-expands-winos-4-0-attacks-to-japan-and-malaysia-via-holdinghands-rat-kd4acladi