
Security teams have observed a series of spear phishing attacks targeting Taiwan. The primary threat involves the delivery of Winos 4.0 (ValleyRat), a modular Windows Remote Access Trojan (RAT). This campaign is highly attributed to the APT group Silver Fox (also known as Void Arachne). The activity is assessed as "High Severity" due to its combination of sophisticated social engineering, rapidly rotating delivery infrastructure, and aggressive evasion techniques designed to maintain long-term remote control over victims.
This campaign heavily leverages tax and invoice-related themes, making it particularly dangerous for organizations that frequently handle external accounting, legal compliance, and government documentation. Finance and accounting departments are main targets, as attackers often disguise malware as "official documents" to infiltrate these high-value segments.
The campaign uses localized, practical business scenarios as baits, mimicking Taiwanese standard workflows, including:
Victims are lured into opening malicious archives (ZIP) or clicking embedded links. These payloads are hosted across rotating domains and cloud storage services. This high volatility allows attackers to bypass static defense mechanisms, such as one-time domain blocklists.
Primary Threat: Enterprise Infiltration via Winos 4.0
Once executed, Winos 4.0 provides attackers with a flexible platform for remote management and post-exploitation. Its modular plugin architecture allows attackers to load specific modules on demand, including:
A key shift in this campaign is the move toward stealthier and low-footprint execution. This includes storing modules within the Windows registry and utilizing in-memory loading to minimize disk-based access, significantly increasing the difficulty of forensic detection.
The primary impact observed on compromised Windows systems is widespread file encryption, leading to immediate operational disruption. This prevents access to critical data and halts business processes. Furthermore, exfiltrated data may be weaponized for subsequent follow-on attacks.
Scope of Impact
While current observations focus on Taiwan, this APT group remains active across Asia with a broad historical target list, including:
The core of this event involves a multi-stage phishing campaign targeting Taiwan. It begins with the delivery of Winos 4.0 (ValleyRat), followed by UAC bypass and privilege escalation. The attackers utilize a BYOVD (Bring Your Own Vulnerable Driver) technique to load a vulnerable signed driver (wsftprm.sys) to evade defenses at the kernel level. Finally, a modular RAT is deployed, with core components and plugins downloaded from the C2 server, stored in the Windows registry, and executed via in-memory loading.
In other related cases, the delivery methods for Winos 4.0 have evolved from LNK-based download chains to DLL side-loading. The infrastructure leverages rotating domains and cloud storage services while maintaining a stable C2 (47.76.86.151) for post-exploitation control.
Reconnaissance
Winos 4.0 queries the Windows registry value VulnerableDriverBlocklistEnable at:
This allows the malware to determine if Microsoft’s Vulnerable Driver Blocklist is enabled and adjust its driver-loading strategy accordingly.
Security Tool Identification via Process Enumeration:
After gaining kernel-level capabilities, the malware compares running processes against a hardcoded list of security products to identify and terminate active defenses.
Resource Development
Rotating Delivery Infrastructure:
Attackers register multiple domains and utilize Chinese cloud storage services to host malicious payloads and archives:
Initial Access
Localized Spear Phishing:
Phishing emails mimick Taiwanese tax and e-invoice workflows (e.g., tax audit notifications, filing software installers, or cloud invocie download).
Payload Delivery through Attachments or Links:
Execution
Campaign 1: LNK → cmd.exe → Staged Download → Installer Extraction
LNK Execution Chain: Use relative paths to call the command processor: ..\\..\\..\\..\\Windows\\System32\\cmd.exe.
Obfuscated Scripts: The script is responsible for multi-staged installation and downloading.
Installer / Dropper Behavior: When Setup64.exe (disguised as "64-bit Installer_Special Edition") is executed, it searches for an embedded executable resource named EXPAND. It then decompresses and writes this resource to: C:\\ProgramData\\Golden. This establishes a local foundation for the subsequent deployment of ValleyRat and the implementation of defense evasion via drivers.
Campaign 2: Legitimate EXE and Malicious DLL Side-Loading
The attacker's transition from LNK intermediate chains to DLL side-loading involves the following steps:
A distinct developer artifact, a PDB path, is observed within the malicious DLL: C:\\Users\\Administrator\\Desktop\\大馬專案(二)\\x64\\Release\\DLL.pdb
This indicates a clear division of labor within their organization. This artifact serves as a critical lead for tracking and analyzing other related malicious activities.
Persistence
Registry-Resident Modules (Fileless): After C2 communication is established, core and plugin modules are downloaded and stored directly in the Windows registry, then loaded into memory to minimize the disk footprint.
Privilege Escalation
Bypass UAC to Gain Higher Privileges:
Kernel-Level Escalation through BYOVD: The malware loads wsftprm.sys (a signed 64-bit kernel driver, "Topaz OFD - PM", v2.0.0.0) to gain kernel-mode execution capabilities.
Defense Evasion
This campaign utilizes multi-layered defense evasion techniques across all stages of the operation.
Credential Access
Interception of Login Credentials via Plugins:
This campaign downloads a “Login Module” plugin that supports keylogging capabilities, enabling the interception of user-entered usernames and passwords.
Discovery
Collection
Screen Capture via Plugin Modules: Winos 4.0 downloads screen-oriented plugin modules, such as:
These modules support screen capture or remote desktop-like data collection, allowing attackers to monitor user activities and exfiltrate sensitive information displayed on the screen.
Command and Control (C2)
Phased Payload Retrieval via Infrastructure Attack
Hardcoded C2 with Runtime Decoding
Modular Post-Compromise Control
The success of the Winos 4.0 campaign stems from its use of localized phishing (tax audits, filing software, and invoice themes) integrated with multi-stage loaders, DLL side-loading, and BYOVD techniques utilizing the signed driver wsftprm.sys for kernel-level defense evasion.
Consequently, mitigation strategies must be multi-layered. Organizations should operate under the assumption that "mere static domain blocking is insufficient," as attackers frequently rotate domains and exploit cloud storage services.
1. Block Initial Access: Email, Web, and User Execution Controls
Strengthen Phishing Detection
Neutralize Malicious Archives and LNK Downloaders
Security Awareness and Phishing Simulations
2. Stop Payload Delivery and Pre-Exploitation on Endpoints
Detect/Block Suspicious Command Chains and LOLBins
Hunt or block patterns identified in this campaign, such as:
Intercepting these early-stage high-risk signals can prevent the full establishment of the RAT or its plugin stack.
Application Allowlisting
The second wave of the campaign utilizes DLL side-loading (legitimate EXEs loading malicious DLLs from the same directory). Mitigation includes:
3. Prevent Privilege Escalation and Driver Abuse (BYOVD)
Activate and Enforce the Execution of Microsoft’s Vulnerable Driver Blocklist
The malware explicitly checks the following registry values:
Ensure these controls are enabled and monitored. This is a primary mitigation, as the attack's evasion relies heavily on loading wsftprm.sys.
Monitor and Alert Suspicious Driver Loading
Winos 4.0 uses native APIs (e.g., NtLoadDriver) to bypass standard service monitoring. Ensure EDR/SIEM tools collect driver load events and correlate them with:
Minimize Local Admin Privileges and Harden UAC
The malware bypasses UAC via whitelisted binaries like computerdefaults.exe. Reducing the prevalence of local administrator accounts and monitoring for abnormal elevation through these binaries decreases the likelihood of attackers loading kernel drivers or disabling defenses.
4. Restrict C2 and Post-Exploitation via Network Controls
Block and Hunt Known Infrastructure
For immediate defense and retroactive hunting, block:
Recommended Incident Response (IR) Actions
Domains
bqdrzbyq[.]cn
taxfnat[.]tw
njhwuyklw[.]com
twtaxgo[.]cn
taxhub[.]tw
taukeny[.]com
taxpro[.]tw
lmaxjuyh[.]cn
tkooyvff[.]cn
etaxtw[.]cn
twswsb[.]cn
IP
47[.]76[.]86[.]151
URLs
hxxps://twmoi2002.tos-cn-shanghai.volces[.]com/E-Invoice.rar
hxxps://sdfw2026024.tos-cn-shanghai.volces[.]com/E-Invoice.rar
hxxps://twtaxgo[.]cn/uploads/20260129/taxIs_RX3001.7z
SHA256
CyCraft is a cybersecurity company founded in 2017, focusing on autonomous AI technology. Headquartered in Taiwan, it has subsidiaries in Japan and Singapore. CyCraft provides professional cybersecurity services to government agencies, police and defense forces, banks, and high-tech manufacturers throughout the Asia-Pacific region. It has received strong backing from the CID Group and Pavilion Capital, a Temasek Holdings Private Limited subsidiary.