Technical Analysis & Remediations
MITRE ATT&CK Mapping
T1566.001
Phishing: Spearphishing Attachment (French CV-themed VBS dropper named nouveau_curriculum_vitae.vbs).
T1082
System Information Discovery (WMI Win32_ComputerSystem.PartOfDomain check).
T1548.002
Abuse Elevation Control: Bypass UAC (Modifies EnableLUA registry key).
T1562.001
Impair Defenses: Disable/Modify Tools (Defender exclusions via PowerShell).
T1555.003
Credentials from Password Stores: Browsers (ChromElevator module bypasses Chromium App-Bound Encryption).
T1496
Resource Hijacking (XMRig Monero mining using the WinRing0x64.sys driver).
CVE Profile
N/A [CISA KEV Status: Inactive].
The attack telemetry relies entirely on social engineering and native Windows administration abuse rather than specific software vulnerabilities.
Telemetry
Hashes
nouveau_curriculum_vitae.vbs: f33586a516e58b2f349dfd7743702f43f5e0ece769ed46088d3400d1b0f0b10b.
RuntimeHost.exe
853d8001c173520a7f459be73ac6bb7f0363db3beb7632f0a6059fb88b288b6a.
IPs/Domains
46.105.76[.]166 (C2)
217.64.148[.]121 (C2)
eufr18-166.workdns[.]com (C2 DDNS)
smtp.mail[.]ru (Exfiltration endpoint via port 465)
Registry Keys HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA (modified to value 0 to disable UAC).
HKCU\Software\Microsoft\Windows\CurrentVersion\Run (persistence for Microsoft Media Service).
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Initiate incident response protocols for potential enterprise-wide credential compromise.
Command
Notify internal stakeholders that French-speaking HR and recruitment staff are actively targeted by CV lures.
DETECT (DE) – Monitoring & Analysis
Command
Hunt for wscript[.]exe spawning powershell[.]exe with command line arguments containing Add-MpPreference -ExclusionPath.
Command
Monitor outbound traffic to smtp.mail.ru on port 465 originating from scripting engines or unusual processes.
Command
Alert on explorer[.]exe establishing network connections to ports 7077 or 62046.
RESPOND (RS) – Mitigation & Containment
Command
Block access to known C2 domains including eufr18-166.workdns.com and known mining pools at pool.supportxmr[.]com.
Command
Isolate any endpoint where nouveau_curriculum_vitae[.]vbs executed successfully and obtained administrative privileges.
RECOVER (RC) – Restoration & Trust
Command
Force a mandatory password reset for all user accounts exposed on compromised endpoints, prioritizing browser-saved credentials.
Command
Revert unauthorized registry modifications to EnableLUA and remove malicious scheduled tasks named MicrosoftUpdateService.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command:
onfigure email gateways to block incoming .vbs attachments.
Command
Enforce strict AppLocker or Windows Defender Application Control (WDAC) policies to prevent unauthorized script execution from C:\Users\Public\WindowsUpdate\.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Forcefully restart the machine if encountering a persistent User Account Control (UAC) loop. The Environmental Reality Check confirms that the primary payload bypasses standalone home computers, meaning the emergency threat level is significantly downgraded.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G) if any administrative prompts were accepted during the UAC loop.
Priority 3: Persistence
Command
Check Scheduled Tasks for MicrosoftUpdateService and inspect Registry Run keys for z_MicrosoftEdgeAutoLaunch_2EDFBF or Microsoft Media Service.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Enforce UAC, restrict script execution).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Securonix Threat Research