Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1566.001
Phishing: Spearphishing Attachment
T1059.003
Command and Scripting Interpreter: Windows Command Shell
T1105
Ingress Tool Transfer (via curl[.]exe renamed to url.exe)
T1548.002
Abuse Elevation Control Mechanism: Bypass UAC (via computerdefaults.exe and Debug Object Hijacking)
T1068
Exploitation for Privilege Escalation (BYOVD attack via wsftprm.sys)
T1562.001
Impair Defenses: Disable or Modify Tools
CVE Profile
NVD Score: N/A (BYOVD General Technique) CISA KEV Status: Inactive/Unknown for this specific payload.
Telemetry
Hashes (SHA256) 64ee7a2e6259286311c8ba1c7b6d30e1e52fe78befcfd1b71b291c788f3e3e6a
(Setup.exe)
156f31b37ee0d6e7f87cdc94dcd2d3b084b2e15da08bd8588e17d6bdc43159fe
(AISafeSDK64.dll).
IPs
47.76.86[.]151
154.91.64[.]246.
Domains
bqdrzbyq.cn
taxfnat.tw
njhwuyklw.com
twtaxgo.cn.
Registry Keys
Queries SYSTEM\CurrentControlSet\Control\CI\Config\VulnerableDriverBlocklistEnable.
Constraint
The payload structure suggests high modularity, as secondary plugins are stored directly in the registry for fileless execution without touching the disk.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Initiate incident response protocols for potential APT compromise and broadcast internal risk advisories regarding Taiwanese tax-themed and e-invoice lures.
DETECT (DE) – Monitoring & Analysis
Command
Query SIEM for anomalous process creation events involving cmd[.]exe executing from an LNK file, specifically monitoring for curl[.]exe being copied to %public%\501\url.exe.
Command
Hunt for outbound network connections to 47.76.86[.]151 and 154.91.64[.]246.
RESPOND (RS) – Mitigation & Containment
Command
Isolate endpoints exhibiting wsftprm.sys driver loads or unexpected execution of computerdefaults.exe.
Command
Forensically acquire systems where security services (e.g., MsMpEng.exe, 360tray.exe, SecurityHealthService.exe) have been unexpectedly terminated.
RECOVER (RC) – Restoration & Trust
Command
Rebuild infected hosts entirely from known-good gold images due to the kernel-level compromise established by the malicious driver.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Enforce Microsoft's Vulnerable Driver Blocklist strictly via Windows Defender Application Control (WDAC).
Command
Block external inbound delivery of RAR/7z compressed archives at the email gateway.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and Browser Extensions. (
Note: Due to driver-level compromise, a full OS reinstall is highly recommended).
Hardening & References
Baseline
CIS Benchmarks.
Framework
NIST CSF 2.0 / SP 800-61r3.
Style
Ensure Memory Integrity (HVCI) and the Microsoft Vulnerable Driver Blocklist are toggled ON in Windows Security settings. Limit the execution of script interpreters from User profile directories.
Source
FortiGuard Labs Threat Research