LevelBlue + SentinelOne: Global Partnership to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More

LevelBlue + SentinelOne: Global Partnership to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
SentinelOne
Advancing integrated, intelligence‑driven security operations
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Partner Portal

Trojanized CPUID HWMonitor Installer Delivers Fileless .NET Payload via Obfuscated IPv6 Scriptlet

Overview

Recent reporting has identified a trojanized version of the CPUID HWMonitor installer being used to deliver a multi-stage, fileless malware chain leveraging trusted Windows binaries. Upon execution, the installer initiates a sequence involving PowerShell, MSBuild, and regsvr32, ultimately leading to the execution of malicious scriptlet files such as Clippy.sct and a secondary launcher scriptlet. These scriptlets utilize ActiveX (WScript.Shell) to silently invoke:

"C:\Windows\System32\regsvr32.exe" /s /u "/i:C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Clippy.sct" scrobj.dll

This is a well-known living-off-the-land technique that enables the execution of remote or local scriptlet payloads without dropping traditional executables to disk.

An analysis of Clippy.sct reveals that it serves as the core payload loader, leveraging .NET interoperability within JScript to reconstruct and execute a hidden assembly entirely in memory. The scriptlet contains a large embedded array of fake IPv6 addresses, which are not network indicators but rather an obfuscated representation of raw binary data.

Figure 1. Array of fake IPv6 addresses
Figure 1. An array of fake IPv6 addresses.

Dedicated to hunting and eradicating the world's most challenging threats.

SpiderLabs

At runtime, the script expands compressed IPv6 notation (::), converts each 16-bit segment into its corresponding byte pair, and appends the result into a .NET MemoryStream.

Figure 2. IPv6 decoding routine converting 16-bit segments into raw byte stream
Figure 2. IPv6 decoding routine converting 16-bit segments into raw byte stream.

This process rebuilds a serialized .NET payload, which is then deserialized using BinaryFormatter and executed via dynamic invocation, leading to the instantiation of a malicious class (ServiceClass) responsible for further payload execution.

Figure 3. Deserialization and dynamic invocation of reconstructed .NET payload
Figure 3. Deserialization and dynamic invocation of reconstructed .NET payload.

This technique demonstrates a layered evasion strategy combining obfuscation, in-memory execution, and abuse of legitimate system utilities. Encoding the payload as IPv6 strings helps bypass static detection and complicates analysis, while deserialization-based execution avoids writing the reconstructed binary to disk. Additionally, references within the payload suggest follow-on behavior involving reading a secondary file (data.dat) and executing it via native Windows APIs, such as VirtualAlloc and CreateThread, likely indicating shellcode execution.

 

Recommendations

Organizations should recognize that even trusted vendor sites can be compromised and should validate all downloaded installers prior to execution. This includes verifying code signatures, comparing file hashes against known-good values, and scanning binaries with security tools before deployment. Where possible, restrict the execution of newly downloaded files until they have been validated in a controlled environment.

Deploying and properly configured endpoint detection and response (EDR) solutions is critical to identify behaviors consistent with this technique, including unusual process chains involving installers spawning PowerShell, MSBuild, or regsvr32. Monitoring command-line activity and enforcing alerts on suspicious parent-child relationships can help detect this type of fileless execution early.

Organizations should also monitor for the abnormal usage of regsvr32 with scriptlets (.sct files), the execution of MSBuild from user-writable directories, and script-based payload reconstruction patterns such as large embedded arrays or encoded data transformations. These behaviors can be indicators of this threat technique and should be prioritized for detection and response.

 

Indicators of Compromise

File Name/C2

SHA256 Hash/Artifacts

ActiveX.sct

0CE8DB66D881E98341A4F40754665059C028F27BA083B95E88CB7D1624390B5C

Clippy.sct

B31A9D919750567167A07EB6D4D53F9DCD25E8343624D54D98F528832CB4CDC7

Portable HWMonitor Installer (1.63)

3d91f442ddc055e19e3710482e1605836c799249dacd43d99843257a3affd2d2

Fake CRYPTBASE.dll

a27df06c7167eced1ddaeb8adccaa5f60500f52bc7030389eed2a0903cdf8286

Trojanized HWMonitor

02db6764d1f13b837b0a525e5931bdbc67e7a2a4d071e849c7e087255d4a2d5b

0uenkytg.cs

788d3f14ff6a701b114e0b40990379c0302e26c1bbbce22a7ee5c872c7df1d1f

Referenced C2

hxxps://welcome[.]supp0v3[.]com/d/callback

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo