CyberSecurityNews

New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass


A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have identified a previously unknown implant called TencShell, a sophisticated tool capable of giving attackers full remote control over a compromised system.

The discovery highlights how threat actors are quietly repurposing publicly available offensive tools to carry out targeted intrusions with far less effort than before.

TencShell was found actively deployed against a global manufacturing company with regional operations spread across multiple countries.

The attack was intercepted at the company’s India site and traced back to a third-party user with a legitimate connection to the customer’s internal environment.

Attackers exploited that trusted access as a bridge, effectively turning a routine business relationship into a dangerous and highly capable entry point.

Analysts at Cato Networks identified the attempted intrusion in April 2026 and blocked it before the attacker could establish durable remote control.

Their investigation revealed a carefully constructed attack chain involving staged payloads, masqueraded file types, and command-and-control communication specifically designed to blend into normal web traffic.

The initial infection vector remains unknown but likely involved phishing, a malicious download, or another web-based delivery method.

Screen Control, UAC Bypass, and Browser Artifact Access

TencShell is derived from Rshell, an open-source framework designed for cross-platform offensive security use.

The threat actor customized and repackaged it, adding communication patterns that closely mimic Tencent-style API traffic to make malicious requests look like ordinary application activity.

The name combines “Tenc” for those Tencent-like C2 paths and “Shell” for its core remote access behavior.

The broader concern goes beyond this single incident. Attackers no longer need custom malware development pipelines to pull off a sophisticated intrusion.

Adapting freely available offensive frameworks is often enough to build a capable, hard-to-detect tool, and that reality lowers the barrier for a much wider range of threat actors.

TencShell functions as a full operator framework, and its capabilities stretch far beyond basic command execution.

Recovered code modules confirm that the implant supports screen capture, live screen streaming over WebSocket, and real-time keyboard and mouse simulation.

Functions like SendInput, MouseClick, KeyTap, and GetScreenWebSocket were all embedded within the tool, giving an operator direct interactive control of an infected host.

Extracted TencShell package paths and function names (Source – CATO Networks)

The implant also includes dedicated routines for accessing browser artifacts from both Chrome and Microsoft Edge. Recovered opcodes confirm operations for reading and clearing saved sessions, login data, and cookies from both browsers.

This creates a direct path to credential theft and session hijacking for any organization where TencShell takes hold.

A UAC bypass module, documented under the opcode UAC_BYPASS, allows the attacker to gain elevated privileges without triggering the standard Windows security prompt.

Combined with SOCKS5 proxying, DLL loading, file transfer, and persistence through a registry run key disguised as “OneDriveHealthTask,” TencShell is built for long-term, stealthy access rather than a quick smash-and-grab.

TencShell Infection Chain and Delivery Method

The attack followed a clear multi-stage delivery pattern. A lightweight first-stage dropper was executed after initial access, designed to stay small and quietly pull down the next payload while using a fake User-Agent to blend outbound requests into normal traffic.

OencShell infection chain (Source - CATO Networks)
OencShell infection chain (Source – CATO Networks)

The dropper then retrieved what appeared to be a standard web font file with a .woff extension, the kind websites routinely use to load custom typefaces.

Inside that file was Donut shellcode, an open-source tool capable of loading Windows payloads directly in memory, bypassing the need to write anything to disk.

This disguise helps the request look like a routine browser asset fetch rather than a malware delivery operation.

After retrieval, the shellcode was loaded into a memory region, marked as executable, and launched through a new thread within the originating process.

Donut then reflectively mapped TencShell into memory, completing the chain and preparing the implant for active command-and-control communication.

Security teams are advised to flag unusual outbound requests to unfamiliar endpoints, unexpected .woff paths outside of normal browser context, and unknown autorun entries in the Windows Registry.

Indicators of Compromise (IoCs):-

TypeIndicatorDescription
IP Address45[.]64[.]52[.]242Attacker-controlled C2 infrastructure 
IP Address192[.]238[.]134[.]166Attacker-controlled C2 infrastructure 
IP Address45[.]115[.]38[.]27Attacker-controlled C2 infrastructure 
Domaingin-tne-fahcesmukw[.]cn-hangzhou[.]fcapp[.]runAttacker-controlled C2 domain 
SHA256 Hashc3ecb90c9915daa23aec51f93ff8665778866f05TencShell-related malware sample 
SHA256 Hash92b2413578c8ba9708df6091660af53acdc505f3TencShell-related malware sample 
SHA256 Hash33f6d4f4269cec740a5eb05e41a4c7926742606bTencShell-related malware sample 
SHA256 Hash18f22d3337facbbd0047c19f4efdea75ccb9e3ecTencShell-related malware sample 
SHA256 Hash793cb9b1d7846afa4fb8e900d6e9ed9501dc3e7eTencShell-related malware sample 
SHA256 Hash673b4f2682f29b19ecabf9a6ec9c3042c9b1cfb3TencShell-related malware sample 
SHA256 Hash9dbdddf1dda680ab750a707084839fe970266964TencShell-related malware sample 
SHA256 Hash957b8eaa7e25b4d9ca1050cd7ab19e4a2add707dTencShell-related malware sample 
SHA256 Hash12f76f48727916d6c05f53f8cd94915db5de5ffcbfa02c4807c27e090cfa47cTencShell-related malware sample 
SHA256 Hash14ae8de40153c66455d972e6e98fe06fb68db7301ba126557e96599527bc5509TencShell-related malware sample 
SHA256 Hashc1ba73df60e12b3feb8b5574e65cfceb6910460ab7fae2cf5554769fafdad049TencShell-related malware sample 
SHA256 Hashe5eff99959683480d2280c931e433af836adf6a8b7a8489b1af17cddcf480cf6TencShell-related malware sample 
SHA256 Hash30fe91200a2bb4aed13b1a1ba4ec8fd4454566f5929ffed4f537d9a87c1bf118TencShell dropper or payload 
SHA256 Hash77f6bec5dd217151fcd03087a6e7ba1070f0fa603801fb128a4097076c9976d3TencShell dropper or payload 
SHA256 Hash6ed6058f0b0735ba56b781dea39353625fcb56bc3e77bf2d26a648511d754d21TencShell dropper or payload 
Registry KeySoftwareMicrosoftWindowsCurrentVersionRunPersistence registry run key used by TencShell 
Registry ValueOneDriveHealthTaskRegistry value name used by TencShell for autorun persistence 

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.



Source link