Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook

A sophisticated Visual Basic Script (VBS) malware dubbed “Silent Watcher” has emerged as a persistent threat targeting Windows systems, demonstrating advanced data exfiltration capabilities through Discord webhooks.

This stealer, part of the Cmimai malware family, represents a concerning evolution in information-stealing tactics that leverage legitimate communication platforms to bypass traditional security measures.

The malware operates through a carefully orchestrated multi-stage attack process, beginning with the execution of a VBS script that immediately establishes persistence on infected systems.

Google News

Upon initialization, Silent Watcher systematically gathers comprehensive system information through Windows Management Instrumentation (WMI) queries, collecting details about the operating system, user credentials, and computer specifications.

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook
System Information Collection (Source – K7 Security Labs)

K7 Security Labs researchers identified this particular strain through its distinctive operational signature and unique webhook communication patterns.

What makes Silent Watcher particularly dangerous is its ability to remain undetected while continuously monitoring victim systems.

The malware creates multiple PowerShell scripts dynamically, including “vbs_ps_browser.ps1” for browser metadata extraction and “vbs_ps_diag.ps1” for screenshot capture functionality.

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook
Operational Workflow (Source – K7 Security Labs)

These scripts are designed to circumvent PowerShell execution policies and operate with minimal system impact.

The stealer’s exfiltration mechanism demonstrates sophisticated technical implementation, utilizing both WinHttp.WinHttpRequest.5.1 and MSXML2.ServerXMLHTTP objects as fallback mechanisms.

This redundancy ensures reliable data transmission even in restricted network environments.

The malware formats stolen data as JSON payloads before transmitting to Discord webhooks, making the traffic appear as legitimate communication.

Advanced Persistence and Evasion Mechanisms

Silent Watcher employs a particularly cunning persistence strategy through timed execution cycles.

After completing its initial data collection phase, the malware enters an endless loop with precisely calculated one-hour intervals, as demonstrated in the code:-

Dim oneHourMs: oneHourMs = 3600000
Do
    LogAction "Sleeping for 1 hour.."
    WScript.Sleep oneHourMs
    LogAction "Hourly interval: Attempting diagnostic report..."
    Call AttemptDiagnosticReportViaPS()
Loop

This timing mechanism allows the malware to continuously capture updated screenshots and system states without triggering immediate suspicion.

The stealer creates temporary files with randomized names in the system’s temporary folder, systematically cleaning up after each operation to minimize forensic traces.

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook
vbs_reporter_log.txt (Source – K7 Security Labs)

All activities are meticulously logged in “vbs_reporter_log.txt”, providing attackers with detailed operational feedback while maintaining operational security through automatic file cleanup procedures.

Equip your SOC with full access to the latest threat data from ANY.RUN TI Lookup that can Improve incident response -> Get 14-day Free Trial


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.