Threat Response Unit

Weaponized in China, Deployed in India: The SyncFuture Espionage Targeted Campaign

eSentire Threat Response Unit (TRU)

January 21, 2026

23 MINS READ

What did we find?

In early December 2025, the eSentire Threat Response Unit (TRU) identified an ongoing campaign deploying a sophisticated, multi-stage backdoor for the likely purpose of long-term espionage.

The campaign targets residents of India with phishing emails that impersonate the Income Tax Department of India, luring victims into downloading a malicious archive. The threat actor's primary objective is to gain persistent, elevated access to the victim's machine for continuous monitoring of user activities, file operations, and exfiltration of sensitive information.

The infection chain demonstrates a high level of sophistication, beginning with a DLL side-loading technique where a legitimate, signed Microsoft application is used to load a malicious DLL. This initial loader is equipped with extensive anti-debugging and anti-analysis checks to thwart inspection.

Upon successfully passing these checks, the malware contacts a Command-and-Control (C2) server to download a packed shellcode. This second stage unpacks itself in memory and employs two key methods for privilege escalation and defense evasion:

A key feature of this malware is its specific targeting of Avast Free Antivirus. The unpacked DLL is identified as a variant of the Blackmoon malware family. When Avast is detected, the malware uses automated mouse simulation to navigate Avast's interface and add malicious files to the antivirus exclusion list, effectively whitelisting them to bypass detection.

The next stage of the attack deploys a custom toolkit that establishes permanent access. This toolkit uses a collection of batch scripts to weaken system security and installs a core component as a Windows service, configuring it to run even in Safe Mode. This ensures the backdoor remains active and resilient, allowing the threat actor to conduct spying activities undetected.

The final stage of the attack deploys the SyncFuture TSM (Terminal Security Management System), a commercial data security product developed by Nanjing Zhongke Huasai Technology Co., Ltd in China. While marketed as a legitimate enterprise tool, it is repurposed in this campaign as a powerful, all-in-one espionage framework. By deploying this system as their final payload, the threat actors establish resilient persistence and gain a rich feature set to monitor victim activity and centrally manage the theft of sensitive information.

eSentire's Threat Response Unit tracks this activity as "SyncFuture Espionage campaign" based on the abuse of SyncFuture/Yangtu enterprise software, the extensive use of valid code-signing certificates spanning 2019-2024, and the sophisticated multi-stage infection chain targeting Indian entities.

The campaign demonstrates characteristics consistent with advanced persistent threat (APT) operations focused on long-term espionage rather than financial gain.

Figure 1 Attack Flow
Figure 1 - Attack Flow

Initial Access

eSentire has observed targeted attacks on residents of India via spam emails sent by Sendgrid's email delivery service, with varying sender domains impersonating "भारत सरकार / Government of India" Income Tax Notice. The Subjects of the emails were "कर अनुपालन की कमी और दंड सूचना" (Translation - "Tax Compliance Deficiency and Penalty Notice") as shown below.

Figure 2 – Emails from various SendGrid-hosted sender addresses
Figure 2 – Emails from various SendGrid-hosted sender addresses

Despite Microsoft Defender for O365 successfully blocking delivery of the phishing emails, we were able to obtain the phishing lure (illustrated below). The lure featured a "Download Documents" link using the shortened URL "https://surl[.]li/wuvdwi" that redirected victims to a malicious file named "Inspection.zip" hosted on "gfmqvip[.]vip".

The threat actor's use of URL shortening techniques suggests an attempt to evade detection.

Figure 3 – Phishing email impersonating Government of India Tax Penalty notice
Figure 3 – Phishing email impersonating Government of India Tax Penalty notice

In the process of searching for similar campaigns, we identified the following list of IP addresses and associated websites:

Our investigation into these campaigns revealed that the threat actors employ dual delivery methods - not only do they embed phishing content directly within emails, but they also utilize direct links to thematically consistent phishing pages as an alternative attack vector.

Figure 4 – Similar themed phishing web page also impersonating Government of India tax document
Figure 4 – Similar themed phishing web page also impersonating Government of India tax document

The next figure lists the contents of the malicious zip archive. All files inside the archive are hidden except for an executable named, "Inspection Document Review.exe". This executable is a legitimate Microsoft Signed binary (Windows Defender Advanced Threat Protection Sense CE module) and is used for DLL Sideloading of the malicious payload "MpGear.dll".

Figure 5 – Files extracted from the downloaded zip archive
Figure 5 – Files extracted from the downloaded zip archive

The illustration below presents the digital signatures for all relevant files, specifically highlighting the sideloaded payload, "MpGear.dll", which exhibits an invalid signature.

Figure 6 – MpGear.dll with Invalid Digital Signature from Microsoft Corporation
Figure 6 – MpGear.dll with Invalid Digital Signature from Microsoft Corporation

Our examination of MpGear.dll revealed that the threat actors likely employed specialized tools to clone a legitimate Microsoft binary's digital signature into MpGear.dll.

Given the location of the Security Directory RVA, the tool allocated space at the end of MpGear.dll for the stolen signature, inserted the signature data into this reserved space, and then modified the PE's data directories members (Security Directory RVA/Size) to point to the transplanted signature and size.

Figure 7 - Transplanted digital signature in MpGear.dll
Figure 7 - Transplanted digital signature in MpGear.dll

MpGear.dll

The MPGear.dll implements a multi-layered anti-debugging routine with fallback mechanisms (Figure 8):

  1. IsDebuggerPresent: Basic check on the PEB 'BeingDebugged' field.
  2. CheckRemoteDebuggerPresent (with validation): Dynamically resolves and calls CheckRemoteDebuggerPresent from kernel32.dll. The function validates the pointer, checks the return value, and examines the pbDebuggerPresent output parameter. If any check fails, execution falls through to the next method.
  3. NtQueryInformationProcess (ProcessDebugPort ): Fallback using native API to query the ProcessDebugPort class. Returns a non-zero value (debugger port number) if a debugger is attached; otherwise returns 0.
  4. GetThreadContext: Detects hardware breakpoints in debug registers.
  5. GetTickCount Timing Check: Compares time delta against a threshold (0x64 = 100ms) to detect debugger-induced delays.

This layered approach with fallbacks ensures detection even when individual APIs are hooked.

Figure 8 - Multi-Layered Anti-Debugging Routine with Fallback Mechanisms
Figure 8 - Multi-Layered Anti-Debugging Routine with Fallback Mechanisms

Following this, the function retrieves the current time from the internet by attempting to connect to a series of hardcoded domains. It achieves this by iterating through two char arrays containing the domains and associated URI paths.

The full list of hard-coded domains is worldtimeapi[.]org, timeapi[.]io, and www.google.com. The list of hard-coded URI paths is also shown below. Each domain/URI path is used in an HTTP GET request. The primary method for obtaining the time reads and parses the "Date" header in the HTTP response.

If that fails, and the domain is either worldtimeapi.org or timeapi.io, it implements a fallback mechanism that reads the content of the response and manually parses it, searching for the JSON keys "unixtime": or "unixTime": to extract the timestamp value directly. The inclusion of www.google.com serves as a highly reliable fallback for obtaining a standard HTTP date header if the other specialized time APIs are inaccessible. The function returns a calculated timestamp upon success or zero and exits.

Figure 9 – Time Retrieval function with hardcoded Domain names
Figure 9 – Time Retrieval function with hardcoded Domain names

Following successful anti-analysis validation, the loader contacts the C2 server to download and execute the next-stage payload. The download function (see Figure 10) establishes an HTTP connection to the hardcoded C2 endpoint 8.217.152[.]225:80 and issues a GET request for the '/1bin' resource.

The downloaded shellcode is read into a temporary buffer via InternetReadFile in a loop until all bytes are retrieved. Once downloaded, the malware allocates a new region of executable memory using VirtualAlloc with PAGE_EXECUTE_READWRITE permissions. The shellcode is then copied from the download buffer into this newly allocated executable memory region.

Execution is transferred to the shellcode by calling CreateThread with the thread start address pointing to the allocated payload buffer (qword_180021C70). The main thread then calls WaitForSingleObject with the INFINITE parameter (0xFFFFFFFF), effectively blocking until the payload thread terminates, at which point the thread handle is automatically signaled by the operating system and execution returns to the main thread.

Figure 10 – Shellcode downloaded from hardcoded IP address and Execution
Figure 10 – Shellcode downloaded from hardcoded IP address and Execution

Stage 2: Encrypted Blob to Second Stage PE

Figure 11 - 1bin second-stage encrypted PE (truncated)
Figure 11 - 1bin second-stage encrypted PE (truncated)

The encrypted blob is unpacked in multiple stages, beginning with dynamic API resolution, followed by decryption and decompression layers to ultimately reveal a second-stage PE file.

API Hashing Routine

Figure 12 – API Hashing Routine
Figure 12 – API Hashing Routine

This function iterates through a given string converting each character to lowercase and applying the formula new_hash = char + 0x83 * old_hash. The malware computes hashes for required API names and then searches through the export tables of loaded DLLs (like ntdll.dll), hashing each function name until it finds a match. Resolving those APIs reveals Native APIs. Hashdb API resolver was able to identify this algorithm.

Figure 13 - API Resolver Wrapper Function and Resolved Native APIs
Figure 13 - API Resolver Wrapper Function and Resolved Native APIs

XOR Decryption

Figure 14 – XOR Decryption function
Figure 14 – XOR Decryption function

Cyberchef Recipe:

Take_bytes(0,105664,false)
XOR({'option':'Hex','string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},'Standard',false)
LZNT1_Decompress()

The data that results from the XOR decryption is not the final executable, but rather a compressed data blob that is decompressed using the RtlDecompressBuffer API, where the CompressionFormat parameter is specified as COMPRESSION_FORMAT_LZNT1. In other words, the payload is XOR decrypted and decompressed from LZNT1.

Figure 15 - CyberChef Output Showing Unpacked Stage 2 Executable
Figure 15 - CyberChef Output Showing Unpacked Stage 2 Executable

Unpacked Stage 2

The second stage is a 64-bit executable with sha256, "a416892cd439e289f188f9a85c21943b316b3489f70757d0d7df54e4edd9f14b". Static analysis reveals it was compiled Sun Nov 30 12:37:32 2025 | UTC and notably contains a debug PDB path at "C:\Users\sakur\Desktop\k7\bypassuac1-main\x64\Release\bypassuac.pdb".

Figure 16 - Stage 3 Executable Download from C2 Server (eaxwwyr[.]cn)
Figure 16 - Stage 3 Executable Download from C2 Server (eaxwwyr[.]cn)

The binary downloads the next stage "180.exe" from hxxps://eaxwwyr[.]cn domain to the %TEMP% directory (C:\Users\<username>\AppData\Local\Temp), masquerades itself as explorer.exe via PEB manipulation, and attempts UAC bypass to execute the next stage with elevated privileges. This behaviour occurs by a main function that orchestras two key techniques in sequence.

This function, "sub_1400015E0" takes a "C:\Users\Compu\AppData\Local\Temp\180.exe" command to elevate as an argument and performs the following steps:

  1. PEB Masquerading: It first modifies its own Process Environment Block (PEB) to impersonate explorer.exe.
  2. UAC Bypass: It then uses a COM-based UAC bypass technique to execute the payload 180.exe with elevated privileges.

Technique 1: Process Impersonation via PEB Masquerading `sub_1400010C0`)

This function's purpose is to make the malware process appear as if it were the legitimate Windows binary, "explorer.exe". This is a defense evasion technique used to fool security products and system monitoring tools (like Task Manager or Process Explorer) that inspect the PEB to identify a process's associated file name.

  1. Gets Process Handles: It gets a pointer to PEB via gs:[0x60].
  2. Constructs Fake Path: It builds the string C:\Windows\explorer.exe.
  3. Overwrites Process Parameters: It overwrites two key fields in the PEB's ProcessParameters structure:
    • ImagePathName: The full path to the process executable.
    • CommandLine: The command used to launch the process.
    • Both are replaced with the path to explorer.exe.
  4. Overwrites Module List: It walks the list of loaded modules in the PEB and finds its own entry, replacing the path information there with the explorer.exe path as well.
Figure 17 - PEB Masquerading Function Disguising Malware as explorer.exe
Figure 17 - PEB Masquerading Function Disguising Malware as explorer.exe

After this function runs, any tool that relies on the PEB for process information will be misled into identifying the malware as explorer.exe.

Technique 2: UAC Bypass via COM Elevation Moniker `sub_140001370`)

This function's goal is to execute the command provided to the main function with administrator privileges, bypassing the standard User Account Control (UAC) prompt. It uses a well-known "file-less" technique to bypass UAC on unpatched systems.

For those unfamiliar with this technique, it abuses a known COM auto‑elevation mechanism to execute code in a high‑integrity context through the following steps:

Resolves the ICMLuaUtil interface

Initializes COM

Uses the UAC elevation moniker

The malware invokes CoGetObject with the moniker string:
Elevation:Administrator!new:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
This requests instantiation of the CMSTPLUA COM object with administrator privileges.

Obtains an elevated ICMLuaUtil interface

Executes a command with elevated privileges

Figure 18 - UAC Bypass via COM Elevation Moniker
Figure 18 - UAC Bypass via COM Elevation Moniker

Stage 3 – 180.exe

The downloaded Stage 3 payload (180.exe) is a 32-bit Inno Setup installer disguised as "unffafa Setup" (product name: unffafa, version 1.5). Inno Setup is a legitimate Windows installer framework commonly abused by malware operators to pack malicious payloads.

This ~42 MB file with sha256, "659ff4b41b26b8ea91f7ccf968dc0305ff380571cfe7f70e80d79142142aa1a7", serves as a dropper, designed to extract and deploy additional malicious components.

Figure 19 - Stage 3 (180.exe) disguising as unffafa setup
Figure 19 - Stage 3 (180.exe) disguising as unffafa setup

Upon execution, the Inno Setup installer extracts multiple files to the C:\unffafa directory, as can be seen in the figure below.

Figure 20 - Files Dropped by 180.exe to C:\unffafa Directory
Figure 20 - Files Dropped by 180.exe to C:\unffafa Directory

Among the dropped files, the batch script myxmapp.bat contains obfuscated code, as shown in the next figure.

Figure 21 - Obfuscated myxmapp.bat Content
Figure 21 - Obfuscated myxmapp.bat Content

The batch script myxmapp.bat performs conditional file operations based on the presence of Avast antivirus software. The script checks for the AvastUI.exe process using the TaskList command:

The clientconf.ini file contains "MZ" characters only (PE header magic bytes) and is concatenated with various .dat files to reconstruct executable payloads.

If Avast is running (label :02):
Concatenates clientconf.ini, av1.dat, and av2.dat into game-float-core.dll
Exits

If Avast IS NOT running (label :03):
Creates c:\install\ directory
Concatenates clientconf.ini, y1.dat, and y2.dat into c:\install\mysetup.exe
Copies myxmapp.ini to c:\install\MySysConfig.ini
Concatenates clientconf.ini and wr.dat into myxmapp.exe
Executes c:\install\mysetup.exe
Exits

Figure 22 - Deobfuscated myxmapp.bat Showing Conditional Execution Logic
Figure 22 - Deobfuscated myxmapp.bat Showing Conditional Execution Logic

Blackmoon

game-float-core.dll Analysis
The game-float-core.dll is a malicious DLL file with the following characteristics:
SHA256: 92b48284905fda41a72697ee69aa4557781f1c252d544f675f6033f6389f8e1f
Compiler Timestamp: Mon Oct 27 02:50:23 2025 UTC
Packer: UPX packed

Figure 23 - myxmapp.exe Import Table Showing game-float-core.dll Dependency
Figure 23 - myxmapp.exe Import Table Showing game-float-core.dll Dependency

Digital Signature: Invalid (signature "SAND STUDIO CORPORATION LIMITED" on Wednesday, October 30, 2024 12:36:23 AM) as can be seen in Figure 24.

Figure 24 - Invalid Digital Signature of game-float-core.dll
Figure 24 - Invalid Digital Signature of game-float-core.dll

Avast Antivirus Evasion via Automated Exception Creation

Analysis of the unpacked game-float-core.dll (SHA256: 962F7DA30F3D4F876FAE91E20522C805A237FC54043792505F11DD4EA673DC80) identifies it as a variant of the Blackmoon malware family.

Blackmoon is a well-documented banking trojan and information stealer that has been active in targeted campaigns, primarily affecting users in South Korea and other Asian regions.

Figure 25 - BlackMoon Runtime Identifiers in game-float-core.dll
Figure 25 - BlackMoon Runtime Identifiers in game-float-core.dll

The binary contains hardcoded error-handling strings including "BlackMoon RunTime Error:" and "Blackmoon". These identifiers match known BlackMoon runtime signatures documented in sandbox analysis. Broadcom's research team has also observed Blackmoon masquerading as legitimate Chinese security software, a behavior consistent with the findings in our investigation.

Upon analysis, the unpacked DLL reveals a sophisticated evasion technique targeting Avast Free Antivirus through automated GUI interaction. The malware's objective is to add the detected file (C:\Windows\SysWOW64\msres\Setup.exe) to Avast's IDP (Intrusion Detection Prevention) exclusion list without directly disabling the antivirus engine.

Figure 26 - Decompiled Code Showing Avast Window Detection and Setup.exe Process Monitoring
Figure 26 - Decompiled Code Showing Avast Window Detection and Setup.exe Process Monitoring

Execution Flow:

Figure 27 - Mouse Click Automation with ClientToScreen Coordinate Conversion
Figure 27 - Mouse Click Automation with ClientToScreen Coordinate Conversion

Note: Figure 28 shows the Window Spy tool from AutoHotKey capturing the client coordinates of the Avast detection dialog. While the hardcoded coordinates in the malware (370, 270) and (366, 326) align with the intended UI elements in the analyzed Avast version, testing revealed these coordinates may be slightly off the correct position. However, the code's intent is clear: automate the "More Options" → "Create Exception" workflow to whitelist the malicious Setup.exe file.

Figure 28 - Client Coordinate Comparison: Malware's Hardcoded Positions (370,270 & 366,326) vs. Actual 'More Options' Button Location
Figure 28 - Client Coordinate Comparison: Malware's Hardcoded Positions (370,270 & 366,326) vs. Actual "More Options" Button Location

Setup.exe is a utility from SyncFutureTec Company Limited, digitally signed on December 21, 2023, at 10:36:49 PM. The file is signed with a valid code-signing certificate issued by GlobalSign GCC R45 CodeSigning CA 2020, with the certificate validity period spanning from March 28, 2023, to March 28, 2025 (Figure 29).

Figure 29 - Setup.exe Code-Signing Certificate Information
Figure 29 - Setup.exe Code-Signing Certificate Information

It also writes mysetup.exe (SyncFutureTec Company Limited Signed) and YTSysConfig.ini to the C:\Install folder. The YTSysConfig.ini file contains command and control (C2) server configurations including:

Figure 30- YTSysConfig.ini C2 Configuration Written to C:\install Folder
Figure 30 - YTSysConfig.ini C2 Configuration Written to C:\install Folder

It also implements multiple anti-analysis techniques including attempting to connect to timecha[.]com domain on port 443. If the connection fails, the process exits. This technique effectively bypasses sandbox or environment's where the domain cannot be resolved.

Figure 31 - Network Connectivity Check to timecha.com for Sandbox Detection
Figure 31 - Network Connectivity Check to timecha.com for Sandbox Detection

Interestingly it also creates a registry key under HKEY_CURRENT_USER\SOFTWARE\Microsoft\GcServices with the following values:

Figure 32 - Registry Value 'wlda' Structure: Current Year + MD5 Hash of baidu.com
Figure 32 - Registry Value "wlda" Structure: Current Year + MD5 Hash of baidu.com

mysetup.exe

mysetup.exe is a 32-bit executable (950ad7a33457a1a37a0797316cdd2fbaf9850f7165425274351d08b3c01ed2d8), approximately 40MB in size, and is digitally signed by "SyncFutureTec Company Limited."

Based on code-signing artifacts, configuration file naming conventions (YTSysConfig.ini - likely "Yangtu System Config"), observed functionality, and extensive logging behavior, we assess with high confidence that this represents an abuse of the Syncfuture Terminal Security Management System (TSM), a commercial software product developed by Nanjing Zhongke Huasai Technology Co., Ltd., a technology company based in China.

Figure 33 - Valid Digital Signature of MySetup.exe Signed by SyncFutureTec Company Limited
Figure 33 - Valid Digital Signature of MySetup.exe Signed by SyncFutureTec Company Limited

Nanjing Zhongke Huasai is a specialized information security provider that delivers "lightweight and practical" data security solutions. According to their public information, the company serves over 10,000 clients across government and corporate sectors, with a significant footprint in the healthcare industry. This established presence and legitimate business front lend its software a veneer of legitimacy, making it an effective Trojan for deployment in espionage campaigns.

The TSM system is a Terminal Security Management platform with Remote Monitoring and Management (RMM) capabilities designed to give administrators complete control over endpoint machines. The TSM includes 远程协助 (Remote Assistance) features that enable administrators to remotely control multiple computers simultaneously, support dual-screen remote sessions, and provide high-speed remote desktop access.

Its key features include:

The deployment of this commercial-grade TSM system as the final payload represents the ultimate goal of the intrusion. By repurposing a legitimate enterprise security product, the threat actor gains a powerful, all-in-one framework for long-term espionage.

It provides them with the tools to not only steal data but to maintain granular control over the compromised environment, monitor user activity in real-time, and ensure their own persistence.

We have observed multiple files being dropped as the execution of this product and we will not be covering them but briefly cover the script files observed.

Figure 34 – Files written by MySetup.exe
Figure 34 – Files written by MySetup.exe

Code-Signing Certificate Analysis

Analysis of the dropped executables reveals a pattern of valid code-signing certificates across multiple files, signed on different dates spanning 2019-2024. This multi-year certificate usage pattern suggests abuse of legitimate software.

Figure 35 – Malware components signed with valid digital certificate
Figure 35 – Malware components signed with valid digital certificate

Additionally, multiple kernel-mode drivers are signed by "NANJING YANGTU INFORMATION TECHNOLOGY CO., LTD.":

Figure 36 - Kernel-Mode Drivers Signed by Nanjing Yangtu Information Technology Co., Ltd.
Figure 36 - Kernel-Mode Drivers Signed by Nanjing Yangtu Information Technology Co., Ltd.

The configuration file YTSysConfig.ini (likely "Yangtu System Config") further corroborates the connection to Yangtu/SyncFuture technology infrastructure.

Additionally, vendor artifacts such as clientlogo.png (终端助手 - Terminal Assistant) were present in the deployment package.

Figure–37 SyncFuture TSM Client Logo Artifact (clientlogo.png) showing 终端助手 (Terminal Assistant)
Figure 37 - SyncFuture TSM Client Logo Artifact (clientlogo.png) showing "终端助手" (Terminal Assistant)

32.bat AND 64.bat

The malware deploys two batch scripts that create custom directories and modify their Access Control Lists (ACLs) to grant Full Control permissions to EVERYONE.

32.bat creates directories under System32 (native 64-bit path):

Figure 38 - ACL Modification for System32 Directory Compromise
Figure 38 - ACL Modification for System32 Directory Compromise

64.bat performs identical operations but targets SysWOW64 (32-bit subsystem path):

Figure 39 - ACL Modification for SysWOW64 Directory Compromise
Figure 39 - ACL Modification for SysWOW64 Directory Compromise

Both scripts use the cacls command with /G system:f everyone:f to grant Full Control to both SYSTEM and EVERYONE groups. This weakens system security by allowing any process or user to drop, modify, or execute files in these system paths, ensuring the malware can operate in both 32-bit and 64-bit execution contexts.

SetPermissions.bat AND CleanPermissions.bat

The SetPermissions.bat and CleanPermissions.bat scripts are designed to manipulate user permissions on Desktop folders.

SetPermissions.bat denies specific permissions to user Desktop folders:

Figure 40 - SetPermissions.bat Applying Restrictive ACLs to User Desktops
Figure 40 - SetPermissions.bat Applying Restrictive ACLs to User Desktops

CleanPermissions.bat removes the deny permissions previously set, using /remove:d

The hardcoded username "mzys" does not exist on the victim machine. This could either be related to Threat Actor testing machine or comes embedded with this enterprise tool.

Figure 41 - CleanPermissions.bat Removing Deny Permissions from Desktop Folders
Figure 41 - CleanPermissions.bat Removing Deny Permissions from Desktop Folders

Exit.bat

This batch script performs cleanup and restoration operations:

Registry Modification:

Process Termination and Restart:

The dual taskkill commands ensure the explorer.exe process is terminated, and the delay before restart likely ensures all processes have fully terminated before restarting. This script appears to be part of a cleanup routine, potentially reversing changes made during malware execution or ensuring Explorer is restarted to reflect system modifications.

Figure 42 - exit.bat Script Showing Registry Restoration and Explorer Restart Routine
Figure 42 - exit.bat Script Showing Registry Restoration and Explorer Restart Routine

Help.bat

It runs bcdedit /set testsigning on, which enables Windows Test Mode, allowing the system to load test-signed drivers that would normally be blocked.

Figure 43 - Enabling Test Signing Mode via bcdedit
Figure 43 - Enabling Test Signing Mode via bcdedit

Turning on test-signing lowers kernel-level trust protections and can be abused to load malicious or unauthorized drivers with elevated privileges. Do note Windows only reads these settings during system startup, so the change won't apply until next boot.

Helpformat.bat

It executes format P: /FS:NTFS /V:label /Q /Y, which quick-formats the P: drive to NTFS and assigns the specified volume label.

Figure 44 – Script to assist in quick format of NTFS harddrive
Figure 44 – Script to assist in quick format of NTFS harddrive

MANC.exe

The Stage 3 payload (180.exe) drops numerous executable files and supporting components to the infected system. This analysis focuses on MANC.exe as a representative sample due to its central role in the malware's operation.

MANC.exe establishes service-based persistence with SafeBoot registry modifications, orchestrates multiple child processes (svchost.exe, SMSS.exe, sysaid.exe, svcdsk.exe), and demonstrates extensive logging capabilities.

MANC.exe is a 32-bit executable, with sha256, "8E8156C5A8BE682DAC3B5D867031E8D5CBAE031FFEB4C0DDD5E5A6B41CA76555" and is digitally signed by "SyncFutureTec Company Limited."

Figure 45 - MANC.exe Process Tree Showing svchost.exe and Child Process Hierarchy
Figure 45 - MANC.exe Process Tree Showing svchost.exe and Child Process Hierarchy
Command Line arguments:
Argument Functionality
(no arguments) Runs the executable as a Windows service via the Service Control Manager.
-i Installs the executable as a Windows service using its current file path.
-r Installs the service if not present and immediately starts it.
-s Stops the running service without removing it from the system.
-u Stops the service (if running) and permanently removes it from the system.
-x Performs first-run initialization: configures the service to run in Windows Safe Mode (SafeBoot\Minimal (HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Manc) and SafeBoot\Network registry keys (HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\Manc)), initializes internal registry state, and launches a secondary executable in the active user session (winsta0\default).
-g Performs no action and exits immediately.

MANC.exe spawns a secondary executable c:\windows\system32\msres\svchost.exe using CreateProcessA. This malicious svchost.exe subsequently loads mframe.dll, which contains additional malicious functionality.

Figure 46 - Decompiled Code Showing Secondary Executable Launch svchost.exe
Figure 46 - Decompiled Code Showing Secondary Executable Launch svchost.exe

MANC.exe writes execution logs to c:\log\ServiceEx.log with the format: "----PID:%d--2023.12.26--->".

Figure 47 - ServiceEx.log Format String with PID and Timestamp
Figure 47 - ServiceEx.log Format String with PID and Timestamp

The log entries reveal service startup events and driver loading operations, including:

Figure 48 - ServiceEx.log Entries Showing Driver Loading and Service Initialization
Figure 48 - ServiceEx.log Entries Showing Driver Loading and Service Initialization

Extensive Logging Infrastructure

Analysis reveals the malware creates numerous log files in the C:\log\ directory, indicating extensive debugging or telemetry capabilities across multiple components:

Figure 49 - Extensive Log File Collection in C:\log Directory
Figure 49 - Extensive Log File Collection in C:\log Directory

The log entries reveal service startup events, driver loading operations, and detailed execution traces, etc. This extensive logging infrastructure is expected from enterprise software and supports our assessment that legitimate endpoint management tools are being repurposed in this campaign.

This campaign represents a complex, multi‑stage intrusion engineered for long‑term surveillance rather than opportunistic infection targeting India. By blending anti‑analysis, privilege escalation, DLL sideloading, commercial‑tool repurposing, and security‑software evasion, the threat actor demonstrates both capability and intent.

What did we do?

Recommendations from the Threat Response Unit (TRU)

Indicators of Compromise

Email Addresses and Associated Domains
Email Address Associated Domains
legroslorna748@gmail[.]com fkfjrvfa[.]cn, fwqjwhe[.]cn, amqkidy[.]cn, jhmrrru[.]cn, xfofaow[.]cn, bpsalpe[.]cn, eaxwwyr[.]cn, cocdex[.]cn, foeo[.]cn, beijingpz[.]cn, gzzjbx[.]cn, gjjtss[.]cn, csyssh[.]cn, bjsnjk[.]cn
weekskataleya@gmail[.]com t-lebosports[.]cn, zsqtmi[.]cn, aaaneniisyq[.]cn, zongherpz[.]cn, qsrt[.]cn
usdt666777001@gmail[.]com taxeiit8[.]cn
osamabegum9@gmail[.]com Xxgzbts[.]cn

You can access the full list of Indicators of Compromise here.

References:

To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.

GET STARTED

ABOUT ESENTIRE’S THREAT RESPONSE UNIT (TRU)

The eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.

Back to blog

Take Your Cybersecurity Program to the Next Level with eSentire MDR.

BUILD A QUOTE

Read Similar Blogs

EXPLORE MORE BLOGS