EXECUTIVE SUMMARY:
A malware campaign involving trojanized versions of the legitimate HWMonitor application that were weaponized to distribute the STX Remote Access Trojan (RAT) through DLL sideloading and multi-stage payload execution. The attackers leveraged the trust associated with widely used system-monitoring software to trick victims into downloading malicious installers that appeared legitimate but secretly executed embedded malicious components. Once launched, the altered executable abused DLL sideloading techniques to load a malicious library instead of the legitimate dependency, allowing attackers to evade traditional antivirus detection and execute malicious code under the context of a trusted process. The campaign demonstrated strong operational security and layered infection mechanisms designed to complicate forensic analysis and delay detection. By combining software trojanization, staged payload delivery, encrypted communications, and stealth-focused execution methods, the threat actors created a resilient infection chain capable of establishing persistent remote access on compromised systems.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
A malware campaign involving trojanized versions of the legitimate HWMonitor application that were weaponized to distribute the STX Remote Access Trojan (RAT) through DLL sideloading and multi-stage payload execution. The attackers leveraged the trust associated with widely used system-monitoring software to trick victims into downloading malicious installers that appeared legitimate but secretly executed embedded malicious components. Once launched, the altered executable abused DLL sideloading techniques to load a malicious library instead of the legitimate dependency, allowing attackers to evade traditional antivirus detection and execute malicious code under the context of a trusted process. The campaign demonstrated strong operational security and layered infection mechanisms designed to complicate forensic analysis and delay detection. By combining software trojanization, staged payload delivery, encrypted communications, and stealth-focused execution methods, the threat actors created a resilient infection chain capable of establishing persistent remote access on compromised systems.[emaillocker id="1283"]
The infection chain begins when users execute a trojanized HWMonitor installer containing both legitimate application components and malicious payloads engineered to initiate DLL sideloading. During execution, the trusted executable searches for required dynamic-link libraries within the local application directory, where attackers strategically placed a malicious DLL masquerading as a legitimate dependency. This malicious library initiates the first stage of the attack by decrypting and loading additional payloads directly into memory, significantly reducing disk-based forensic artifacts and improving evasion capabilities. The malware then deploys the STX RAT, a remote access trojan capable of command execution, system reconnaissance, persistence establishment, process manipulation, and data collection. Researchers observed the malware using obfuscated code, encrypted strings, and staged execution routines to hinder reverse engineering efforts. In several instances, the malware leveraged process injection and reflective loading techniques to operate within legitimate system processes and maintain stealth. Network communications between infected systems and command-and-control infrastructure were also encrypted, making detection through conventional traffic inspection more difficult.
This campaign demonstrates how threat actors continue to evolve beyond traditional phishing-based malware delivery by weaponizing trusted software and exploiting legitimate application behavior to bypass security mechanisms. The abuse of DLL sideloading within a trojanized HWMonitor package allowed attackers to disguise malicious execution as normal application activity, significantly increasing the likelihood of successful compromise. The deployment of STX RAT through a multi-stage infection architecture further enhanced the campaign’s ability to evade detection, maintain persistence, and provide attackers with extensive remote control capabilities over compromised environments. The operation also reflects broader trends in modern cyber threats, where adversaries increasingly rely on stealth-oriented execution methods, memory-resident payloads, and trusted application abuse to compromise systems while minimizing forensic evidence. Organizations should strengthen software verification procedures, monitor abnormal DLL loading behavior, implement application allowlisting, and enhance endpoint detection capabilities focused on behavioral analysis rather than signature-based detection alone.
THREAT PROFILE:
| Tactic | Technique ID | Technique | Sub-Technique |
| Initial Access | T1195.002 | Supply Chain Compromise | Compromise Software Supply Chain |
| Execution | T1059.001 | Command and Scripting Interpreter | PowerShell |
| T1106 | Native API | - | |
| Persistence | T1547.001 | Boot or Logon Autostart Execution | Registry Run Keys / Startup Folder |
| Defense Evasion | T1027.013 | Obfuscated Files or Information | Encrypted/Encoded File |
| T1218.011 | System Binary Proxy Execution | Rundll32 | |
| T1620 | Reflective Code Loading | - | |
| T1055.001 | Process Injection | Dynamic-link Library Injection | |
| Discovery | T1082 | System Information Discovery | - |
| T1016 | System Network Configuration Discovery | - | |
| T1518.001 | Software Discovery | Security Software Discovery | |
| Collection | T1005 | Data from Local System | - |
| Command and Control | T1071.001 | Application Layer Protocol | Web Protocols |
| T1573.001 | Encrypted Channel | Symmetric Cryptography | |
| T1105 | Ingress Tool Transfer | - |
MBC MAPPING:
| Objective | Behaviour ID | Behaviour |
| Defense Evasion | F0015 | Hijack Execution Flow |
| E1055 | Process Injection | |
| Anti-Static Analysis | B0012 | Disassembler Evasion |
| Collection | E1113 | Screen Capture |
| Command and Control | B0030 | C2 Communication |
| Anti-Behavioral Analysis | B0001 | Debugger Detection |
REFERENCES:
The following reports contain further technical details:
https://cybersecuritynews.com/hackers-abuse-legitimate-hwmonitor-binary/
https://gurucul.com/blog/hwmonitor-trojanized-to-deliver-multi-stage-stx-rat-via-dll-sideloading/
[/emaillocker]