The Howler Cell Threat Research Team has identified the following key characteristics of this supply chain attack:
The Howler Cell Threat Research Team has identified a supply chain compromise involving HWMonitor, a widely used hardware monitoring application developed by CPUID. The legitimate software download page was compromised and redirected users to a trojanized installer hosted on attacker-controlled Cloudflare R2 infrastructure. The investigation also confirmed that CPU-Z, another CPUID product, was similarly affected.
CPUID's tools are not niche utilities; they are the de facto standard for hardware diagnostics across the global technology community. CPU-Z alone has tens of millions of users worldwide. HWMonitor's core user base includes:
The portable (ZIP) version is routinely carried on USB drives and run directly on production machines without installation, reaching environments that block installer-based software. This is not an attack that happened to hit a popular tool. It was almost certainly designed to target exactly this user base. Compromising the CPUID download page is a direct attack on the people most likely to have administrative access, deep system visibility, and credentials worth stealing.
A six-hour compromise window on software of this reach represents an infection opportunity that most targeted campaigns never achieve.
HWMonitor is a widely used hardware monitoring utility that tracks system temperatures, voltages, and fan speeds. Howler Cell began its analysis after a Reddit post surfaced reporting suspected malware distributed through recent versions of HWMonitor.
Through a combination of community discussion (Figure 1), VirusTotal analysis (Figure 2), and official confirmation from CPUID (Figure 3), it was determined that the legitimate download page had been compromised to redirect users to a malicious package hosted on a Cloudflare R2 server. The full URL of the malicious payload is provided below:
hxxp[://]pub-fd67c956bf8548b7b2cc23bb3774ff0c[.]r2[.]dev/hwmonitor_1[.]63[.]zip
Figure 1: Reddit post
Figure 2: VirusTotal Lookup
Figure 3: Vendor's post on X
Upon inspection, the compromised package was found to contain an additional DLL named cryptbase.dll, while all other components appeared legitimate and consistent with the original distribution version 1.63 (see Figures 4 and 5).
Figure 4: Compromised package containing malicious DLL compared to legitimate package v1.63
Figure 5: Hash check on legitimate and compromised packages
Upon execution of HWMonitor_x64.exe, the malicious DLL is sideloaded into the process, as evidenced by the Procmon logs captured in Figure 6, triggering the execution of its DllMain entry point. Since the malware relies on DLL search order hijacking, only the 64-bit version of HWMonitor is affected in this attack.
Figure 6: Malicious DLL loaded by HWMonitor_x64.exe
The Cyderes Howler Cell Threat Research Team conducted a technical analysis of the malicious component, cryptbase.dll. The file is a 64-bit DLL module with a timestomped compilation timestamp set to 2077-08-31 05:16:43.
Upon execution within DllMain, the malware spawns a separate thread, which initiates an additional thread responsible for executing the primary malicious payload. This multi-threaded approach is likely employed to release the loader lock. Concurrently, the malware loads the legitimate cryptbase.dll from the System32 directory (Figure 7) and returns TRUE to prevent a deadlock condition.
Figure 7: DllMain thread creation and legitimate module load
Upon execution, the malware sends JSON-formatted metadata (Table 1) to the hardcoded C2 server (welcome[.]supp0v3[.]com), likely for tracking and profiling campaign victims with campaign ID "tbs." The callback URL registers infected victims as shown in Figure 8. Analysis identified four active campaigns tagged tbs, tbs2, tbs3, and snip. Concurrently, it unpacks a second-stage payload in memory (Figure 9), consisting of a compact shellcode stub designed to execute the reflective PE loader. The referrer field identifies the targeted software package: CPZ for CPU-Z and monitor3 for HWMonitor.
Figure 8: Callback to register victim
Table 1: JSON Metadata Sent to C2
| tag | "tbs" |
| referrer | "monitor3" |
| callback | hxxps[://]welcome[.]supp0v3[.]com/d/callback |
Figure 10: Stage 3 unpacked in memory
Stage 3 follows a similar pattern, functioning as a reflectively loaded DLL. Once mapped and executed, it unpacks a Stage 4 PE in memory using the same XOR decryption and bitwise manipulation routine to extract the fifth and final stage (Figure 11). This final payload is the core malware binary, identified by SHA-256 hash:
52862b538459c8faaf89cf2b5d79c2f0030f79f80a68f93d65ec91f046f05be6
This hash has been attributed to STX RAT, a malware variant previously observed being distributed through trojanized FileZilla installers.
Figure 11: Unpacked RAT in memory - STX RAT
This analysis documents a sophisticated supply chain attack that weaponized the trust and popularity of HWMonitor to distribute STX RAT. The threat actor compromised the official CPUID download page to serve a trojanized package, employing DLL sideloading as the initial execution vector followed by a layered, five-stage in-memory unpacking chain designed to evade detection. The use of a timestomped compilation timestamp, reflective PE loading, and exclusively in-memory payload execution demonstrates a deliberate effort to hinder forensic analysis and bypass traditional security controls.
The attribution of the final payload to STX RAT, previously linked to compromised software distribution sites, suggests an ongoing campaign by a threat actor with a consistent operational playbook built around abusing trusted software channels. The identification of four active campaign tags and multiple referrer values confirms that this infrastructure is actively maintained and specifically targeting CPUID's user base by product.
The CPUID compromise reinforces a broader trend: commodity utilities with technically sophisticated, high-privilege user bases are increasingly attractive supply chain targets. An IT administrator or security engineer running HWMonitor on a production machine is a far higher-value target than a typical consumer endpoint. Defenders should treat any cryptbase.dll present outside of System32 as an immediate indicator of compromise, enforce hash validation on third-party software downloads, and monitor endpoints for the C2 and file IOCs listed in the Appendix. Detailed remediation steps are provided in the What Should Defenders Do section.
|
Name |
SHA-256 |
|
HWMonitor_x64.exe (Legitimate -- abused for DLL sideloading) |
02db6764d1f13b837b0a525e5931bdbc67e7a2a4d071e849c7e087255d4a2d5b |
|
cryptbase.dll (On-disk) |
a27df06c7167eced1ddaeb8adccaa5f60500f52bc7030389eed2a0903cdf8286 |
|
Stage 2 (In-memory PE) |
1331f19c6732fca81f32c4cec9f89abf26371ed9d3665954f491c89e2c55e5bb |
|
Stage 3 (In-memory PE) |
116d806a5ca6f34fdd04061499daca9a352feb2e3f291c7ef3e5d470fe875f7f |
|
Stage 4 (In-memory PE) |
a70645f46eee6d765c54ba4a5c48166bd83bcfbc7771a82be9ed48ab4871ebfa |
|
Stage 5 -- STX RAT |
52862b538459c8faaf89cf2b5d79c2f0030f79f80a68f93d65ec91f046f05be6 |
URL: hxxps[://]welcome[.]supp0v3[.]com/d/callback
Domain: welcome[.]supp0v3[.]com
| Tactic | Technique |
|
Initial Access |
T1195.002 -- Compromise Software Supply Chain T1204.002 -- User Execution: Malicious File |
|
Execution |
T1106 -- Native API |
|
Defense Evasion |
T1574.002 -- Hijack Execution Flow: DLL Side-Loading T1027.002 -- Obfuscated Files or Information: Software Packing T1620 -- Reflective Code Loading T1140 -- Deobfuscate/Decode Files or Information T1070.006 -- Indicator Removal: Timestomp |
|
Discovery |
T1082 -- System Information Discovery |
|
Command & Control |
T1071.001 -- Web Protocols T1105 -- Ingress Tool Transfer |
|
Credential Access |
T1555 -- Credentials from Password Stores T1539 -- Steal Web Session Cookie |
|
Exfiltration |
T1041 -- Exfiltration Over C2 Channel |
|
Collection |
T1005 -- Data from Local System |