SILENTCONNECT quietly deploys ScreenConnect through VBScript, PowerShell, and PEB masquerading


SILENTCONNECT is a newly documented malware loader that quietly installs ConnectWise ScreenConnect on Windows machines by chaining together phishing lures, VBScript, in-memory PowerShell, and process masquerading tricks. Elastic Security Labs says the campaign has been active since at least March 2025 and gives attackers hands-on remote access once ScreenConnect lands on the victim system.

The main risk is not a ScreenConnect software flaw in this case. Elastic describes an intrusion chain that abuses trusted services, built-in Windows tools, and stealthy loader behavior to deploy legitimate remote monitoring software for malicious access. That distinction matters because defenders need to look for suspicious delivery and execution patterns, not just patch a product and move on.

Your sample correctly captured the core flow, including the phishing lure, Cloudflare Turnstile step, VBScript download, in-memory C# execution, UAC bypass, Defender exclusion, and final ScreenConnect install. It also correctly highlighted Elastic as the primary source for the campaign details.

Cloudflare CAPTCHA page (Source – Elastic)

How the SILENTCONNECT infection chain works

Elastic says the infection starts with a phishing email that points the victim to a fake invitation or proposal workflow. After the user clicks through, they land on a Cloudflare Turnstile page and are prompted to verify they are human. That step leads to delivery of a VBScript file, which then launches the rest of the chain.

The VBScript does not act like a simple dropper. Elastic says it hides its real logic behind obfuscation using Replace() and Chr() functions, while showing a decoy children’s story to distract analysts or victims who inspect the script. Once decoded, it launches PowerShell, uses curl.exe to fetch a C# payload, compiles it through Add-Type, and runs it in memory.

Obfuscated VBScript using Chr() and Replace() functions (Source – Elastic)

That in-memory step reduces the number of obvious artifacts written to disk. It also makes the loader harder to catch with security products that still lean heavily on static files and conventional malware signatures. Elastic said its own analysts traced the chain through behavioral alerts, including suspicious script downloads and unusual execution patterns.

Why the loader is harder to spot

One of the most interesting parts of the campaign is its use of trusted platforms. Elastic says the VBScript payload was hosted on Cloudflare R2, while the C# source file came from Google Drive. Attackers often use popular cloud services because many organizations hesitate to block them outright.

The loader also uses PEB masquerading. Elastic says the .NET component allocates memory with NtAllocateVirtualMemory, runs shellcode, retrieves the Process Environment Block, and then rewrites its own BaseDllName and FullDllName values to appear as winhlp32.exe. That can mislead tools that trust PEB data when labeling processes.

Copying shellcode into memory via NtAllocateVirtualMemory (Source – Elastic)

Before ScreenConnect installation, Elastic says the malware also uses the CMSTPLUA COM interface for a UAC bypass and silently adds a Microsoft Defender exclusion for .exe files. After that, it downloads a ScreenConnect MSI, installs it with msiexec.exe, and sets up access back to the attacker-controlled server.

PEB masquerading feature (Source – Elastic)

Why ScreenConnect keeps showing up in intrusions

ScreenConnect itself is a legitimate remote management product, which is exactly why attackers like it. Red Canary’s March 2026 intelligence report says malicious ScreenConnect remained the number one most prevalent threat in its telemetry, and the company specifically noted phishing campaigns using invitation-style lures.

That broader context matters. A threat actor does not need custom remote access malware when a widely used admin tool already gives reliable interactive control. In many environments, an unexpected ScreenConnect install can blend into normal IT activity unless the organization tightly controls RMM usage.

SILENTCONNECT adding Microsoft Defender exception (Source – Elastic)

Key stages in the campaign

StageWhat happensWhy it matters
Phishing lureVictim clicks an invitation or proposal-themed email linkSocial engineering lowers suspicion
CAPTCHA stepUser sees a Cloudflare Turnstile pageAdds legitimacy and delays analysis
VBScript downloadObfuscated .vbs file lands on diskKicks off the loader chain
In-memory PowerShell and C#Payload fetched, compiled, and executed in memoryReduces disk-based detection
PEB masqueradingLoader renames itself as winhlp32.exe in PEB dataHides from some process inspection logic
UAC bypass and Defender changeMalware escalates and weakens local protectionsPrepares the host for persistence
ScreenConnect installMSI installs remote access softwareGives attacker full remote control

What defenders should watch for

  • VBScript files downloaded from the internet, especially invitation-themed names.
  • PowerShell that combines remote retrieval with Add-Type.
  • curl.exe pulling code or installers from cloud storage.
  • .NET processes making NtAllocateVirtualMemory calls unexpectedly.
  • New Microsoft Defender exclusions that admins did not approve.
  • Unsanctioned ScreenConnect MSI installs or new ScreenConnect services.
  • Outbound connections to unknown ScreenConnect servers.

This campaign should not be confused with ConnectWise’s March 17 ScreenConnect security bulletin. ConnectWise recently released ScreenConnect 26.1 to harden how server-level cryptographic material is protected, and official advisories from ConnectWise, Canada’s Cyber Centre, and NHS England all point admins to upgrade. Those are real and important updates, but Elastic’s SILENTCONNECT report describes attackers deploying ScreenConnect as a payload, not exploiting that newly disclosed ScreenConnect server issue as the initial foothold.

FAQ

What is SILENTCONNECT?

Elastic describes SILENTCONNECT as a multi-stage loader that uses VBScript, in-memory PowerShell execution, and PEB masquerading to install ScreenConnect on victim Windows systems.

Does this campaign exploit a ScreenConnect vulnerability?

Elastic’s report focuses on phishing and loader tradecraft used to deploy ScreenConnect. It does not say the initial compromise relied on the recent ScreenConnect server-side hardening issue disclosed by ConnectWise.

Why is ScreenConnect attractive to attackers?

Because it is a legitimate remote administration tool that can provide full interactive access. Red Canary says malicious ScreenConnect remained the most prevalent threat in its March 2026 report.

What should security teams do first?

Hunt for unauthorized RMM deployments, script-based download chains, unexpected Defender exclusions, and outbound traffic to unapproved ScreenConnect infrastructure. Elastic specifically called out these behaviors as useful detection points.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages