TA397 Hackers Use Scheduled Tasks to Deploy Malware on Victim Machines

TA397 Hackers Use Scheduled Tasks to Deploy Malware on Victim Machines
TA397 Hackers Use Scheduled Tasks to Deploy Malware on Victim Machines
A recent wave of sophisticated cyber espionage campaigns has been linked to the threat actor known as TA397 (also tracked as Bitter), assessed with high confidence to be an India-aligned, state-backed group focused on intelligence gathering.

Technical analysis reveals that TA397 frequently leverages Windows Scheduled Tasks (SCHTASKS) as a core delivery mechanism for establishing persistence and deploying multi-stage malware payloads on targeted victim systems.

Technical Overview

From October 2024 through April 2025, Proofpoint Threat Research observed numerous campaigns attributed to TA397 targeting governmental, diplomatic, and defense entities primarily in Europe, with spillover into China, Pakistan, and other countries significant to Indian strategic interests.

TA397 continuously refines its delivery methods, often exploiting spearphishing emails with malicious attachments or URLs.

TA397 Hackers
False document lure to add legitimacy to phishing email containing a malicious attachment. 

These lure documents are highly localized and often spoof diplomatic or governmental correspondence, leveraging topical subject lines relating to foreign policy, defense contracts, and bilateral agreements.

Initial access is nearly always achieved via spearphishing, where recipients receive either a direct malicious attachment or a link to a file hosted on a legitimate service.

Execution typically results in the creation of a scheduled task, often using PowerShell, cmd.exe, or curl, which beacons at fixed intervals (commonly 16–19 minutes) to attacker-controlled staging domains.

The beacon payload almost invariably contains unique host identifiers such as the victim’s computer name and username embedded in the outbound HTTP(S) request, often to PHP scripts on the C2 server.

This approach allows manual triage and filtering by the adversary prior to delivering follow-up payloads.

TA397 displays operational adaptability, abusing various file types (e.g., MSC, LNK, CHM, IQY) for initial payload execution and leveraging recently disclosed vulnerabilities (such as CVE-2024-43572 “GrimResource” for MSC files) to broaden its infection vectors.

TA397 Hackers
Overview of TA397’s infection chains. 

Despite this variety, the creation and management of scheduled tasks remain consistent hallmarks of its tradecraft.

Hands-On-Keyboard Activity

Once persistence is established, TA397 operators frequently perform manual, hands-on-keyboard operations within hours of initial compromise almost exclusively aligning with Indian Standard Time (IST) business hours.

Analysis of command execution reveals staged system reconnaissance, anti-virus detection, and selective deployment of second-stage payloads such as custom RATs (including wmRAT, MiyaRAT, KugelBlitz, Demon agent, and BDarkRAT).

Payload delivery is highly targeted: only after successful host profiling and victim validation do operators push tailored malware suited to espionage objectives.

Infrastructure analysis shows a pattern of hosting C2 and staging domains with Let’s Encrypt certificates and distinctive PHP URI structures.

Domain registrations and certificate issuances largely occur during IST business hours, further reinforcing the attribution to an Indian nexus.

TA397’s activities demonstrate substantial overlap with other known Indian APTs, indicating tool-sharing within a broader ecosystem of state-sponsored operations.

The group’s masquerading as foreign government entities and use of authentic-seeming decoy documents underline a deep familiarity with international diplomatic protocols and ongoing geopolitical events.

Exfiltrated documents ranging from tax records to military plans underscore the strategic intent behind TA397’s operations.

Detection opportunities abound in monitoring for scheduled task creations with characteristic command lines, beaconing patterns including computer and username data, and the use of Let’s Encrypt certificates for attacker infrastructure.

Indicators of Compromise (IOC)

Indicator (Type) Description First Seen
mnemautoregsvc[.]com (Domain) Staging domain Oct 2024
jacknwoods[.]com (Domain) Staging domain Nov 2024
1b67fc55fd050d011d6712ac17315112767cac8bbe059967b70147610933b6c1 LNK scheduled task loader (SHA256) Dec 2024
7c5dde52845ecae6c80c70af2200d34ef0e1bc6cbf3ead1197695b91acd22a67 CHM scheduled task loader (SHA256) Dec 2024
hxxp://46[.]229[.]55[.]63/svch.php?li=%computername%[.][.]%username% Payload delivery URL Dec 2024
utizviewstation[.]com (Domain) Staging domain Feb 2025
blucollinsoutien[.]com (Domain) Staging domain Mar 2025
princecleanit[.]com (Domain) Staging domain Mar 2025
woodstocktutors[.]com (Domain) Staging domain Apr 2025
warsanservices[.]com (Domain) Staging domain Apr 2025
c9612051b3956ac8722d8be7994634b7c940be07ca26e2fc8d0d5c94db2e4682 CHM scheduled task loader (SHA256) May 2025

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update

The post TA397 Hackers Use Scheduled Tasks to Deploy Malware on Victim Machines appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading