Skip to main content

BETA DETECTION: DEEP#DOOR | VBScript Backdoor Launcher Dropped to User Startup Folder

  • April 22, 2026
  • 0 replies
  • 9 views
Aaron Beardslee
Forum|alt.badge.img
name: VBScript Backdoor Launcher Dropped to User Startup Folder Analytic
category: "Persistence"
threatname: "Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder"
functionality: "Endpoint Management Systems"
description: |
  Detects VBScript files created in the user Startup directory, a persistence
  mechanism used by Deep#Door to execute the Python backdoor silently at each
  user logon without requiring elevated privileges. The implant drops
  SystemServices.vbs into the Startup folder to invoke pythonw.exe against
  the staged svc.py payload.
reference:
labels:
  - attack.persistence
  - attack.t1547.001
  - Deep#Door
logsource:
  category: file_event
  product: windows
detection:
  selection:
    Filename|endswith:
      - ".vbs"
      - ".vbe"
    FilePath|contains:
      - '\Microsoft\Windows\Start Menu\Programs\Startup'
  condition: selection
criticality: High
saveasthreat: false

violation_summary:
  grouping_attribute: "accountname"
  level2_attribute:
  level2_metadata_attributes:
  metadata_attributes:

 




TECHNICAL DETAILS


    Observed persistence file:
    - %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\SystemServices.vbs

    This VBScript is used to establish persistence by executing the staged Python
    backdoor at user logon. The script typically launches the payload silently:

    Dim WShell
    Set WShell = CreateObject("WScript.Shell")
    WShell.Run "pythonw.exe " & Chr(34) & Environ("LOCALAPPDATA") & "\SystemServices\svc.py" & Chr(34), 0, False

    The window style parameter (0) ensures no visible console window is shown,
    allowing execution to remain hidden from the user.

    This technique leverages the Startup folder to achieve persistence without
    requiring administrative privileges.
  Falsepositives: |
    - Legitimate applications may use Startup folder scripts (rare)
    - Validate against known enterprise scripts or legacy applications

 


 

Policy building walkthrough can be found in this previous post:

 

https://connect.securonix.com/threat%2Dresearch%2Dintelligence%2D62/beta%2Ddetection%2Dtelnyx%2Dteampcp%2Dcredential%2Dexfiltration%2D241