HomeRisk ManagementsHrServ: Previously Unkown Web Shell Utilized in APT Attack - Source: securelist.com

HrServ: Previously Unkown Web Shell Utilized in APT Attack – Source: securelist.com

Published on

spot_img
HrServ: Previously Unkown Web Shell Utilized in APT Attack – Source: securelist.com

In a recent investigation, a DLL file by the name of hrserv.dll was discovered. The file is a web shell that utilizes advanced features such as custom encoding methods for client communication and in-memory execution. Further analysis of the file resulted in the identification of related variants compiled in 2021, indicating a possible correlation between separate incidences of malicious activity.

The initial infection involves the PAExec.exe process creating a scheduled task on the system named MicrosoftsUpdate, which executes a .BAT file. The .BAT file accepts a file path argument, where the script is supplied with the hrserv.dll file that is subsequently copied to the System32 directory. Following this operation, the script configures a service via the system registry and the sc utility, activating the newly created service.

The hrserv.dll file exhibits a variety of advanced features such as client-server communication using custom encoding techniques, including Base64 encoding and FNV1A64 hashing algorithms. Specific functions are triggered based on the type and information within an HTTP request. It was also observed that the malicious activity intentionally mimics naming conventions used by Google, making it challenging to detect.

Upon receiving request parameters, the web shell is designed to carry out different functions such as creating files, reading files, and returning specific HTML data. Additionally, a code execution process is initiated under specific conditions, involving the registry path and custom-decoded POST data.

Post-establishing a foothold, specific commands are carried out via the memory implant to erase traces of previous malicious activity. The removal includes the deletion of the scheduled “MicrosoftsUpdate” job and both the initial DLL and batch files.

Variants of the hrserv web shell were found dating back to early 2021, exhibiting a slightly different URL pattern and distinct behavior in comparison to the current version. Moreover, a specific government entity in Afghanistan was identified as the sole victim of this malicious activity.

A careful examination of the analyzed malware variant suggests that it originates from at least 2021, exhibiting capabilities of initiating in-memory executions and utilizing distinct strings for specific conditions. While the malware’s characteristics point toward financially motivated activity, its operational methodology shares similarities with APT behavior.

Notably, the TTPs analyzed in this investigation did not reveal an association with any known threat actors. However, specific indicators, such as GET parameters and typos observed in help strings, may provide clues to the actor behind the samples.

The investigative efforts remain ongoing as analysts continue to monitor any related activity, aiming to unravel the mystery behind the origins and motives of this sophisticated web shell.

Source link

Latest articles

France begins extensive operation to combat cyber espionage in preparation for Olympics

French authorities have launched a major operation aimed at cleaning the country's computer systems...

CBI and FBI collaborate to dismantle global cyber fraud ring in Delhi-NCR, leading to arrest of 43 individuals | Delhi News

The Central Bureau of Investigation (CBI) has recently made a significant breakthrough in dismantling...

Hacktivists Alleged Leak of CrowdStrike Threat Intelligence

A recent cyber incident has put cybersecurity firm CrowdStrike in the spotlight, as a...

Malicious PyPi Package Steals Google Cloud Credentials from macOS Developers

Researchers have recently discovered a peculiar Python code package online designed to pilfer Google...

More like this

France begins extensive operation to combat cyber espionage in preparation for Olympics

French authorities have launched a major operation aimed at cleaning the country's computer systems...

CBI and FBI collaborate to dismantle global cyber fraud ring in Delhi-NCR, leading to arrest of 43 individuals | Delhi News

The Central Bureau of Investigation (CBI) has recently made a significant breakthrough in dismantling...

Hacktivists Alleged Leak of CrowdStrike Threat Intelligence

A recent cyber incident has put cybersecurity firm CrowdStrike in the spotlight, as a...
en_USEnglish