SOC335 – CVE-2024-49138 Exploitation Detected

Intro

This alert highlights the exploitation of CVE-2024049138, a Windows privilege escalation vulnerability.

Alert Details

FieldValue
EventID313
Event TimeJan 22, 2025, 02:37 AM
RuleSOC335 – CVE-2024-49138 Exploitation Detected
LevelSecurity Analyst
HostnameVictor
IP Address172.16.17.207
Process Namesvohost.exe
Process Path“C:\temp\service_installer\svohost.exe”
Process ID7640
Parent ProcessC:\Windows\System32\WINDOWSPOWERSHELL\V1.0\powershell.exe
Command Line??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
File Hashb432dcf4a0f0b601b1d79848467137a5e25cab5a0b7b1224be9d3b6540122db9
Process UserEC2AMAZ-ILGVOIN\LetsDefend
Trigger ReasonUnusual or suspicious patterns of behavior linked to the hash have been identified, indicating potential exploitation of CVE-2024-49138.
Device ActionAllowed

What is svchost.exe?

svchost.exe is a system process in Windows that hosts and manages various Windows services. Its functions is to group related services together within a single process, which helps conserve system resources. Cybercriminals frequently exploit this service by naming malicious files and processes something similar like svohost.exe.

After taking ownership of the alert and assigning it to ourselves we can start the playbook!

For play 1 we need to select the Threat Indicator.

I selected “Unknown or unexpected outgoing internet traffic”.

For play 2 we need to check if the malware is quarantined/cleaned.

We can check Log Management and Endpoint Security.

First lets look at our Log Management. Lets use the IP address of 172.16.17.207 from the alert in our search.

We know the alert was generated at Jan 22, 2025, 02:37 AM so lets look for any indicators for around that time.

All logs with the filter show a date and time of Jan, 22, 2025, 02:35 PM. I notice that an IP address of 185.107.56.141, which is a public IP outside of our network, is connecting or attempting to connect to our endpoint through 3389. Which is a port used for RDP, remote desktop protocol.

Lets look into the log details.

We see an unsuccessful logon with from guest and then a successful logon from Victor.

We also see that the logon type was 10, which indicates a user logged onto a computer remotely using Terminal Services, Remote Desktop, or Remote Assistance.

Lets now go look at the endpoint logs from Victors machine.

We have different logs we can analyze, Processes, Network Action, Terminal History, Browser History. I know that the process in the alert was svohost.exe so I will start by looking at the Processes tab. Based off the alert I have good idea of what I should be looking for, which is a PowerShell running from svohost.exe.

I found two events that raise suspicion.

Analyzing the event details shows good information:

  • Process User is NT AUTHORITY\SYSTEM which has the highest level of permissions.
  • Parent Process is svohost.exe which mimics svchost.exe
  • svohost.exe lives in the temp directory which is suspicious
  • svohost.exe launched PowerShell and ran the whoami command which allows attackers to quickly see if privilege’s have been escalated

We can also check the terminal history.

Based off the logs here it looks like the attacker checks who they are and what privileges they have before downloading the malware. Then after they download the malware they check again to confirm their privilege escalation.

This gives me enough confidence to say the malware is not quarantined/cleaned.

For play 3 we need to analyze the malware using 3rd party tools and assess if it malicious or not.

We have the file hash from the alert. We can navigate to VirusTotal to gather information about the malware.

Based off the VirusTotal report we know this is malicious.

For play 4 we need to check is someone made a request to the C2 server.

We analyzed this earlier when we saw an unknown IP (C2) attempting and successfully logging into our victim machine via RDP on port 3389.

So the answer is Accessed.

For play 5 we need to contain the device!

We can navigate to Victor’s device in the Endpoint Security tab and turn on containment.

Next we can add artifacts before closing out the alert.

I added the C2 Server, Malware hash, and suspicious URL command.

Analyst Notes:

And close the alert!

Thanks for reading!

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *