🔄
top of page

Latest Articles

Tag

The Nightmare Before Halloween: WSUS CVE-2025-59287 - Observing Post-Exploitations & Velociraptor C2

  • stagingppln
  • Nov 8
  • 7 min read

Updated: Nov 24

Author(s): Reyben T. Cortes, Md. Azim Uddin, Abdullah Al Mamun

ree

POST /ReportingWebService/ReportingWebService.asmx HTTP/1.1
Host: [redacted]:8530
User-Agent: Windows-Update-Agent
Content-Length: 5244
Accept: text/xml
Connection: Keep-Alive
Content-Type: text/xml
SOAPAction: "http://www.microsoft.com/SoftwareDistribution/ReportEventBatch"
Accept-Encoding: gzip
Connection: close

Figure 0: HTTP POST Request ReportingWebService[.]asmx


Trick or Treat! It's the nightmare before Halloween, it's a Friday you received alerts of suspicious Windows API services attempting to execute malicious binaries. Spoiler alert, it came from parent process WsuserviceEXE. This scenario became our reality late October 2025 when we observed an attacker conducting sophisticated post-exploitation activities consistent with WSUS CVE-2025-59287 involving China-nexus actors using the same encoded binary payload for dropping V2[.]MSI packaged as a malicious Velociraptor C2. In this case, instead of exploiting SAP Netweaver CVE-2025-31324, the attackers are using Velociraptor for post-exploitation. The attack chain mirrors patterns recently documented by Darktrace, which led us to investigate the malicious payload.


Figure 1: Services[.]exe > Velociraptor C2 > MSIInstall > V3[.]MSI
Figure 1: Services[.]exe > Velociraptor C2 > MSIInstall > V3[.]MSI

In Figure 1, a decoded binary executes a multi-staged payload chain with interesting persistence mechanisms and sophisticated masquerading/hiding techniques. Using the Windows API service, these requests malicious payloads from several staging addresses (redacted) and rename malicious binaries multiple times via services.exe. The actor implements defense evasion tactics using the exclusion parameter modified via Add -MpPreference across several directories containing the possible Velociraptor C2 binary acting against (MDAV) antivirus detection. In addition, the target paths below add a layer of evasion by hiding malicious artifacts not normally scanned by antivirus engines from the following directory paths.


C:\ProgramData\Microsoft\Windows\WER\services.exe
C:\ProgramData\Microsoft\Windows\Templates\services.exe

C:\ProgramData\Microsoft\Windows\WER\JavaCore.sys

Interestingly, both executables here are renamed with the same filename services.exe intended to confuse antivirus scans even further after the exclusions. While at the same time contain two completely different binaries, one in the Templates directory as the service installation wrapper. In staging address below shows the original filename of the malicious binaries before being renamed post-ingress tool transfer to questionable file extensions, such as JavacoreSYS, masquerading as a legitimate Java driver system.


http://130.185.118[.]247:9090/tomcaterror[.]bmpgq
http://130.185.118.247[:]9090/nosm[.]exe
http://130.185.118[.]247:9090/lisence[.]shm

The nosmEXE binary acting as the service installation wrapper is also renamed with a typo. However, further analysis indicate that this is a legitimate Windows open-source tool known as NSSM (Non-Sucking Service Manager) which the actor used to wrap the malicious executables as a legitimate Windows service background, as shown in Figure 2. This is interesting to note as the tool allows you to masqeurade malicious executables as a Windows service and implement persistence mechanisms.


ree

Figure 2: nssm monitors the running service and will restart it if it dies


As this unloads the variable $ErrorActionPreference ran several times as part of its evasion tactics by ignoring process interrupts and suppressing errors that may have occured during the installation. This will also allow malicious executions that would have otherwise been terminated if a user logged off the system or any remote C2 connections using the uniquely chosen parameter.

$ErrorActionPreference = 'silentlycontinue'

Additionally, these will look entirely different from face value perspective because of the masquerading techniques that order the malicious nssm service installation to appear as "MSIInstall Service" in process, with additional description to try and appear legit as shown below.

set "MSIInstall service" DisplayName "MSIInstall service" | Out-Null
set "MSIInstall service"  Description "Manages profiles and accounts on a SharedPC configured device"

Last but not least, the use of file attribute manipulation and service permission obfuscation was the most interesting segment that we observed from this actor highlighting a deep-level understanding of the Windows API services manipulating target directories with uniquely chosen parameters. The attributes below render the binaries in these directories invincible against casual inspection. In addition, this will make it much harder for incident response services due to the modification in DACL - Discretionary Access Controls in the directory permissions using the service security descriptor A.K.A SSDL (Security Description Definition Language).

+s (System attribute) - Marks file as system file
+h (Hidden attribute) - Hides from default directory listings
+r (Read-only) - Prevents accidental modification/deletion
+a (Archive attribute) - Marks for backup operations

D;DCLCWPDTSD;;;BA - Denies specific permissions to Built-in Administrator
A;;CCLCSWLOCRRC;;;IU -  Permits limited permissions to Interactive Users
(A;;CCLCSWLOCRRC;;;SU) - Limited Permissions to Service Users

Observing how much level of care was executed throughout the entire process to make this initial infection look benign from the top and bottom. We assumed this activity to the likes of an APT-level actor from China that has exploited a similar execution chain to a previous zero-day vulnerability from SAP Netweaver CVE-2025-31324. The activity highlighted by Darktrace that we assumed has a connection with this initial infection payload serviceEXE containing the Velociraptor C2 binary is included. These additional findings from our research of the unreported V3[.]MSI executable we share for actionable threat-informed defense to network defenders.


In conclusion, to better defend against this attack, it is critical for defenders to enable script blocking logging to capture suppressed errors and enable defender exclusion monitoring as well as looking out for extreme granular commands to file attribute manipulations caused by abusing the SSDL - (Security Description Definition Language). As we are nearing to the end of 2025 it has been a wild ride of constant ITW - (in-the-wide) exploits of zero-day vulnerabilities, yet despite the constant AI buzzwords and security promises you hear in this industry it seems as if nothing has really changed. Hint, there is a reason why and they all come back to understanding the basics but that's another topic for another article, stay tuned!



MITRE ATT&CK Mapping

Post-exploitation & payload mapped to MITRE ID Sub-techniques

T1595.002 - Vulnerability Scanning

T1190 - Exploit Public Facing

T1132.001 - Standard Encoding

T1059.001 - Powershell Execution

T1562.001 - Impair Defenses Antivirus

T1564.012 - Hide Artifacts

T1564.011 - Ignore Process Interrupts

T1218.007 - System Binary Proxy Executions

T1222.001 - Window File & Directory Permissions Modification

T1564.011 - Ignore Process Interrupts

Indicators & C2 domains

Initial Payload Infection Chain & Velociraptor C2

Indicator

Type

Note

129.153.98.207

IPV4

CVE-2025-59287

177.93.11.110

IPV4

CVE-2025-59287

130.185.118.247

IPV4

Staging Address

134.122.38.84

IPV4

Staging Address

130.185.118.247:9090/tomcaterror.bmppop

Domain

Staging Domain

130.185.118.247:9090/lisence.shm

Domain

Staging Domain

130.185.118.247:9090/nssm.exe

Domain

Staging Domain

8b3d49e328ddc0d9ec08789e3db2f5c3da54d04efdaa746f4e68858448d5e5de

SHA256

V3[.]MSI - Velociraptor C2 binary

e112df7c7848d9315e07f87c0b7e9728d100dfed40c2cf3fcab44ed9b00e9f00

SHA256

CVE-2025-59287

1c1ffb90cb15425132bfcfc33110466b1025c98c596b1d41ecd615baeacd64c7

SHA256

PS1 Payload

80d42c4f185f71b2100f946557136e8dc8e519acc531a8f0a5a416fd97efd49a

SHA256

PS1 Payload

f689ee9af94b00e9e3f0bb072b34caaf207f32dcb4f5782fc9ca351df9a06c97

SHA256

nssm.exe

763dada763449617ef33d2fa9131a6f67e6bd83cc72c830bc648f8c134312083

SHA256

javacore[.]sys

07e3b08872d3e6f4849a3621937b2af4522c7c09a682d2391387c49a2fbcb402

SHA256

PS1 Payload

11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

SH256

Vulnerable driver

91f71f655004eb5e2783a98f7556c5e0e58d4f438fd5d2dcdf9e522735cf09b9

SHA256

Miner

946a87060e52f18074546993c20809b665797dd5b4907445e850b910d3988467

SHa256

PS1 Payload


Post-Exploitation Activity Analysis Summary

ree

Stage 1: Initial Access (T1190 - Exploit Public-Facing Application)

  • Unauthenticated exploitation of CVE-2025-59287

  • Remote code execution achieved within compromised WSUS service context

  • Execution with SYSTEM-level privileges

Stage 2: Reconnaissance & Enumeration

  • PowerShell-based network enumeration

  • System information gathering via custom scripts

  • Data exfiltration to webhook[.]site for attacker validation

Stage 3: Payload Delivery

  • MSI installer deployment (v3.msi)

  • Cabinet file extraction (Sample[.]cab, part2[.]cab)

  • Velociraptor DFIR tool deployment

Stage 4: C2 Establishment

  • Cloudflare Workers infrastructure abuse

  • Velociraptor configured as encrypted tunnel

  • Persistent beaconing to attacker-controlled infrastructure

Stage 5: Post-Compromise Activities

  • Skuld Stealer deployment for credential harvesting

  • Browser data and cryptocurrency wallet exfiltration

  • Preparation for lateral movement

    Cloudflare Workers Abuse Pattern

    Threat actors consistently leverage Cloudflare Workers for C2 infrastructure due to:

    • Difficulty in blocking (legitimate CDN service)

    • Dynamic subdomain generation

    • SSL/TLS encryption by default

    • Low cost and rapid deployment

    • Minimal registration requirements

    Observed Indicators:

    • royal-boat-bf05.qgtxtebl.workers[.]dev - MSI payload hosting

    • chat.hcqhajfv.workers[.]dev - Velociraptor C2 server

    • HTTP POST-based command delivery

    • Medium-period beaconing (15-30 minute intervals)


Asia-Pacific WSUS Attack Surface Landscape


If we look into Japan in the APAC region, the high concentration of technology manufacturing causes 75 endpoints to be detected in this region.

ree

Fig.: Japan has 75 endpoints

But in the Asia region, we see more attack surfaces are discovered, like 34.37% from South Korea and 32.13% from China.

ree

and the rest are in minimal ratio, where Hong Kong, India, and Singapore also lead.

Our analysis of internet-facing WSUS servers across the Asia-Pacific region reveals a concentration of exposure in economically developed nations with mature IT infrastructure:


Country

Count of Hosts

Percentage of APAC Exposure

South Korea

551

34.37%

China

515

32.13%

Hong Kong

85

5.30%

India

84

5.24%

Japan

74

4.62%

Singapore

52

3.24%

Other countries

234

15.1%

Figure 1: Asia-Pacific WSUS Exposure Distribution There have been many cases why Asia is a geopolitical factor: high concentration of technology manufacturing and R&D, critical infrastructure interconnectedness, target-rich environment for state-sponsored actors, and intellectual property theft motivations. Besides some technical factors: legacy Windows Server deployments, patch management challenges in distributed environments, limited security operations center (SOC) maturity in the SME sector, and language barriers in security advisory comprehension. However, South Korea's significant exposure (34.37%) correlates with advanced semiconductor and electronics industries and high-density data center infrastructure. China also has significant exposure (32.13%) with massive enterprise IT infrastructure scale and state-owned enterprise (SOE) WSUS deployments.


Sector-Specific Exposure Patterns

Analysis of autonomous system numbers (ASNs) and organizational identifiers reveals vulnerability concentration in:

High-Risk Sectors:

  • Education: Universities and research institutions (1.5% of exposure)

  • Government: Municipal and provincial infrastructure (2.1%)

  • Telecommunications: Service providers and ISPs (74.7%)

  • Financial Services: Banking and fintech infrastructure (1.2%)

  • Manufacturing: Industrial and technology companies (0.5%)


Technical Configuration Analysis

Port Distribution:

  • Port 8530 (HTTP): 100% of identified instances

  • Port 8531 (HTTPS): 8.76% of identified instances

Critical Finding: Approximately all of the exposed WSUS servers utilize unencrypted HTTP connections (port 8530), significantly increasing the risk of man-in-the-middle attacks and credential interception. Critical Service Analysis


  • ree

    Overall, the exposure landscape shows a clear concentration of risk around identity and access pathways, with remote access and login interfaces representing the majority of externally visible entry points. This pattern indicates that attackers would face relatively few barriers in identifying exploitable access routes, particularly where authentication controls or segmentation are weak. Collectively, the data reflects an environment where reducing externally exposed services and strengthening access governance will deliver the most immediate security gains.

Common Misconfigurations Identified:


  • Path traversal vulnerability—15.51% of instances

  • HTTP request smuggling vulnerability—15.46% of instances

  • HTTP/2 rapid reset (DoS) vulnerability—8.12% of instances

  • Apache mod_status information disclosure—7.56% of instances

  • Remote code execution vulnerability—7.36% of instances

  • Authentication bypass vulnerability—6.63% of instances These findings highlight a broader trend: even mature organizations struggle with basic configuration hygiene. Regular security assessments, better patch management, and continuous monitoring remain essential to reducing exposure and preventing these common, but dangerous, vulnerabilities from evolving into full-scale incidents.


    Conclusion

CVE-2025-59287 represents a critical vulnerability in Windows Server Update Services that has been rapidly weaponized by sophisticated threat actors. The Asia-Pacific region, particularly South Korea (34.37%) and China (32.13%), demonstrates significant internet-facing WSUS exposure, creating substantial attack surface for exploitation.

Key Takeaways:

  1. Concentrated Risk: Over 66% of APAC WSUS exposure concentrated in South Korea and China

  2. Sophisticated Post-Exploitation: Velociraptor abuse demonstrates advanced threat actor capabilities

  3. Rapid Weaponization: 10-day timeline from disclosure to active exploitation

  4. Regional Implications: High-value sectors (technology, finance, government) face elevated risk

  5. Detection Challenges: Legitimate tool abuse and encrypted C2 complicate detection efforts

Strategic Imperatives:

Organizations within the Asia-Pacific region must prioritize:

  • Immediate patching of CVE-2025-59287 across all WSUS infrastructure

  • Internet exposure elimination for administrative services

  • Enhanced monitoring for post-exploitation indicators

  • Incident response preparedness for WSUS compromise scenarios

  • Regional collaboration through CERT networks for threat intelligence sharing

The weaponization of legitimate DFIR tools like Velociraptor represents an evolving threat landscape where traditional security boundaries are increasingly blurred. Organizations must adopt defense-in-depth strategies that account for both malicious exploitation and legitimate tool abuse.

As the threat landscape continues to evolve, continuous vigilance, proactive threat hunting, and collaborative defense will remain essential for protecting critical infrastructure across the Asia-Pacific region.


 
 

Latest Articles

Tag

Latest Articles

bottom of page