Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1027 (Obfuscated Files or Information) Runtime string mutation rewrites keywords like "meterpreter" and "payload" to random values to defeat static analysis.
T1055.004 (Process Injection: Asynchronous Procedure Call) Variant v1 uses "Early Bird" APC injection into a spawned, masqueraded svchost.exe.
T1543.003 (Create or Modify System Process: Windows Service) Variant v1 registers itself as the service AarSvc for persistence.
T1562.001 (Impair Defenses)
Variant v2 attempts (via WMI) to manipulate Microsoft Defender exclusions for C:\Windows\SysWOW64.
Telemetry Profile
Filesystem Indicators
Path
C:\Windows\SysWOW64\
Masqueraded Filenames
sms.exe, sihost.exe, taskhostw.exe, taskhostw1.exe, audiodg.exe.
Staging Names
real1.exe, real2.exe (Downloaded to temp locations).
Network Indicators
Localhost Ports
TCP 9933, 9934 (Indicative of Cobalt Strike listening behavior).
Protocol
HTTPS (443) to trusted subdomains.
Remediation - THE ENTERPRISE TRACK (NIST CSF 2.0)
DETECT (DE) – Monitoring & Analysis
Command
Deploy IOC Blocklist immediately (See Section 6).
Command
Configure EDR to alert on process spawning where execution.exe (or unknown parent) spawns svchost.exe, legitimate svchost.exe should almost always be spawned by services.exe.
Command
Query SIEM for WMI commands containing Remove ExclusionPath targeting SysWOW64.
RESPOND (RS) – Mitigation
Command
Isolate any host initiating connections to *.pages.dev or *.netlify.app outside of a browser process (e.g., PowerShell, WScript, or unsigned binaries).
Command
Terminate processes listening on ports 9933 or 9934 immediately and capture memory dumps for forensics.
IDENTIFY (ID) – Asset Management
Command
Search for the service AarSvc. If found, validate the binary path. If it points to a non-standard location or lacks a valid Microsoft signature, disable the service and quarantine the host.
Remediation - THE HOME USER TRACK
Priority 1: Check your "System" Folders
Command
Navigate to C:\Windows\SysWOW64\ (You may need to "Show Hidden Files"). Look for files created recently (since August 2025) named sms.exe or real1.exe. Note: sms.exe is usually not in SysWOW64; the real one is smss.exe in System32. The slight spelling difference is a trap.
Priority 2: Antivirus Check
Command
Foxveil v2 tries to tamper with Windows Defender. Open Windows Security -> Virus & threat protection -> Manage settings -> Exclusions. If you see C:\Windows\SysWOW64 listed there,
REMOVE IT immediately. The malware put it there to hide.
Verified IOC List (Refang before use)
Network Indicators (Domains)
syscore[.]pages[.]dev
taskhostw[.]pages[.]dev
smss-416[.]pages[.]dev
csrss[.]netlify[.]app
sec-healthcore[.]netlify[.]app
driverstore-cdn[.]netlify[.]app
latestumang[.]netlify[.]app
winsysops[.]netlify[.]app
File Artifacts (SHA-256 Sample)
62dd94ece73f510d03c74a00bfe9d8ad09d49c140fc30415a843c97cf018107f
26d4e07514498453aa5d409a28489008080d307899bda8357870f193bdb994b8
1ed74593fb463a16b29bb24f31d06c749e59c6da82410b1dc9f1e53583b765f1
bad1c2cdaecb3dfba5cd00127131b623f600230fb344c662f84051da3b3f8d0a
Hardening References
Context
Foxveil abuses "Donut" (shellcode generator). Detection of in-memory .NET assembly execution is critical.
Configuration
Review the "Cato CTRL Threat Research" report (Feb 11, 2026) for the full list of 34 observed hashes.
Primary Intelligence Source
Cato CTRL™ Threat Research