<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azorult — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/azorult/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/azorult/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect PowerShell AppLocker Policy Import Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-applocker-policy-import/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-applocker-policy-import/</guid><description>Detection of PowerShell commands to import AppLocker policy via Import-Module Applocker and Set-AppLockerPolicy, potentially used to enforce restrictive policies or disable security products like antivirus.</description><content:encoded><![CDATA[<p>This threat brief outlines the detection of malicious PowerShell activity involving the import of AppLocker policies. Attackers may use AppLocker to enforce restrictive policies on compromised systems, which can lead to the disabling of security products like antivirus software, as observed with the Azorult malware. The activity is detected through PowerShell Script Block Logging, specifically EventCode 4104, which captures and analyzes script block text for the use of &ldquo;Import-Module Applocker&rdquo; and &ldquo;Set-AppLockerPolicy&rdquo; commands with an XML policy file. Detecting this activity early is crucial to prevent attackers from establishing persistence and further compromising the system by bypassing security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script to import the AppLocker module using <code>Import-Module Applocker</code>.</li>
<li>The script then uses <code>Set-AppLockerPolicy</code> to apply a new AppLocker policy.</li>
<li>The <code>-XMLPolicy</code> parameter is used to specify an XML file containing the malicious AppLocker rules.</li>
<li>The new AppLocker policy restricts the execution of legitimate applications, including antivirus software.</li>
<li>The attacker establishes persistence by ensuring the malicious AppLocker policy is applied at system startup.</li>
<li>With security controls disabled, the attacker deploys and executes additional malware or performs lateral movement.</li>
<li>The final objective is data exfiltration or further system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the complete bypass of endpoint security controls, leaving systems vulnerable to malware infections and data breaches. This can result in significant financial losses, reputational damage, and legal liabilities. If security software is disabled on a large number of endpoints, the impact is organization-wide.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (EventCode 4104) on all endpoints to capture the necessary data for detection.</li>
<li>Deploy the Sigma rule <code>Detect AppLocker Policy Import via PowerShell</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>ScriptBlockText</code> and the source of the PowerShell execution.</li>
<li>Implement strict AppLocker policies to prevent unauthorized applications from running.</li>
<li>Monitor endpoints for unexpected changes to AppLocker policies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>applocker</category><category>powershell</category><category>defense-evasion</category><category>endpoint</category></item></channel></rss>