OneDrive Share Mounted via Net Utility for Potential Data Exfiltration
Adversaries may mount OneDrive shares as network drives using net.exe or net1.exe to stage, access, or exfiltrate data through cloud-hosted WebDAV paths, potentially bypassing traditional file share monitoring.
Attackers may abuse the legitimate net.exe or net1.exe utilities to mount OneDrive shares as network drives on compromised Windows systems. This technique allows them to leverage cloud-hosted WebDAV paths for staging, accessing, or exfiltrating sensitive data. By using OneDrive, attackers can potentially bypass traditional file share monitoring and data loss prevention (DLP) controls, blending malicious traffic with legitimate cloud service usage. This activity has been observed in environments where data exfiltration is a primary objective, as it provides a covert channel for moving data outside the organization. This is an anomaly that warrants investigation as legitimate users may also perform this task.
Attack Chain
- An attacker gains initial access to a Windows endpoint via phishing, exploitation of a vulnerability, or stolen credentials.
- The attacker executes
net.exeornet1.exewith specific parameters to mount a OneDrive share as a network drive. The command includes theuseparameter and a URL pointing tohttps://d.docs.live.net. - The attacker authenticates to the OneDrive share, potentially using stolen credentials or tokens.
- The attacker copies sensitive data to the mounted OneDrive share.
- The data is synchronized to the attacker’s OneDrive account, effectively exfiltrating it from the victim’s network.
- The attacker may remove the mounted drive using
net usewith the/deleteoption to remove traces of the activity. - The attacker covers their tracks by deleting relevant event logs or modifying timestamps.
Impact
Successful exploitation allows attackers to exfiltrate sensitive data from the victim’s environment via a trusted cloud service, potentially leading to financial loss, reputational damage, and legal liabilities. The use of OneDrive can make detection more challenging, as the network traffic is often whitelisted and may not trigger traditional DLP alerts. The number of potential victims is broad, affecting any organization that uses OneDrive and has vulnerable or compromised Windows endpoints.
Recommendation
- Deploy the Sigma rule
Detect OneDrive Share Mounting via Net Utilityto your SIEM to identify potential malicious use ofnet.exeornet1.exe(log source: process_creation). - Enable Sysmon process creation logging (Event ID 1) with command line arguments to capture the full
net.execommands used for mounting shares. - Monitor Windows Event Log Security (Event ID 4688) for process creation events involving
net.exeornet1.exewith parameters indicative of mounting a OneDrive share. - Implement network monitoring to detect unusual traffic patterns to
https://d.docs.live.netthat may indicate data exfiltration to OneDrive. - Review and tune the Sigma rule,
Detect OneDrive Share Mounting via Net Utilitybased on observed false positives in your environment.
Detection coverage 2
Detect OneDrive Share Mounting via Net Utility
mediumDetects the use of net.exe or net1.exe to mount a OneDrive share as a network drive, potentially indicating data exfiltration.
Detect OneDrive Share Mounting via Net Utility - Parent Process
lowDetects the use of net.exe or net1.exe to mount a OneDrive share as a network drive, focusing on suspicious parent processes.
Detection queries are kept inside the platform. Get full rules →