Signed Proxy Execution via MS Work Folders
Attackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.
Windows Work Folders is a Microsoft file server role that allows users to sync work files between their PCs and a central server. The WorkFolders.exe process, when called, will automatically execute any Portable Executable (PE) named control.exe as an argument before accessing the synced share. Attackers can abuse this functionality by placing a malicious executable renamed to control.exe in a location synced by Work Folders, and then triggering WorkFolders.exe. This can lead to the execution of arbitrary code in a manner that bypasses application control policies, as WorkFolders.exe is a signed Microsoft binary. This technique has been observed in the wild and documented by security researchers. This allows attackers to execute code from locations outside the standard Windows directories, evading traditional detection mechanisms.
Attack Chain
- An attacker gains initial access to the target system through an unspecified means (e.g., phishing, exploiting a vulnerability).
- The attacker places a malicious executable and renames it to
control.exein a directory accessible to Work Folders. - The attacker configures Windows Work Folders to synchronize the directory containing the malicious
control.exe. - The victim system synchronizes with the Work Folders server, copying the malicious
control.exeto the local machine. - The attacker triggers the
WorkFolders.exeprocess. WorkFolders.exeexecutes thecontrol.exebinary from the synced folder.- The malicious
control.exeexecutes, performing attacker-defined actions such as establishing persistence, escalating privileges, or deploying additional malware. - The attacker achieves code execution in a potentially elevated context, leveraging a signed Microsoft binary (
WorkFolders.exe) to bypass security controls.
Impact
Successful exploitation allows attackers to execute arbitrary code on a victim’s machine, potentially bypassing application control and other security measures. This can lead to a range of malicious activities, including data theft, system compromise, and lateral movement within the network. Given the legitimate use of Work Folders, identifying malicious executions can be challenging, potentially allowing attackers to maintain a persistent foothold. The lack of specific victim counts or industry targeting details in the source material limits a complete assessment of impact scope.
Recommendation
- Monitor process creations where
WorkFolders.exeis the parent process andcontrol.exeis the child process, butcontrol.exeis not located in a standard Windows system directory (Sigma rule: “Detect Suspicious WorkFolders Control Execution”). - Investigate any instances where
control.exeis executed from unusual or user-writable locations, especially ifWorkFolders.exeis involved (see Attack Chain step 6). - Enable Sysmon process creation logging (Event ID 1) on Windows systems to capture the necessary data for the provided Sigma rules.
- Review the Microsoft documentation on Windows Information Protection (WIP) and consider implementing it to encrypt data on PCs using Work Folders.
- Implement application control policies that restrict the execution of
control.exeto authorized locations (e.g.,C:\Windows\System32).
Detection coverage 2
Detect Suspicious WorkFolders Control Execution
mediumDetects execution of control.exe by WorkFolders.exe from non-standard locations, indicating potential masquerading.
Detect WorkFolders.exe Executing control.exe
lowThis rule detects WorkFolders.exe executing control.exe, which may indicate malicious activity if the execution path is unexpected.
Detection queries are kept inside the platform. Get full rules →