LOLBIN Network Connection for Defense Evasion
Adversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.
Attackers may leverage LOLBINs, signed binaries that are part of the operating system, to perform malicious actions while blending in with legitimate system activity. This technique allows them to evade detection by application allowlists and signature validation. This brief focuses on the abuse of expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to initiate outbound network connections. The LOLBINs are used to execute malicious code, download additional payloads, or establish command and control channels. This activity can be indicative of malware installation, data exfiltration, or other malicious post-exploitation activities. Detection is crucial to identify potentially compromised systems and prevent further damage.
Attack Chain
- An attacker gains initial access to the target system (e.g., through phishing or exploitation of a vulnerability).
- The attacker executes a signed LOLBIN, such as
expand.exe,extrac32.exe,ieexec.exe, ormakecab.exe. - The LOLBIN is used to download or execute a malicious payload from a remote server.
- The executed binary establishes a network connection to an external IP address.
- Data exfiltration may occur over the established network connection.
- The attacker maintains persistence on the system by scheduling tasks or modifying registry keys.
- The attacker moves laterally within the network, compromising additional systems.
Impact
A successful attack leveraging LOLBINs can result in the installation of malware, data theft, or full system compromise. The use of signed binaries makes it more difficult to detect malicious activity, potentially allowing attackers to operate undetected for extended periods. The financial and reputational damage caused by such attacks can be significant. While the risk score is low, the potential for defense evasion justifies monitoring.
Recommendation
- Implement the provided Sigma rule
Network Connection via Signed Binaryto detect suspicious network connections initiated by LOLBINs. - Monitor process execution logs for instances of
expand.exe,extrac32.exe,ieexec.exe, andmakecab.exeusing process creation logging. - Review network connection logs for outbound connections initiated by these processes, excluding connections to internal networks based on the provided list of private IP ranges.
- Investigate any detected instances of LOLBINs making external network connections, correlating with other suspicious activities on the affected host, as detailed in the “Triage and analysis” section.
Detection coverage 2
Network Connection via Signed Binary
lowDetects network connections initiated by specific Windows LOLBINs (expand.exe, extrac32.exe, ieexec.exe, makecab.exe) excluding connections to private IP ranges.
Process Execution of LOLBINs
infoDetects execution of LOLBINs used for defense evasion.
Detection queries are kept inside the platform. Get full rules →