Unusual System Utilities Initiating Network Connections
Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.
Attackers frequently exploit built-in system utilities to bypass security measures and execute malicious code. This technique, known as “Living off the Land,” allows them to blend in with legitimate system activity, making detection more challenging. This threat brief focuses on identifying unusual network connections originating from Windows system utilities that are not typically associated with network communication. This behavior is often indicative of an attacker leveraging these tools for purposes such as downloading payloads, establishing command and control, or exfiltrating data. The utilities of concern include: Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe. Defenders should monitor for network activity from these processes to identify potential malicious activity.
Attack Chain
- An attacker gains initial access to a Windows system through methods such as phishing or exploiting a vulnerability.
- The attacker leverages a system utility such as
cmstp.exeto execute malicious code. cmstp.exeis invoked with a malicious INF file, leading to the execution of arbitrary commands.- The executed code initiates a network connection to an external server.
- The connection is used to download a secondary payload, such as a reverse shell or malware.
- The attacker uses the downloaded payload to establish a persistent presence on the system.
- The attacker performs lateral movement to other systems on the network.
- The attacker exfiltrates sensitive data from compromised systems to a remote server.
Impact
A successful attack can lead to a compromised system with unauthorized code execution, data exfiltration, and potential lateral movement within the network. Due to the low severity and the high probability of false positives, this rule should be tuned for specific environments and paired with other detection mechanisms. This may lead to data breaches, financial loss, or reputational damage.
Recommendation
- Implement the Sigma rules provided in this brief to detect unusual network connections from system utilities within your environment.
- Monitor process execution events for the utilities listed in the rule query to identify potential abuse of these tools.
- Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into process execution and network activity.
- Correlate detections from this rule with other security alerts and logs to gain a more complete understanding of the attack.
Detection coverage 2
Unusual Process Network Connection - CMSTP
mediumDetects network connections initiated by cmstp.exe, which may indicate Living-off-the-Land attacks.
Unusual Process Network Connection - Ieexec
mediumDetects network connections initiated by ieexec.exe, which may indicate Living-off-the-Land attacks.
Detection queries are kept inside the platform. Get full rules →