Alternate Data Stream Creation/Execution at Volume Root Directory
Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.
This detection rule identifies the creation or execution of Alternate Data Streams (ADS) within the root directory of a volume on Windows systems. Attackers leverage this technique to conceal malicious tools or data, as ADSs created in this manner are not easily discoverable by standard system utilities. This method allows for the persistence and execution of malware while evading typical detection mechanisms. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, and SentinelOne Cloud Funnel, providing broad coverage across different endpoint security solutions. Monitoring for ADS activity at the volume root is crucial to identify potential defense evasion attempts and hidden malicious payloads.
Attack Chain
- Attacker gains initial access to the target system (e.g., through phishing or exploiting a vulnerability).
- The attacker executes a script or program (e.g., PowerShell) to create a hidden ADS at the root of a volume (e.g.,
C:\:evil.exe). - The ADS is populated with malicious code, such as a reverse shell or malware payload.
- The attacker uses a command-line tool or script to execute the hidden ADS file. For example:
wmic process call create "cmd.exe /c start C:\:evil.exe". - The malicious code within the ADS executes, allowing the attacker to perform unauthorized actions, such as data exfiltration or establishing persistence.
- The attacker uses the hidden ADS to maintain persistence on the system, ensuring continued access even after reboots.
- The attacker further leverages the compromised system to move laterally within the network, compromising additional systems and escalating privileges.
Impact
Successful exploitation allows attackers to hide malicious tools and maintain persistence on compromised systems. The creation of ADSs at the volume root directory makes it difficult for administrators and security tools to detect the presence of malware. This can lead to prolonged compromise, data breaches, and significant disruption of business operations. The rule has a risk score of 47, and a medium severity is applied.
Recommendation
- Deploy the Sigma rules provided in this brief to your SIEM to detect ADS creation and execution at the volume root directory.
- Enable logging for file creation events (Sysmon Event ID 11) and process creation events (Sysmon Event ID 1) for enhanced visibility into ADS activity.
- Investigate alerts generated by the Sigma rules to determine the legitimacy of ADS creation or execution, focusing on processes and file paths that match the
[A-Z]:\\:.+regex pattern in the rule query. - Regularly scan systems for hidden ADS files using specialized tools to uncover any potential malicious files.
- Implement application control policies to restrict the execution of unauthorized applications and prevent the creation of malicious ADSs.
Detection coverage 2
Detect ADS Creation at Volume Root Directory
mediumDetects the creation of Alternate Data Streams (ADS) at the root of a volume, indicating potential malware hiding or defense evasion tactics.
Detect ADS Execution from Volume Root Directory
highDetects the execution of files within Alternate Data Streams (ADS) located at the root of a volume, which is often associated with malicious activity.
Detection queries are kept inside the platform. Get full rules →