Potential Windows Session Hijacking via CcmExec
Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.
Attackers may attempt to hijack Windows user sessions by exploiting Microsoft’s System Center Configuration Manager (SCCM). This involves loading malicious DLLs into SCNotification.exe, a process responsible for user notifications within the SCCM framework. The vulnerability arises when SCNotification.exe loads untrusted DLLs, potentially impersonating a user session. This activity is often characterized by recent DLL file creation or modification, coupled with the DLL lacking a trusted code signature. The references indicate this technique has been discussed publicly, raising awareness and the potential for increased exploitation.
Attack Chain
- Attacker gains initial access to the target system.
- Attacker places a malicious DLL on the system. This DLL may be disguised to appear legitimate.
- The attacker manipulates the system to cause
SCNotification.exeto load the malicious DLL. This may involve modifying registry keys or file paths. SCNotification.exeloads the attacker-controlled DLL.- The malicious DLL executes within the context of the
SCNotification.exeprocess. - The attacker leverages the hijacked process to impersonate a user session.
- Attacker gains unauthorized access to user accounts and data.
- Attacker performs malicious actions under the guise of the compromised user, such as data exfiltration or privilege escalation.
Impact
A successful attack could lead to unauthorized access to sensitive data, privilege escalation, and further compromise of the network. Victims could experience data breaches, financial loss, or reputational damage. The impact depends on the extent of access gained by the attacker and the sensitivity of the data accessed.
Recommendation
- Deploy the Sigma rule “Potential Windows Session Hijacking via CcmExec” to your SIEM to detect suspicious DLL loads by
SCNotification.exe. - Investigate alerts triggered by the Sigma rule, focusing on DLLs with recent file creation times or modifications (DLL timestamps) and untrusted signatures.
- Implement application whitelisting to prevent unauthorized DLLs from being loaded by
SCNotification.exeas described in the remediation steps in the note section. - Monitor process creation events for
SCNotification.exeand related processes. - Enable Sysmon process creation logging to enhance visibility into process execution events, which activates the Sigma rules above.
Detection coverage 2
Potential Windows Session Hijacking via CcmExec
mediumDetects when 'SCNotification.exe' loads an untrusted DLL, which is a potential indicator of an attacker attempt to hijack/impersonate a Windows user session.
Suspicious DLL Load by SCNotification.exe with Short Creation Time
mediumDetects SCNotification.exe loading a recently created DLL, indicating potential DLL hijacking.
Detection queries are kept inside the platform. Get full rules →