Skip to content
Threat Feed

January 2024 (30)

high advisory

Detection of Windows Defender Service Disabling via Registry Modification

This brief covers the detection of adversaries disabling Windows Defender services by modifying specific registry keys to set the 'Start' value to '0x00000004', indicating an attempt to evade detection and maintain persistence.

Windows Defender +3 defense-evasion persistence windows registry-abuse
2r
medium advisory

Detection of Downloaded Shortcut Files

This rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.

Elastic Defend phishing lnk execution windows
2r 3t
medium advisory

Suspicious AWS SAML Activity Detection

This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.

AWS IAM +1 aws saml cloudtrail initial-access lateral-movement persistence privilege-escalation stealth
2r 3t
high advisory

Conhost Spawned By Suspicious Parent Process

Detection of Console Window Host (conhost.exe) being spawned by unusual parent processes, potentially indicating code injection or other malicious activity on Windows systems.

Elastic Defend +2 execution code_injection windows
2r 1t
medium advisory

Kubernetes Secret Access by Node or Pod Service Account

This rule detects Kubernetes audit events where a node or pod service account attempts to read secrets directly, which is often a sign of credential access.

kubernetes credential-access cloud
2r 1t
high advisory

Netty HttpClientCodec Response Desynchronization Vulnerability

The Netty HttpClientCodec is vulnerable to response desynchronization when configured with HTTP/1.1 pipelining, HEAD requests, and the server sends 1xx responses, leading to a response body from one request being parsed as another and potentially unsafe socket reuse.

netty-codec-http +1 netty http desynchronization vulnerability
2r
medium advisory

User Added to Group with Conditional Access Policy Modification Access

An attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.

Azure Active Directory attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 attack.t1556
3r 4t
high advisory

Windows Defender SpyNet Reporting Disabled via Registry Modification

Attackers disable Windows Defender SpyNet reporting by modifying specific registry keys, preventing telemetry data from being sent and allowing malicious activities to go undetected.

Splunk Enterprise +3 windows registry_modification defender_evasion
2r
medium threat

Calendar 2 Mac App Store Application Mines Cryptocurrency

The 'Calendar 2' application, available on the official Mac App Store, was found to surreptitiously mine cryptocurrency on users' Macs, utilizing the 'xmr-stak' miner to mine Monero (XMR) and report mining operations to calendar.qbix.com.

Calendar 2 +1 cryptocurrency miner macos appstore
3r 1t
critical advisory

YAFNET Pre-Handler Authorization Bypass Leads to SQL Injection

YAFNET's flawed authorization allows low-privileged users to execute arbitrary SQL commands via the `/Admin/RunSql` endpoint, potentially leading to data exfiltration, application modification, and denial-of-service.

YAFNET.Core sql-injection web-application vulnerability
2r 8t
high advisory

Browser Process Spawned from an Unusual Parent

Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.

Edge +4 credential-access windows browser-exploitation
2r 1t
high advisory

Execution of File Written or Modified by Microsoft Office

This rule detects the creation and execution of executable files by Microsoft Office applications, which is often associated with malicious documents containing scripts or exploitation of Microsoft Office vulnerabilities, leading to the execution of arbitrary code.

WINWORD.EXE +8 execution ms_office file_creation malware
3r 3t
medium advisory

InstallUtil Process Making Network Connections for Defense Evasion

Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.

Elastic Defend +1 defense-evasion proxy-execution windows
2r 1t
high advisory

O365 Advanced Audit Disabled

Detection of O365 advanced audit being disabled for a specific user, potentially allowing attackers to operate with reduced risk of detection, leading to unauthorized data access, data exfiltration, or account compromise.

Office 365 +3 cloud o365 audit defense-evasion persistence
2r 1t
medium advisory

Outlook Security Settings Registry Modification

Attackers modify Outlook security settings via registry changes to enable malicious mail rules and bypass security controls, potentially leading to persistence and data compromise.

Microsoft Outlook persistence registry_modification outlook email
2r 1t
high advisory

Potential Fake CAPTCHA Phishing Attack via Command Line

This rule detects potential fake CAPTCHA phishing attacks on Windows systems where victims are tricked into copying and pasting malicious commands into the Windows Run dialog box.

Microsoft Defender XDR +2 phishing captcha social-engineering windows
2r 2t
medium advisory

Symbolic Link Creation to Shadow Copies for Credential Access

Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.

Microsoft Defender XDR +3 credential-access defense-evasion windows
2r 3t
high advisory

Windows Defender Context Menu Deletion Attempt

An attacker attempts to disable Windows Defender by deleting its context menu entry from the registry, a tactic often used by Remote Access Trojans (RATs) to impair defenses and facilitate further malicious activities.

Windows Defender defense-evasion registry-modification windows
2r 1t
high advisory

Windows Registry Modification to Disable Registry Tools

This analytic detects modifications to the Windows registry, specifically targeting the 'DisableRegistryTools' key, which is a common tactic used by malware for persistence and defense evasion by preventing the removal of malicious entries.

Windows +3 defense-evasion registry-modification persistence
2r 2t
high advisory

Windows Registry Modification to Disable Show Hidden Files

This analytic detects modifications to the Windows registry that disable the display of hidden files, a technique commonly used by malware to evade detection and conceal malicious activities.

Splunk Enterprise +2 defense-evasion registry-modification windows
2r 2t
medium advisory

Azure Network Firewall Policy Modification or Deletion

An adversary may modify or delete Azure Network Firewall Policies to impair defenses and potentially impact network security.

Azure Network Firewall attack.impact attack.defense-impairment attack.t1686.001
3r
medium threat

Potential Command and Control via Internet Explorer COM Abuse

This rule detects potential command and control activity where Internet Explorer (iexplore.exe) is started via the Component Object Model (COM) and makes unusual network connections, indicating adversaries might exploit Internet Explorer via COM to evade detection and bypass host-based firewall restrictions.

Internet Explorer command-and-control com iexplore windows
2r 4t
medium advisory

Third-party Backup Files Deleted via Unexpected Process

This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.

Elastic Defend +5 impact backup deletion ransomware
2r 2t
medium advisory

Windows Downdate Attack Registry Modification

The Windows Downdate attack involves modifying specific registry keys to force a Windows downgrade, enabling exploitation of older, vulnerable versions, which this detection identifies through monitoring for the creation or modification of the pending.xml file in unusual locations.

Splunk Enterprise +2 defense-evasion privilege-escalation windows registry-modification
2r 1t
high advisory

Coldroot RAT Targeting macOS

The Coldroot RAT is a cross-platform backdoor targeting macOS systems, providing remote attackers persistent access through a launch daemon, masquerading as an Apple audio driver, and beaconing to a command and control server.

macOS rat persistence coldroot
2r 2t 2i
medium advisory

Suspicious Execution via Scheduled Task

This rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.

Windows persistence execution
2r 2t
high advisory

Suspicious JavaScript Execution via Deno

Detects execution of JavaScript via Deno with suspicious command-line patterns (base64, eval, http, or import in a JavaScript context), which adversaries may abuse to run malicious JavaScript for execution or staging.

Elastic Defend +2 execution javascript deno windows
2r 1t
high advisory

Suspicious PowerShell Script Using Cryptography Namespace

The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.

Splunk Enterprise +2 powershell cryptography malware asyncrat xworm vip keylogger
2r 1t
low advisory

Suspicious Windows Process Cluster Detection via Machine Learning

A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.

defense-evasion masquerading LOLbins windows
2r 2t
critical advisory

Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)

Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.

FH303/A300 firmware cve-2018-25318 tenda dns-hijacking network
2r 1t 1c