<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CrowdStrike Falcon — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/crowdstrike-falcon/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/crowdstrike-falcon/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Netsh Helper DLL Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</guid><description>Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.</description><content:encoded><![CDATA[<p>The <code>netsh.exe</code> utility in Windows supports the addition of Helper DLLs to extend its functionality. An attacker can abuse this mechanism to establish persistence by adding a malicious DLL. When <code>netsh.exe</code> is executed, the malicious DLL is loaded and executed, allowing the attacker to run arbitrary code with the privileges of the user or process that initiated <code>netsh.exe</code>. This can be done by administrators or scheduled tasks, making it a stealthy and effective persistence technique. The registry key targeted by this technique is <code>HKLM\Software\Microsoft\netsh\</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system through unspecified means.</li>
<li>Attacker creates a malicious DLL to be used as a Netsh Helper DLL.</li>
<li>Attacker modifies the Windows Registry to add the malicious DLL as a Netsh Helper DLL under <code>HKLM\Software\Microsoft\netsh\</code>.</li>
<li>The system administrator or a scheduled task executes <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> loads and executes the malicious DLL, granting the attacker code execution.</li>
<li>The malicious DLL performs its intended actions, such as establishing a reverse shell or deploying additional malware.</li>
<li>The attacker maintains persistence on the system through the malicious Netsh Helper DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. While the risk score is low, the persistence mechanism can allow attackers to maintain a foothold for extended periods, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications under the <code>HKLM\Software\Microsoft\netsh\</code> path for suspicious DLL additions using the &ldquo;Netsh Helper DLL Registry Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file properties, timestamps, and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>netsh</category><category>registry</category></item><item><title>Windows Backup Deletion via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</guid><description>Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.</description><content:encoded><![CDATA[<p>Attackers, including ransomware groups, often attempt to remove or impair an organization&rsquo;s ability to recover from an attack. One method to achieve this is by deleting Windows backup catalogs and system state backups using the <code>wbadmin.exe</code> utility. Windows Server Backup stores details about backups (what volumes are backed up and where the backups are located) in a backup catalog. Removing these catalogs renders backups unusable for recovery, increasing the impact of the attack. This technique is frequently observed in ransomware playbooks and other destructive attacks targeting Windows environments. This activity can be detected using endpoint detection and response (EDR) solutions, Windows Security Event Logs, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li>The attacker escalates privileges to administrator level to execute wbadmin.exe.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete catalog</code> command to remove backup catalogs.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete systemstatebackup</code> command to remove system state backups.</li>
<li>The attacker may also delete shadow copies using <code>vssadmin.exe</code> or <code>wmic.exe</code> to further hinder recovery.</li>
<li>The attacker deploys ransomware or initiates other destructive actions.</li>
<li>The attacker encrypts or destroys data on the system and connected network shares.</li>
<li>The attacker demands a ransom payment for data recovery, which is complicated by the deleted backups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup catalogs and system state backups significantly impairs an organization&rsquo;s ability to recover from a ransomware attack or other destructive event. This can lead to prolonged downtime, data loss, and financial losses associated with incident response and recovery efforts. While the number of direct victims of this specific technique is difficult to quantify, the impact is typically observed in conjunction with broader ransomware campaigns affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging with Event ID 1 to capture <code>wbadmin.exe</code> executions and activate the first Sigma rule.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor Windows Security Event Logs for process creation events related to <code>wbadmin.exe</code>.</li>
<li>Investigate any instances of <code>wbadmin.exe</code> executing with <code>delete</code> arguments.</li>
<li>Review and harden account access controls to prevent unauthorized use of <code>wbadmin.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup-deletion</category><category>windows</category></item><item><title>Suspicious Microsoft Antimalware Service Executable Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-windefend-unusual-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windefend-unusual-path/</guid><description>Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.</description><content:encoded><![CDATA[<p>This detection identifies suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances. Attackers may attempt to evade defenses through DLL side-loading or by masquerading as the antimalware process. This technique is used to blend in with legitimate system activity and avoid detection by security tools. This rule is designed to detect instances where MsMpEng.exe is executed from unexpected locations or has been renamed, potentially indicating malicious activity. The rule leverages process monitoring data to identify deviations from the expected execution patterns of the antimalware service. This behavior has been seen associated with ransomware attacks, such as REvil.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker drops a malicious payload onto the system, placing it in a non-standard directory, such as a temporary folder or a user&rsquo;s profile directory.</li>
<li>The attacker renames or copies the legitimate MsMpEng.exe to the malicious payload&rsquo;s location.</li>
<li>The attacker executes the renamed or copied MsMpEng.exe from the non-standard location. This is intended to mimic legitimate activity and evade detection.</li>
<li>The malicious MsMpEng.exe then loads a malicious DLL through DLL side-loading, which executes arbitrary code within the context of the antimalware process.</li>
<li>The malicious code performs actions such as disabling security controls, escalating privileges, or establishing persistence.</li>
<li>The attacker leverages the compromised system to move laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, including the disabling of security controls, data theft, and ransomware deployment. This can result in significant financial losses, reputational damage, and disruption of business operations. Identifying and responding to this type of attack is critical to prevent further damage. The Sophos article references the REvil ransomware attack which impacted hundreds of businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture process execution events, including image path and command-line arguments, which are essential for detecting this behavior.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious MsMpEng.exe execution from unusual paths or renamed instances.</li>
<li>Investigate any alerts generated by these rules to determine the legitimacy of the MsMpEng.exe execution and identify any potential malicious activity.</li>
<li>Monitor process execution events for instances where the process name is &ldquo;MsMpEng.exe&rdquo; but the executable path is outside the standard Windows Defender or Microsoft Security Client directories.</li>
<li>Review the references provided for additional context and guidance on investigating this type of activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Persistence via WMI Event Subscription</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</guid><description>Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.</description><content:encoded><![CDATA[<p>Windows Management Instrumentation (WMI) provides a powerful framework for managing Windows systems, but adversaries can abuse its capabilities to establish persistence. By creating WMI event subscriptions, attackers can execute arbitrary code in response to defined system events. This technique involves creating event filters, providers, consumers, and bindings that automatically run malicious code. This can be achieved through tools like <code>wmic.exe</code>, which allows the creation of event consumers such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>. Successful exploitation of WMI for persistence allows attackers to maintain unauthorized access to a compromised system, even after reboots or other system changes. This activity has been observed across various environments, highlighting the need for robust detection mechanisms to identify and prevent WMI-based persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker uses <code>wmic.exe</code> to create a WMI event filter that defines a specific event to monitor.</li>
<li>A WMI event consumer, such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, is created using <code>wmic.exe</code> specifying the malicious code or script to execute when the event occurs.</li>
<li>A WMI binding is established between the event filter and the event consumer using <code>wmic.exe</code>, linking the event to the action.</li>
<li>The malicious WMI event subscription is activated, monitoring for the defined event.</li>
<li>When the specified event occurs, the WMI service triggers the execution of the associated malicious code or script through the event consumer.</li>
<li>The attacker gains persistent access to the system, as the WMI event subscription will re-activate after reboots.</li>
<li>The attacker can then perform additional malicious activities, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of WMI for persistence can allow an attacker to maintain long-term, unauthorized access to a compromised system. This can result in data theft, system compromise, and further malicious activities. While the exact number of victims is not specified in the source, the broad applicability of this technique means that many Windows systems are potentially at risk. If the attack succeeds, the attacker gains a foothold on the system that is difficult to detect and remove, which can lead to significant operational disruption and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and monitor for <code>wmic.exe</code> with command-line arguments related to creating event consumers, specifically <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, to trigger the Sigma rule &ldquo;Detect Suspicious WMIC Process&rdquo;.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious WMI event subscription creation.</li>
<li>Review the investigation steps outlined in the provided documentation to triage and analyze potential WMI persistence attempts.</li>
<li>Monitor Windows Security Event Logs and Sysmon for events related to WMI activity for broader coverage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>wmi</category></item><item><title>Adding Hidden File Attribute via Attrib.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</guid><description>Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.</description><content:encoded><![CDATA[<p>Attackers can add the &lsquo;hidden&rsquo; attribute to files to hide them from the user in an attempt to evade detection. This technique involves using the <code>attrib.exe</code> utility to modify file attributes. By setting the hidden attribute, adversaries can conceal tooling and malware to prevent administrators and users from finding it, even if they are looking specifically for it. This tactic is often employed post-compromise to maintain a stealthy presence within the target environment. Detection focuses on monitoring process executions that involve <code>attrib.exe</code> with command-line arguments indicating the modification of the hidden attribute. The rule is designed for data generated by Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as exploiting a vulnerability or using stolen credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain the necessary permissions to execute system utilities.</li>
<li>Defense Evasion: The attacker uses <code>attrib.exe</code> to modify the hidden attribute of a malicious file or directory. For example, <code>attrib.exe +h C:\path\to\malicious\file.exe</code>.</li>
<li>Concealment: The malicious file or directory is now hidden from normal directory listings, making it harder for users and administrators to detect.</li>
<li>Persistence: The attacker establishes persistence by hiding malicious scripts or executables in startup directories or scheduled tasks.</li>
<li>Lateral Movement: The attacker uses the hidden files to move laterally within the network, potentially using them as part of a larger attack campaign.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this attack includes prolonged attacker presence, increased difficulty in detecting malicious activity, and potential data exfiltration or system compromise. While the risk score is relatively low, the technique contributes to a broader attack chain and can significantly hinder incident response efforts. A successful hiding of artifacts might lead to further compromise, data breaches, or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Adding Hidden File Attribute via Attrib&rdquo; to your SIEM to detect suspicious usage of <code>attrib.exe</code>.</li>
<li>Enable process creation logging with command line monitoring in Windows environments to ensure the Sigma rule can capture relevant events.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and target files to determine if the activity is legitimate.</li>
<li>Correlate detections of <code>attrib.exe</code> with other suspicious activities or alerts on the same host.</li>
<li>Implement file integrity monitoring to detect unauthorized changes to file attributes, including the hidden attribute.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>attrib.exe</category></item></channel></rss>