<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CrowdStrike FDR — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/crowdstrike-fdr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/crowdstrike-fdr/feed.xml" rel="self" type="application/rss+xml"/><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>WDAC Policy File Creation by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</guid><description>Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Defender Application Control (WDAC) to disable or weaken endpoint defenses. By crafting malicious WDAC policies, adversaries can block legitimate security software and evade detection. This technique involves creating WDAC policy files (.p7b or .cip) in protected system directories using unauthorized processes. The activity often occurs when attackers have already gained a foothold in the system and are attempting to solidify their position. Successful deployment of a malicious WDAC policy can significantly hinder incident response and allow malware to operate undetected. This tactic has gained traction since late 2024, with offensive tools like Krueger demonstrating the potential for weaponizing WDAC against EDR solutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, which is required to modify WDAC policies.</li>
<li><strong>Policy Creation:</strong> The attacker crafts a malicious WDAC policy using tools or scripts. This policy is designed to block specific security products or processes.</li>
<li><strong>Staging:</strong> The malicious policy is staged in a temporary location on the system, often within user-writable directories.</li>
<li><strong>Policy Placement:</strong> The attacker moves the malicious WDAC policy file (.p7b or .cip) to a protected system directory, such as <code>C:\Windows\System32\CodeIntegrity\</code> or <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code>. The tool used may be a Living-off-the-Land Binary (LOLBin) or a custom .NET assembly.</li>
<li><strong>Activation:</strong> The attacker triggers the activation of the new WDAC policy, which often requires a system reboot or the use of a service control utility.</li>
<li><strong>Defense Evasion:</strong> Once the policy is active, the targeted security products are blocked, allowing the attacker to operate with reduced risk of detection.</li>
<li><strong>Lateral Movement/Objectives:</strong> With defenses weakened, the attacker can move laterally within the network, exfiltrate data, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting WDAC can severely impair an organization&rsquo;s ability to detect and respond to threats. By blocking security software, attackers can operate with impunity, leading to data breaches, financial losses, and reputational damage. Observed damage includes disabled endpoint detection and response (EDR) solutions, allowing ransomware and other malware to execute without interference. The scope of impact can range from individual workstations to entire domains, depending on the breadth of the WDAC policy deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;WDAC Policy File by an Unusual Process&rdquo; Sigma rule to your SIEM to detect unauthorized WDAC policy modifications.</li>
<li>Monitor file creation events with extensions .p7b and .cip in <code>C:\Windows\System32\CodeIntegrity\</code> and <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code> directories, specifically filtering for processes other than <code>poqexec.exe</code>, <code>TiWorker.exe</code>, and <code>omadmclient.exe</code>.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture file creation events and provide the necessary data for the Sigma rule to function effectively.</li>
<li>Implement strict access control policies on WDAC policy directories to prevent unauthorized modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wdac</category><category>defense-evasion</category><category>windows</category></item><item><title>NTDS Dump via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</guid><description>Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>wbadmin.exe</code> with arguments indicative of an attempt to access and dump the NTDS.dit file from a Windows domain controller. Attackers with sufficient privileges, specifically those belonging to groups like Backup Operators, can abuse the legitimate <code>wbadmin.exe</code> utility to create a backup of the Active Directory database (NTDS.dit). This file contains sensitive credential information, and once obtained, attackers can extract password hashes and compromise the entire domain. This activity is often part of a larger attack aimed at gaining persistent access and control over the network. The Elastic detection rule was published on 2024-06-05 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network. This may be achieved through phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>The attacker escalates privileges to obtain membership in the Backup Operators group or a similar privileged group capable of running backups.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>recovery</code> argument, targeting the NTDS.dit file. The command line includes parameters to create a system state backup.</li>
<li>Wbadmin creates a backup of the system state, including the NTDS.dit file, in a specified location.</li>
<li>The attacker copies the NTDS.dit file from the backup location to a separate location for offline analysis.</li>
<li>The attacker uses tools such as <code>ntdsutil.exe</code> or <code>secretsdump.py</code> to extract password hashes from the NTDS.dit file.</li>
<li>The attacker cracks the password hashes or uses them in pass-the-hash attacks to gain access to other systems and resources within the domain.</li>
<li>The attacker achieves domain dominance and persistence, allowing them to control critical systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to dump credentials from the NTDS.dit file, leading to complete compromise of the Active Directory domain. This enables them to move laterally, access sensitive data, and establish persistent control over the environment. The impact can include data breaches, ransomware deployment, and long-term disruption of business operations. The medium risk score indicates that while the attack requires specific privileges, the consequences are significant if successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>wbadmin.exe</code> execution as described in the Attack Chain (Data Source: Windows Security Event Logs, Sysmon).</li>
<li>Implement the provided Sigma rule to detect suspicious <code>wbadmin.exe</code> execution with NTDS.dit related arguments in your SIEM (Rule: NTDS Dump via Wbadmin).</li>
<li>Monitor and restrict membership in privileged groups like Backup Operators to minimize the risk of abuse (Reference: <a href="https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)">https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)</a>.</li>
<li>Review and whitelist legitimate backup schedules or disaster recovery processes to reduce false positives (False positive analysis).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>wbadmin</category><category>ntds.dit</category></item><item><title>AMSI Enable Registry Key Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</link><pubDate>Sat, 27 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</guid><description>Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.</description><content:encoded><![CDATA[<p>Attackers can disable the Antimalware Scan Interface (AMSI) to evade detection by modifying the <code>AmsiEnable</code> registry key. This technique is commonly employed to execute malicious scripts without triggering security warnings or blocks. The AMSI, a Windows feature, allows applications and services to request the scanning of potentially malicious content (e.g., PowerShell scripts, JScript) before execution. By setting the <code>AmsiEnable</code> value to 0, an attacker can disable AMSI for the current user, effectively bypassing real-time script scanning. This action is often a precursor to deploying further malicious payloads or establishing persistence on a compromised system. This behavior has been observed since at least 2019 and continues to be a relevant defense evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a script or binary that attempts to modify the <code>AmsiEnable</code> registry key.</li>
<li>The script or binary uses <code>reg.exe</code>, PowerShell, or another tool to set the <code>AmsiEnable</code> registry value to 0. The registry key location is typically <code>HKEY_USERS\&lt;SID&gt;\Software\Microsoft\Windows Script\Settings\AmsiEnable</code>.</li>
<li>After successfully disabling AMSI, the attacker proceeds to execute malicious scripts or code. These scripts may use <code>powershell.exe</code>, <code>wscript.exe</code>, or <code>cscript.exe</code>.</li>
<li>The malicious scripts download and execute additional payloads, such as malware or remote access tools (RATs).</li>
<li>The attacker performs lateral movement within the network using the compromised system as a pivot.</li>
<li>The attacker attempts to establish persistence, ensuring continued access to the system even after reboots.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>AmsiEnable</code> registry key allows attackers to execute malicious scripts without triggering AMSI alerts, leading to potential malware infections, data breaches, and system compromise. Disabling AMSI significantly reduces the effectiveness of endpoint security solutions, making the system more vulnerable to attack. The impact can range from individual workstation compromise to widespread network infections, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AmsiEnable Registry Modification via Registry Events</code> to your SIEM to detect modifications to the <code>AmsiEnable</code> registry key.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Monitor process creation events for processes modifying registry keys, especially <code>reg.exe</code> and PowerShell, using the rule <code>Detect AmsiEnable Registry Modification via Process Creation</code>.</li>
<li>Investigate any alerts generated by these rules promptly to determine if the activity is malicious or legitimate.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts and binaries.</li>
<li>Harden systems by restricting user permissions to modify critical registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>registry</category><category>windows</category></item><item><title>Windows Sandbox Abuse with Sensitive Configuration</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</link><pubDate>Wed, 10 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</guid><description>This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.</description><content:encoded><![CDATA[<p>Attackers may abuse the Windows Sandbox feature to evade detection by running malicious code within the isolated environment. This involves configuring the sandbox with sensitive options such as granting write access to the host file system, enabling network connections, and setting up automatic command execution via logon. By running within the sandbox with these configurations, malware can potentially interact with the host system, while making detection more difficult. This technique is used for defense evasion, hiding artifacts, and executing malicious activities within a virtualized environment to avoid direct exposure on the host. The rule identifies the start of a new container with sensitive configurations like write access to the host file system, network connection and automatic execution via logon command.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker leverages Windows Sandbox by executing <code>wsb.exe</code> or <code>WindowsSandboxClient.exe</code>.</li>
<li>The attacker configures the sandbox to enable networking using <code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code> or <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>.</li>
<li>The attacker grants the sandbox write access to the host file system using <code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>.</li>
<li>The attacker sets up a logon command to automatically execute malicious code when the sandbox starts using <code>&lt;LogonCommand&gt;</code>.</li>
<li>The sandbox initializes and executes the configured logon command.</li>
<li>The malicious code interacts with the host file system and network, performing actions such as data exfiltration or lateral movement.</li>
<li>The attacker achieves their objective, such as deploying ransomware or stealing sensitive information, while operating from within the isolated sandbox environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using Windows Sandbox abuse can lead to a range of negative impacts. Attackers may gain unauthorized access to sensitive data, compromise system integrity, or disrupt business operations. The use of the sandbox environment helps to conceal malicious activity, making detection and remediation more challenging. The damage can include data breaches, financial losses, reputational damage, and regulatory penalties. Successful exploitation allows malware to interact with the host system, potentially affecting multiple systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Windows Sandbox with Sensitive Configuration&rdquo; detection rule to your SIEM to identify potential sandbox abuse attempts.</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable networking (<code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code>, <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable write access to the host file system (<code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that define logon commands (<code>&lt;LogonCommand&gt;</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-sandbox</category><category>windows</category></item><item><title>Windows Subsystem for Linux Distribution Installed via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-wsl-registry-modification/</link><pubDate>Wed, 03 Jan 2024 16:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wsl-registry-modification/</guid><description>This rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.</description><content:encoded><![CDATA[<p>Attackers may leverage the Windows Subsystem for Linux (WSL) to evade detection by operating within a Linux environment on a Windows host. The installation of a new WSL distribution involves specific registry modifications. This rule identifies such modifications, providing an alert when a new WSL distribution is installed. This is important for defenders as it could signal an attacker setting up a persistent and potentially hidden environment for malicious activities. WSL allows attackers to utilize Linux tools and techniques on a Windows system, potentially bypassing traditional Windows-based security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows system through existing vulnerabilities or compromised credentials.</li>
<li>Privilege Escalation: The attacker elevates their privileges to perform system-level changes, including registry modifications.</li>
<li>WSL Installation: The attacker initiates the installation of a WSL distribution. This may involve downloading and executing a WSL installer package.</li>
<li>Registry Modification: During installation, the system modifies the registry to configure and register the new WSL distribution. Specifically, keys under <code>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Lxss\\</code> are created/modified.</li>
<li>WSL Environment Setup: The attacker configures the installed WSL distribution, potentially installing additional tools and software needed for their objectives.</li>
<li>Execution of Malicious Activities: The attacker executes malicious commands and scripts within the WSL environment, leveraging Linux tools to perform actions such as lateral movement, data exfiltration, or persistence.</li>
<li>Defense Evasion: The attacker utilizes WSL to evade detection, as traditional Windows-based security tools may not effectively monitor or analyze activity within the Linux subsystem.</li>
<li>Persistence: The attacker establishes persistence within the WSL environment, ensuring continued access to the compromised system even after reboots or security updates.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a hidden and persistent environment within the compromised Windows system. This can lead to data theft, system compromise, and further propagation of the attack within the network. The number of victims and affected sectors depends on the scope and objectives of the attacker. The use of WSL for malicious purposes can significantly complicate incident response and remediation efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect WSL Installation via Registry Modification&rdquo; to your SIEM to detect new WSL installations by monitoring registry changes.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rule to function correctly (see setup instructions in the rule description).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the WSL installation and identify potential malicious activities.</li>
<li>Monitor for execution of suspicious processes within WSL environments, as described in &ldquo;Execution via Windows Subsystem for Linux - db7dbad5-08d2-4d25-b9b1-d3a1e4a15efd&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wsl</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Antimalware Scan Interface DLL Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</guid><description>An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.</description><content:encoded><![CDATA[<p>The Antimalware Scan Interface (AMSI) is a Windows interface that allows applications and services to integrate with antimalware products. Attackers may attempt to bypass AMSI to execute malicious code without detection. This detection identifies the creation of the AMSI DLL (<code>amsi.dll</code>) in unusual locations, which is a common technique used to load a rogue AMSI module instead of the legitimate one. This technique can be used to evade detection by security products that rely on AMSI for scanning potentially malicious scripts and code. The rule is designed to work with data from Winlogbeat, Elastic Endpoint, Sysmon, Endgame, SentinelOne Cloud Funnel, Microsoft Defender XDR, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploit).</li>
<li>The attacker determines the location of the legitimate <code>amsi.dll</code> file.</li>
<li>The attacker identifies a writable directory where a malicious <code>amsi.dll</code> can be placed. This location must be in the search order of applications that use AMSI, such as PowerShell or other scripting hosts.</li>
<li>The attacker copies or creates a malicious <code>amsi.dll</code> in the identified location. This rogue DLL is designed to bypass or disable AMSI functionality.</li>
<li>A process like PowerShell or another scripting host is launched. Because the malicious <code>amsi.dll</code> is in a higher-priority directory, it is loaded instead of the legitimate AMSI library.</li>
<li>The launched process executes malicious code (e.g., PowerShell script).</li>
<li>Because the rogue <code>amsi.dll</code> is loaded, AMSI scans are bypassed, allowing the malicious code to execute without detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful AMSI bypass can allow attackers to execute malicious code, such as malware, scripts, or exploits, without detection by antimalware products. This can lead to system compromise, data theft, or other malicious activities. The impact can range from a single compromised endpoint to a wider breach of an organization&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file creation monitoring with Sysmon or Elastic Defend to detect the creation of files, specifically DLLs, in unusual locations.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Antimalware Scan Interface DLL Creation&rdquo; to your SIEM to detect the creation of <code>amsi.dll</code> in non-standard paths. Tune the rule for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, file path, and user context to determine if the activity is malicious.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi-bypass</category><category>dll-hijacking</category><category>windows</category></item><item><title>Script Execution via Microsoft HTML Application</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</guid><description>Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies the execution of scripts via HTML applications, leveraging Windows utilities like <code>rundll32.exe</code> or <code>mshta.exe</code>. Attackers often use this method to bypass process and signature-based defenses by proxying the execution of malicious content through legitimate, signed binaries. The detection focuses on specific command-line arguments and patterns associated with this technique, while also excluding known legitimate uses by applications such as Citrix System32 (<code>wfshell.exe</code>), Microsoft Access (<code>MSACCESS.EXE</code>), and Quokka.Works (<code>GTInstaller.exe</code>). This technique is used by attackers to execute malicious scripts without directly running them, thus evading traditional security measures. The detection rule analyzes process names, command-line arguments, parent processes, and file paths to identify potentially malicious activity indicative of defense evasion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means (e.g., phishing, drive-by download).</li>
<li>The attacker leverages a malicious HTML application (HTA) file or a scriptlet (SCT) file.</li>
<li>The attacker uses <code>mshta.exe</code> or <code>rundll32.exe</code> to execute the malicious HTA or SCT file. The command line includes obfuscated or encoded script content.</li>
<li><code>mshta.exe</code> or <code>rundll32.exe</code> process spawns a child process, such as <code>cmd.exe</code> or <code>powershell.exe</code>, to execute further commands.</li>
<li>The spawned process executes malicious code, such as downloading and executing a payload.</li>
<li>The attacker achieves persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker performs lateral movement by exploiting vulnerabilities or using stolen credentials.</li>
<li>The final objective is achieved, such as data exfiltration, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise the system, steal sensitive data, deploy ransomware, or establish a persistent foothold. Due to the nature of the technique, it can bypass many traditional security measures. The wide adoption of Windows and the inherent trust placed in signed binaries makes this a potent evasion technique. Failure to detect and prevent this attack can lead to significant financial and reputational damage for the targeted organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Script Execution via Microsoft HTML Application&rdquo; to your SIEM to detect suspicious <code>mshta.exe</code> and <code>rundll32.exe</code> executions. Tune the rule by adding exceptions for known legitimate uses in your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the visibility required for the Sigma rules to function correctly.</li>
<li>Monitor process command lines for suspicious arguments like &ldquo;script:eval&rdquo;, &ldquo;WScript.Shell&rdquo;, and &ldquo;mshta http&rdquo; which are indicative of this technique.</li>
<li>Implement application control policies to restrict the execution of <code>mshta.exe</code> and <code>rundll32.exe</code> where they are not required for legitimate business purposes.</li>
<li>Investigate and block any identified malicious HTA files or scriptlet URLs found in the command lines of detected processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>script-execution</category><category>windows</category></item><item><title>Windows Scheduled Tasks AT Command Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</guid><description>Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.</description><content:encoded><![CDATA[<p>The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker attempts to enable the AT command by modifying the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> is modified to a value of &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>The attacker uses the AT command to schedule a malicious task.</li>
<li>The scheduled task executes a command or script, such as downloading and executing malware.</li>
<li>The malware establishes persistence on the system.</li>
<li>The attacker uses the compromised system as a pivot point for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry events for modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> as described in the rule overview.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation and registry event logging to activate the rule.</li>
<li>Investigate any alerts triggered by the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>lateral-movement</category><category>windows</category></item><item><title>Suspicious Modifications to Windows Security Support Provider (SSP) Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</guid><description>Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Security Support Provider (SSP) mechanism to establish persistence on a compromised system. SSPs are DLLs loaded into the Local Security Authority Subsystem Service (LSASS) process, which handles authentication in Windows. By modifying specific registry keys related to SSP configuration, attackers can force LSASS to load malicious DLLs at startup, effectively creating a persistent backdoor. This technique is often used to maintain unauthorized access to a system even after a reboot. The registry keys of interest are <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code>. Successful exploitation allows the attacker to intercept and manipulate authentication credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through an exploit or compromised credentials (not detailed in source).</li>
<li>The attacker escalates privileges to gain administrative rights on the system.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> to include a path to a malicious DLL.</li>
<li>Alternatively, the attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> to include a path to a malicious DLL.</li>
<li>The attacker triggers a system reboot, or restarts the LSASS process, causing the malicious SSP DLL to be loaded.</li>
<li>The malicious DLL intercepts authentication credentials and exfiltrates them or performs other malicious actions.</li>
<li>The attacker maintains persistent access to the system, even after reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence and potentially compromise sensitive credentials handled by LSASS. This can lead to lateral movement within the network, data exfiltration, and further system compromise. The impact is significant as it bypasses standard security measures and provides a persistent foothold for malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious SSP Registry Modification&rdquo; to your SIEM to detect unauthorized modifications to SSP registry keys.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Continuously monitor for unexpected processes writing to the <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> registry keys.</li>
<li>Review and whitelist legitimate software installers that frequently modify these registry entries to reduce false positives as mentioned in the brief.</li>
<li>Ensure access controls and permissions are strictly enforced to limit unauthorized modification of critical registry paths related to Security Support Providers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry-modification</category><category>ssp</category></item><item><title>Registry Persistence via AppInit DLL Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-appinit-dll-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appinit-dll-persistence/</guid><description>Modification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.</description><content:encoded><![CDATA[<p>The AppInit DLLs mechanism allows dynamic-link libraries (DLLs) to be loaded into every process that creates a user interface (loads user32.dll) on Microsoft Windows operating systems. This mechanism is intended for customization of the user interface and behavior of Windows-based applications. However, attackers can abuse this by adding malicious DLLs to the registry locations associated with AppInit DLLs. This enables them to execute code with elevated privileges, similar to process injection, and maintain a persistent presence on the compromised machine. This technique is often used to maintain access after initial compromise. Detection focuses on registry modifications to the relevant keys, excluding known legitimate processes to minimize false positives. The referenced Elastic rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a vulnerability, phishing, or other means.</li>
<li>The attacker identifies the AppInit DLLs registry keys: <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows</code> or <code>HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code>.</li>
<li>The attacker modifies the <code>AppInit_DLLs</code> registry value to include the path to their malicious DLL.</li>
<li>The attacker&rsquo;s DLL is placed on the filesystem, typically in a location where it will persist across reboots.</li>
<li>Any new process that loads user32.dll will automatically load the attacker&rsquo;s malicious DLL.</li>
<li>The malicious DLL executes arbitrary code within the context of the newly created process.</li>
<li>The attacker can use this code execution to perform further actions, such as installing backdoors or escalating privileges.</li>
<li>The attacker maintains persistent access to the system through the malicious DLL loaded into every user interface process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of any process that loads <code>user32.dll</code>. This provides a persistent mechanism for maintaining access to the compromised system. The attacker gains code execution with elevated privileges, similar to process injection. This can lead to data theft, system compromise, or further lateral movement within the network. While no specific victim counts are mentioned, the widespread use of Windows makes this a potentially high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications to the <code>AppInit_DLLs</code> value in <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows</code> and <code>HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code> using the &ldquo;Registry Persistence via AppInit DLL Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to provide the data required for the Sigma rule to function correctly.</li>
<li>Deploy the &ldquo;Registry Persistence via AppInit DLL Modification&rdquo; Sigma rule to your SIEM and tune the filter to exclude known-good DLL paths in your environment.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the parent process and the DLL being loaded.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>appinit-dlls</category><category>registry</category><category>windows</category></item><item><title>Execution via Local SxS Shared Module</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</guid><description>This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of the Windows Side-by-Side (SxS) feature to execute malicious code. Attackers can place a malicious DLL file within an application&rsquo;s local SxS folder (application.exe.local) and trick the Windows module loader into prioritizing it over legitimate system DLLs. This technique, known as DLL hijacking or DLL redirection, allows adversaries to gain arbitrary code execution within the context of the targeted application. This technique may be used to bypass security controls, escalate privileges, or establish persistence. The detection focuses on file events related to DLLs within these specific SxS folders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker identifies a legitimate application with an associated SxS folder (application.exe.local).</li>
<li>The attacker creates or modifies a malicious DLL file.</li>
<li>The attacker places the malicious DLL file in the application&rsquo;s SxS folder (application.exe.local).</li>
<li>A legitimate application attempts to load a DLL.</li>
<li>Due to the presence of the malicious DLL in the SxS folder, the Windows module loader prioritizes the attacker&rsquo;s DLL.</li>
<li>The malicious DLL is loaded and executed by the application.</li>
<li>The attacker achieves code execution within the context of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the targeted application&rsquo;s context. This can result in privilege escalation, data theft, system compromise, or the establishment of persistence mechanisms. While the number of directly affected organizations is unknown, this technique can be used against a wide range of applications on Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events for DLL files in <code>C:\*\*.exe.local\*.dll</code> and <code>\\Device\\HarddiskVolume*\\*\\*.exe.local\\*.dll</code> using the provided Sigma rule to detect potential malicious DLL planting.</li>
<li>Enable Sysmon Event ID 11 (File Create) to improve visibility into file creation events, as noted in the <a href="https://ela.st/sysmon-event-11-setup">setup instructions</a>.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the DLL creation event and the involved application.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>dll-hijacking</category></item><item><title>Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-ifeo-injection/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ifeo-injection/</guid><description>Attackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.</description><content:encoded><![CDATA[<p>Image File Execution Options (IFEO) injection is a Windows feature that allows developers to debug applications by specifying an alternative executable to run. Attackers abuse this feature by modifying the Debugger and SilentProcessExit registry keys, setting a debugger to execute malicious code instead of the intended application. This technique is used to establish persistence or evade defenses. The attack involves modifying registry keys under <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options</code>, <code>HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options</code>, <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit</code>, and <code>HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit</code>. This matters to defenders because successful IFEO injection can allow attackers to maintain persistent access to a system and execute malicious code without detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means (e.g., exploiting a vulnerability or using stolen credentials).</li>
<li>The attacker elevates privileges to gain administrative access, allowing modification of sensitive registry keys.</li>
<li>The attacker modifies the registry, specifically the <code>Debugger</code> or <code>MonitorProcess</code> values within the IFEO or SilentProcessExit keys for a target executable (e.g., <code>notepad.exe</code>).</li>
<li>The <code>Debugger</code> or <code>MonitorProcess</code> value is set to point to a malicious executable.</li>
<li>When the target executable is launched by a user or system process, the malicious executable is launched instead.</li>
<li>The malicious executable performs its intended actions, such as installing malware, stealing credentials, or establishing a reverse shell.</li>
<li>The attacker maintains persistence through the IFEO injection, as the malicious executable will continue to be launched whenever the target executable is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful IFEO injection can allow attackers to maintain persistent access to a system, execute malicious code without detection, and potentially compromise sensitive data. IFEO injection can lead to a full compromise of the affected system, potentially impacting all users and applications on the system. This technique is often used in conjunction with other attack methods to achieve broader objectives, such as data exfiltration or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to monitor changes to the IFEO and SilentProcessExit registry keys, enabling detection of unauthorized modifications.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious registry modifications related to IFEO injection.</li>
<li>Review and update the exceptions list in the Sigma rules to account for legitimate uses of the Debugger and MonitorProcess registry keys, reducing false positives.</li>
<li>Monitor process execution and correlate with registry modifications to identify potentially malicious processes launched via IFEO injection.</li>
<li>Implement enhanced monitoring and logging for registry changes related to IFEO to detect and respond to similar threats in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry</category><category>ifeo</category><category>windows</category></item><item><title>Persistence via PowerShell Profile Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-profile-persistence/</link><pubDate>Tue, 02 Jan 2024 18:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-profile-persistence/</guid><description>Attackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.</description><content:encoded><![CDATA[<p>PowerShell profiles are scripts that run when PowerShell starts, customizing the user&rsquo;s environment. Attackers can abuse this feature to gain persistence by modifying these profiles to execute malicious code each time a user launches PowerShell. The modification of PowerShell profiles allows the attacker to run arbitrary commands without requiring user interaction or explicit execution of malicious scripts. The targeted profile file names include <code>profile.ps1</code> and <code>Microsoft.Powershell_profile.ps1</code>, and the attack affects Windows systems where PowerShell is commonly used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means.</li>
<li>The attacker identifies the location of PowerShell profile scripts, typically found in <code>C:\Users\&lt;Username&gt;\Documents\WindowsPowerShell\</code>.</li>
<li>The attacker modifies an existing PowerShell profile (e.g., <code>profile.ps1</code>) or creates a new one if it doesn&rsquo;t exist.</li>
<li>The attacker injects malicious code into the PowerShell profile. This code could download and execute additional payloads, establish a reverse shell, or perform other malicious activities.</li>
<li>The attacker ensures the malicious code runs when PowerShell is launched by modifying the profile content.</li>
<li>When a user opens PowerShell, the profile script executes automatically, running the injected malicious code.</li>
<li>The malicious code performs its intended actions, such as establishing persistence by creating scheduled tasks or modifying registry keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems. This persistence can be used to perform various malicious activities, including data theft, lateral movement, and deployment of ransomware. The severity is medium as it requires local access or prior compromise, but can lead to significant impact if successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;PowerShell Profile Modification&rdquo; to detect unauthorized changes to PowerShell profile scripts.</li>
<li>Monitor file creation and modification events in the <code>C:\Users\*\Documents\WindowsPowerShell\</code> and <code>C:\Windows\System32\WindowsPowerShell\</code> directories for suspicious activity.</li>
<li>Enable PowerShell script block logging and transcription to gain visibility into the contents of PowerShell scripts being executed.</li>
<li>Restrict PowerShell usage to authorized personnel via Group Policy or other application control mechanisms.</li>
<li>Regularly audit PowerShell profiles for suspicious or unexpected code.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>powershell</category><category>windows</category></item></channel></rss>