<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Crowdstrike — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/crowdstrike/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/crowdstrike/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Suspicious Execution via Windows Command Debugging Utility</title><link>https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</guid><description>Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.</description><content:encoded><![CDATA[<p>The Windows command line debugging utility, cdb.exe, is a legitimate tool used for debugging applications. However, adversaries can exploit it to execute unauthorized commands or shellcode, bypassing security measures. This can be achieved by running cdb.exe from non-standard installation paths and using specific command-line arguments to execute malicious commands. The LOLBAS project documents this technique, highlighting its potential for defense evasion. This activity has been observed across various environments, necessitating detection strategies that focus on identifying anomalous executions of cdb.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker copies cdb.exe to a non-standard location (outside &ldquo;Program Files&rdquo; and &ldquo;Program Files (x86)&rdquo;).</li>
<li>The attacker executes cdb.exe with the <code>-cf</code>, <code>-c</code>, or <code>-pd</code> command-line arguments.</li>
<li>These arguments are used to specify a command file or execute a direct command.</li>
<li>The command file or command directly executes malicious code, such as shellcode.</li>
<li>The malicious code performs actions such as creating new processes, modifying files, or establishing network connections.</li>
<li>These actions allow the attacker to maintain persistence or escalate privileges.</li>
<li>The ultimate goal is to evade defenses and execute arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to execute arbitrary commands and shellcode on the affected system, potentially leading to complete system compromise. This can result in data theft, installation of malware, or further propagation within the network. The technique is effective at bypassing application whitelisting and other security controls that rely on standard execution paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Execution via Windows Command Debugging Utility&rdquo; to your SIEM to detect suspicious cdb.exe executions (see rules section).</li>
<li>Enable process creation logging via Sysmon or Windows Security Event Logs to provide the necessary data for the Sigma rule.</li>
<li>Implement application whitelisting to prevent execution of cdb.exe from non-standard paths.</li>
<li>Monitor process command lines for the <code>-cf</code>, <code>-c</code>, and <code>-pd</code> flags when cdb.exe is executed.</li>
<li>Investigate any instances of cdb.exe running from unusual directories to determine legitimacy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbas</category><category>defense-evasion</category><category>windows</category></item><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>DNS Global Query Block List Modified or Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</guid><description>Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>The DNS Global Query Block List (GQBL) is a Windows security feature designed to prevent the resolution of specific DNS names, commonly exploited in attacks like WPAD spoofing. Attackers who have obtained elevated privileges, such as DNSAdmin, can modify or disable this list to bypass security controls. This allows exploitation of hosts running WPAD with default settings. The modification of the GQBL can be used for privilege escalation and lateral movement within a network. This rule detects changes to the registry values associated with the GQBL, specifically &ldquo;EnableGlobalQueryBlockList&rdquo; and &ldquo;GlobalQueryBlockList.&rdquo; This activity could indicate an attacker attempting to weaken defenses to facilitate further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain DNSAdmin rights.</li>
<li>The attacker modifies the &ldquo;EnableGlobalQueryBlockList&rdquo; registry value to &ldquo;0&rdquo; or &ldquo;0x00000000,&rdquo; effectively disabling the GQBL.</li>
<li>Alternatively, the attacker modifies the &ldquo;GlobalQueryBlockList&rdquo; registry value to remove &ldquo;wpad&rdquo; from the list.</li>
<li>The attacker leverages the disabled GQBL to conduct WPAD spoofing attacks, redirecting network traffic to attacker-controlled servers.</li>
<li>The attacker captures user credentials transmitted during WPAD authentication.</li>
<li>The attacker uses the captured credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or disabling of the DNS Global Query Block List can lead to WPAD spoofing attacks, credential theft, lateral movement, and ultimately, complete compromise of the network. Attackers can leverage this technique to gain unauthorized access to sensitive data or systems. The impact includes potential data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of DNS Global Query Block List</code> to your SIEM to detect unauthorized changes to the GQBL configuration.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the Sigma rule to function (reference the logsource in the rule).</li>
<li>Review and restrict DNSAdmin privileges to only necessary accounts to minimize the attack surface (reference: Overview section).</li>
<li>Monitor network traffic for unusual DNS queries or WPAD-related activity, correlating with registry modification events (reference: Attack Chain step 5).</li>
<li>Regularly audit registry settings related to DNS configuration, including the GQBL, to identify unauthorized modifications (reference: Attack Chain steps 3 &amp; 4).</li>
<li>Update security policies and procedures to include specific measures for monitoring and protecting the DNS Global Query Block List (reference: Impact section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Microsoft Office 'Office Test' Registry Persistence Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</link><pubDate>Sat, 27 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</guid><description>Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.</description><content:encoded><![CDATA[<p>The &ldquo;Office Test&rdquo; registry key, located under <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code>, is a legitimate feature that allows specifying a DLL to be executed every time an MS Office application is started. Attackers can abuse this functionality by modifying the registry to point to a malicious DLL, achieving persistence on a compromised host. This allows for continued malicious activity even after a system restart or user logout. Elastic has published a rule to detect this behavior. The modification of this registry key, excluding deletions, is a strong indicator of potential abuse, and can be detected via endpoint detection and response (EDR) solutions as well as traditional Sysmon logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes a foothold and escalates privileges to make necessary registry modifications.</li>
<li>The attacker modifies the <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code> registry key, adding a new entry or modifying an existing one to point to a malicious DLL.</li>
<li>The attacker ensures the malicious DLL is present on the system, either by dropping it directly or using existing system tools to download it.</li>
<li>A user launches a Microsoft Office application (e.g., Word, Excel, PowerPoint).</li>
<li>The Office application loads the DLL specified in the &ldquo;Office Test&rdquo; registry key during startup.</li>
<li>The malicious DLL executes its payload, which could include establishing a reverse shell, installing malware, or exfiltrating data.</li>
<li>The attacker maintains persistence, allowing them to regain access to the system each time an Office application is started.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to a compromised system. The injected DLL can be used to execute arbitrary code, potentially leading to data theft, malware installation, or further compromise of the network. The relatively low risk score suggests a common technique, but the potential for persistent access makes it a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect unauthorized modifications to the &ldquo;Office Test&rdquo; registry key (<code>HKCU\Software\Microsoft\Office Test\Special\Perf\*</code>).</li>
<li>Enable Sysmon Registry event logging to capture registry modifications and activate the Sigma rule above.</li>
<li>Monitor process execution logs for Office applications to detect if a suspicious DLL has been loaded or executed, as described in the investigation guide.</li>
<li>Implement enhanced monitoring and alerting for similar registry modifications across the network, as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>Unusual Executable File Creation by a System Critical Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-unusual-executable-file-creation/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-unusual-executable-file-creation/</guid><description>The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.</description><content:encoded><![CDATA[<p>This detection rule identifies anomalous creation or modification of executable files by critical Windows system processes, like <code>smss.exe</code>, <code>csrss.exe</code>, and <code>lsass.exe</code>. Attackers may attempt to leverage these processes to evade detection, and the rule is designed to detect such activities. The rule leverages data from Elastic Defend, Microsoft Defender XDR, SentinelOne, CrowdStrike, and Sysmon. It provides investigation steps to help analysts triage and analyze potential incidents, focusing on the identity of the writing process, its lineage, and the characteristics of the written file. This rule is designed to detect potential remote code execution or other forms of exploitation targeting Windows systems. The rule logic excludes specific legitimate file paths to minimize false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes code on the system.</li>
<li>The attacker attempts to escalate privileges.</li>
<li>The attacker leverages a system critical process to create or modify an executable file.</li>
<li>The created/modified file may be a backdoor, malware component, or a tool for further exploitation.</li>
<li>The attacker uses the created executable to establish persistence.</li>
<li>The attacker uses the newly created executable to perform lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution with elevated privileges. The number of victims is dependent on the scope of the initial compromise. The targeted sectors include any organization running vulnerable Windows systems. If the attack succeeds, the adversary can gain full control over the system, leading to data theft, system disruption, or further propagation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Unusual Executable File Creation by a System Critical Process&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging (Event ID 11) to enhance detection capabilities (see setup instructions in the rule source).</li>
<li>Investigate any alerts generated by this rule, paying close attention to the writing process&rsquo;s identity, lineage, and the characteristics of the written file as detailed in the rule&rsquo;s triage and analysis section.</li>
<li>Correlate alerts from this rule with other endpoint and network activity to identify the scope of the potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Windows Script Execution from Archive File</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</guid><description>This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly use archive files (ZIP, RAR, 7z) to deliver malicious scripts, such as JScript and VBScript, to Windows systems. This technique allows them to bypass some initial security checks and deliver payloads that can execute arbitrary code. The &ldquo;Windows Script Execution from Archive&rdquo; detection identifies instances where Windows Script Host (wscript.exe) is launched from temporary directories containing extracted archive contents. This activity can indicate a user has opened a malicious archive, leading to potential malware execution. This detection focuses on the parent-child process relationship, where explorer.exe, winrar.exe, or 7zFM.exe spawns wscript.exe to execute scripts from the temp directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious archive file (e.g., ZIP, RAR, 7z) via email or downloads it from a website.</li>
<li>The user opens the archive file using a file archiver tool like Explorer, WinRAR, or 7-Zip.</li>
<li>The archiver extracts the contents, including a malicious JScript (.js) or VBScript (.vbs) file, to a temporary directory, such as <code>\Users\*\AppData\Local\Temp\7z*\</code>.</li>
<li>The user (or the archiver tool) inadvertently executes the extracted script using Windows Script Host (wscript.exe).</li>
<li>Wscript.exe executes the malicious script, which may perform a variety of actions, such as downloading and executing additional payloads.</li>
<li>The script establishes persistence via registry modification, adding a run key to execute upon system startup.</li>
<li>The script connects to a command-and-control server to receive further instructions.</li>
<li>The attacker gains control of the compromised system and begins lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to arbitrary code execution on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. While the number of affected organizations is not specified, the technique is broadly applicable to any Windows environment where users handle archive files, potentially affecting numerous individuals and organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of wscript.exe and its arguments.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution from Archive&rdquo; to your SIEM to identify suspicious script execution patterns.</li>
<li>Monitor process activity for wscript.exe and other scripting engines executing from temporary directories.</li>
<li>Configure endpoint security solutions to block execution of scripts from common temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>scripting</category><category>archive</category></item><item><title>Executable File Creation with Multiple Extensions</title><link>https://feed.craftedsignal.io/briefs/2024-01-executable-file-creation-multiple-extensions/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-executable-file-creation-multiple-extensions/</guid><description>Detection of executable files created with multiple extensions, a masquerading technique to evade defenses.</description><content:encoded><![CDATA[<p>Adversaries may use masquerading techniques to evade defenses and blend into the environment by manipulating the name or location of a file, tricking users into executing malicious code disguised as a benign file type. This rule detects the creation of executable files with multiple extensions, a common method of masquerading. The rule focuses on identifying suspicious file creations that use misleading extensions, specifically targeting files with an &ldquo;.exe&rdquo; extension preceded by common benign extensions. It excludes known legitimate processes to minimize false positives. This activity is relevant for defenders to identify potential threats where adversaries attempt to bypass security measures by disguising malicious files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious executable file with a double extension (e.g., &ldquo;document.pdf.exe&rdquo;).</li>
<li>The attacker delivers the malicious file to the target system via phishing or other means.</li>
<li>The user downloads or receives the file and attempts to open it.</li>
<li>Windows displays the file with the first extension (&ldquo;document.pdf&rdquo;) by default, misleading the user.</li>
<li>Upon execution, Windows recognizes the &ldquo;.exe&rdquo; extension and executes the file.</li>
<li>The malicious executable runs, potentially deploying malware or performing other unauthorized actions.</li>
<li>The malware establishes persistence or attempts lateral movement within the network.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware infection, data breaches, and system compromise. This technique bypasses common file type restrictions and user awareness, potentially affecting a wide range of users and systems. While the number of victims is not specified, the impact can be significant, particularly in organizations where users handle sensitive data. The affected sectors are broad, encompassing any organization where users are susceptible to social engineering attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Executable File Creation with Multiple Extensions&rdquo; to your SIEM and tune for your environment to detect the creation of suspicious files with multiple extensions.</li>
<li>Enable Sysmon Event ID 11 (File Create) for comprehensive file creation monitoring to improve the effectiveness of the detection rule.</li>
<li>Implement enhanced monitoring and logging for similar file creation activities to improve detection and response capabilities.</li>
<li>Educate users on the risks associated with double file extensions and encourage caution when opening attachments from unknown sources.</li>
<li>Review and whitelist legitimate software installations that may create executables with multiple extensions to reduce false positives, as described in the rule&rsquo;s triage notes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>masquerading</category><category>windows</category></item><item><title>Credential Acquisition via Registry Hive Dumping</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</guid><description>Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>This detection identifies attempts to export registry hives containing sensitive credential information using the Windows <code>reg.exe</code> utility. Attackers may target the <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code> hives to extract stored credentials, including password hashes and LSA secrets. The activity is often part of a broader credential access campaign. The rule focuses on detecting the execution of <code>reg.exe</code> with specific arguments indicating an attempt to save or export these critical registry hives. The use of <code>reg.exe</code> makes this technique accessible to various threat actors, including ransomware groups and nation-state actors. Defenders need to monitor for this activity to prevent unauthorized credential access and potential lateral movement within the network. This rule specifically looks for &ldquo;save&rdquo; and &ldquo;export&rdquo; arguments targeting SAM and SECURITY hives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>reg.exe</code> from the command line or through a script.</li>
<li>The <code>reg.exe</code> command includes arguments to save or export registry hives.</li>
<li>The target registry hives are <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code>, containing sensitive credential information.</li>
<li>The exported registry hive is saved to a file on disk or a network share.</li>
<li>The attacker may compress or encrypt the exported registry hive to evade detection.</li>
<li>The attacker retrieves the exported registry hive for offline analysis.</li>
<li>The attacker extracts credential information from the registry hive, such as password hashes and LSA secrets, to use in lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to acquire sensitive credentials stored within the registry. This can lead to lateral movement within the network, privilege escalation, and ultimately, data exfiltration or system compromise. Compromised credentials can be used to access critical systems and data, causing significant damage to the organization. The impact is considered high due to the potential for widespread access and control over the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation auditing with command line arguments to capture the execution of <code>reg.exe</code> with relevant arguments. (<a href="https://ela.st/audit-process-creation">Data Source: Windows Security Event Logs, Sysmon</a>)</li>
<li>Deploy the Sigma rule <code>Detect Registry Hive Export via Reg.exe</code> to your SIEM to detect the execution of <code>reg.exe</code> with arguments indicative of registry hive dumping.</li>
<li>Implement access controls and monitor file system activity to detect unauthorized access or modification of registry hive files.</li>
<li>Review and restrict the use of <code>reg.exe</code> to authorized personnel and processes.</li>
<li>Monitor for parent processes of <code>reg.exe</code> that are unusual or unexpected, which might indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the process command line, parent process, and destination of the exported registry hive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-dump</category><category>windows</category></item><item><title>Process Activity via Compiled HTML File Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</guid><description>Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers are known to deliver malicious payloads within compiled HTML files (.chm) to bypass security measures and gain initial access to systems. This technique leverages the Microsoft HTML Help system and its associated executable, hh.exe, to proxy the execution of malicious code. Compiled HTML files can contain various types of content, including HTML documents, images, and scripting languages like VBA, JScript, Java, and ActiveX. By embedding malicious scripts or executables within a .chm file, attackers can trick users into executing them when they open the file. This is particularly effective because hh.exe is a signed binary, which may allow it to bypass certain security controls. The scope of this technique affects Windows systems where the HTML Help system is installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .chm file containing embedded malicious code, such as a PowerShell script or executable.</li>
<li>The attacker delivers the .chm file to the victim via social engineering, such as phishing or malicious websites.</li>
<li>The victim opens the .chm file, causing hh.exe to launch.</li>
<li>hh.exe processes the .chm file, rendering its content, which includes the embedded malicious script or executable.</li>
<li>The malicious code executes, often spawning a scripting interpreter like <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The scripting interpreter executes commands to download additional payloads or perform malicious actions on the system.</li>
<li>The attacker gains initial access to the victim&rsquo;s system.</li>
<li>The attacker escalates privileges and moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, code execution, and potentially full system compromise. This can result in data theft, malware installation, and further lateral movement within the network. The severity and impact depend on the permissions of the user running hh.exe and the nature of the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Compiled HTML File Spawning Suspicious Processes&rdquo; to your SIEM to detect instances where <code>hh.exe</code> is the parent process of scripting interpreters.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Monitor process execution chains for unknown processes originating from <code>hh.exe</code>, as mentioned in the investigation guide.</li>
<li>Implement email filtering and security awareness training to prevent users from opening malicious .chm files delivered via phishing.</li>
<li>Block the execution of unsigned or untrusted executables in the environment to reduce the risk of malicious code execution.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne to detect and respond to malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>compiled-html</category><category>windows</category><category>proxy-execution</category></item><item><title>Symbolic Link Creation to Shadow Copies for Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</guid><description>Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.</description><content:encoded><![CDATA[<p>This rule identifies the creation of symbolic links to shadow copies on Windows systems. Attackers use this technique to gain access to sensitive files stored within shadow copies, including the ntds.dit file (containing password hashes), system boot keys, and browser offline credentials. This approach allows them to bypass normal file access controls and extract credentials for lateral movement or privilege escalation. The detection rule is designed to ingest data from various sources, including Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs, providing broad coverage across different endpoint security solutions. The activity is typically initiated by command-line tools like cmd.exe or powershell.exe, making detection through process monitoring feasible. This technique is particularly relevant as it targets credential dumping, a critical stage in many attack campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li>The attacker elevates privileges to gain administrative rights, which are required to create shadow copies and symbolic links.</li>
<li>The attacker creates a volume shadow copy using <code>vssadmin.exe</code> or similar tools.</li>
<li>The attacker uses <code>mklink</code> command or PowerShell <code>New-Item -ItemType SymbolicLink</code> to create a symbolic link to the shadow copy path.</li>
<li>The symbolic link points to a directory within the shadow copy containing sensitive files like <code>ntds.dit</code> or browser credential stores.</li>
<li>The attacker copies the targeted sensitive files (e.g., <code>ntds.dit</code>) from the shadow copy using the symbolic link.</li>
<li>The attacker removes the shadow copy to cover their tracks, although the symbolic link creation remains as evidence.</li>
<li>The attacker extracts credentials from the copied <code>ntds.dit</code> file offline for use in lateral movement or further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized access to sensitive credentials stored on the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, the compromise of critical assets. If the <code>ntds.dit</code> file is accessed, the entire Active Directory domain could be at risk, potentially affecting thousands of users and systems. This type of attack is particularly damaging as it allows attackers to operate undetected for extended periods while they harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via Cmd&rdquo; to detect the creation of symbolic links to shadow copies via <code>cmd.exe</code> (rules).</li>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via PowerShell&rdquo; to detect the creation of symbolic links to shadow copies via <code>powershell.exe</code> (rules).</li>
<li>Enable Sysmon Event ID 1 (Process Creation) logging to provide necessary data for the Sigma rules to function correctly (setup).</li>
<li>Review the &ldquo;Investigating Symbolic Link to Shadow Copy Created&rdquo; section in the rule&rsquo;s notes for triage and analysis steps when the rule triggers.</li>
<li>Monitor for the usage of <code>mklink</code> command with the <code>HarddiskVolumeShadowCopy</code> argument in process command lines.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Mimikatz MemSSP Log File Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</guid><description>This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.</description><content:encoded><![CDATA[<p>This detection identifies the creation of the <code>mimilsa.log</code> file, a default log generated by the Mimikatz <code>misc::memssp</code> module. The <code>misc::memssp</code> module injects a malicious Security Support Provider (SSP) into the Local Security Authority Subsystem Service (LSASS) process. This injected SSP logs credentials from subsequent logons to the compromised host, allowing attackers to capture sensitive information. The creation of this log file is a strong indicator of credential access attempts and the potential compromise of user accounts and system security. This rule is designed for data generated by Elastic Defend and also supports data from CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Mimikatz or a similar tool with the <code>misc::memssp</code> module.</li>
<li>Mimikatz injects a malicious SSP library (e.g., <code>mimilib.dll</code>) into the LSASS process (<code>lsass.exe</code>).</li>
<li>The injected SSP hooks into the authentication process.</li>
<li>When users log on to the system, the SSP captures their credentials.</li>
<li>The captured credentials are written to the <code>mimilsa.log</code> file, typically located in <code>C:\Windows\System32\</code>.</li>
<li>The attacker retrieves the <code>mimilsa.log</code> file to obtain the captured credentials.</li>
<li>The attacker uses the stolen credentials to escalate privileges, move laterally within the network, and access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Mimikatz MemSSP attack can lead to the compromise of user accounts, including those with administrative privileges. This allows attackers to gain unauthorized access to sensitive data, systems, and resources within the organization. Lateral movement becomes easier, potentially impacting a large number of systems. The compromised credentials can also be used for external attacks, such as gaining access to cloud services or other external resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Mimikatz Memssp Log File Detected</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging to detect the creation of <code>mimilsa.log</code> files.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that created the log file and any subsequent file access.</li>
<li>Monitor for the presence of <code>mimilib.dll</code> and any LSA Security Packages registry modifications, as these may indicate persistent SSP installation.</li>
<li>Review and restrict interactive logons to high-value hosts to minimize the potential for credential theft.</li>
<li>Investigate related alerts for the same <code>host.id</code> in the last 48 hours covering delivery, privilege escalation, LSASS access, persistence, lateral movement, or additional credential access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>mimikatz</category><category>memssp</category><category>windows</category></item><item><title>Windows Subsystem for Linux Enabled via Dism Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-wsl-enabled-via-dism/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wsl-enabled-via-dism/</guid><description>Adversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.</description><content:encoded><![CDATA[<p>Attackers may enable the Windows Subsystem for Linux (WSL) to run Linux applications and tools directly on Windows, potentially bypassing security controls and hindering detection. This involves using the Dism.exe utility to enable the &ldquo;Microsoft-Windows-Subsystem-Linux&rdquo; feature. By leveraging WSL, adversaries can execute malicious code, access Windows resources, and perform various malicious activities while blending in with legitimate system processes. The use of WSL provides an environment where traditional Windows-based security solutions may have limited visibility, thus offering a way to evade detection. This activity has been observed as a post-exploitation technique, used after initial access to a compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using compromised credentials.</li>
<li>The attacker executes Dism.exe (Deployment Image Servicing and Management tool).</li>
<li>Dism.exe is invoked with the command-line argument to enable the &ldquo;Microsoft-Windows-Subsystem-Linux&rdquo; feature.</li>
<li>The system processes the Dism.exe command and enables WSL.</li>
<li>The attacker installs a Linux distribution (e.g., Ubuntu, Kali) within the WSL environment.</li>
<li>The attacker uses the WSL environment to execute Linux-based tools and scripts for reconnaissance, lateral movement, or data exfiltration.</li>
<li>The attacker leverages the WSL environment to interact with Windows resources or execute Windows commands.</li>
<li>The attacker achieves their objective, such as stealing sensitive data or establishing persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enablement of WSL can lead to a compromised Windows system being used as a platform for Linux-based attacks. This can result in data theft, system compromise, and further propagation of malicious activity within the network. The use of WSL can make it difficult to detect malicious activity since it allows attackers to blend Linux-based attacks with normal Windows operations. The lack of visibility into the WSL environment by traditional Windows security tools can lead to prolonged periods of undetected malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>Dism.exe</code> with command-line arguments that include <code>Microsoft-Windows-Subsystem-Linux</code> to detect WSL enablement attempts (see Sigma rule <code>Detect WSL Enablement via Dism</code>).</li>
<li>Enable Sysmon process creation logging to capture detailed command-line information for processes, which is crucial for detecting this activity (Sysmon Event ID 1).</li>
<li>Implement the provided Sigma rule to detect suspicious usage of the DISM utility to enable WSL. Tune the rule based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Detect WSL Enablement via Dism</code> to determine the legitimacy of the activity.</li>
<li>Monitor network connections originating from WSL processes for suspicious outbound traffic.</li>
<li>Consider blocking the execution of Dism.exe if WSL is not a sanctioned tool in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>wsl</category><category>windows</category></item><item><title>Windows Host Network Discovery Enabled via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-enable-network-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-enable-network-discovery/</guid><description>Attackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.</description><content:encoded><![CDATA[<p>Attackers can leverage the <code>netsh.exe</code> utility to modify Windows Firewall settings, specifically enabling Network Discovery. This setting allows a host to broadcast its presence and services, making it easier for attackers to identify potential targets within the network for lateral movement. The behavior is often a post-exploitation technique to weaken host-based defenses after gaining initial access. The modification uses netsh.exe, a command-line scripting utility for managing network configurations. This activity can be easily scripted and automated, making it a common step in reconnaissance and lateral movement playbooks. Defenders should monitor for unauthorized use of <code>netsh.exe</code> to modify firewall settings.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Windows host.</li>
<li>Attacker executes <code>netsh.exe</code> with elevated privileges.</li>
<li><code>netsh.exe</code> is used to modify the Windows Firewall configuration.</li>
<li>The specific command executed enables Network Discovery using the <code>netsh advfirewall firewall set rule group=&quot;Network Discovery&quot; new enable=Yes</code> syntax.</li>
<li>The firewall rule group &ldquo;Network Discovery&rdquo; is modified to allow inbound and outbound traffic.</li>
<li>The compromised host begins sending out broadcast messages, advertising its presence and services on the network.</li>
<li>The attacker uses the information gathered to identify other vulnerable systems on the network.</li>
<li>The attacker moves laterally to other systems based on the discovery information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to easily enumerate and identify other vulnerable systems within the network. This can lead to rapid lateral movement, further compromising the environment. The risk is heightened when the compromised host has access to sensitive data or critical systems. There is no specific victim count or sector targeted mentioned in the provided source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Enable Host Network Discovery via Netsh&rdquo; to your SIEM to detect the use of <code>netsh.exe</code> to enable network discovery (see rule below).</li>
<li>Enable Windows Firewall logging and monitor for changes to firewall rules, specifically those related to Network Discovery.</li>
<li>Review and restrict the use of <code>netsh.exe</code> to authorized personnel and systems only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>firewall</category></item><item><title>Windows Firewall Disabled via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-firewall-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-firewall-disable/</guid><description>Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.</description><content:encoded><![CDATA[<p>Attackers often attempt to disable or modify system firewalls to evade network restrictions and facilitate lateral movement within a compromised environment. The Windows Firewall, a built-in component, provides host-based traffic filtering. Disabling it allows unrestricted communication, aiding command and control activities and hindering detection efforts. This activity is commonly achieved through PowerShell, leveraging cmdlets like <code>Set-NetFirewallProfile</code>. The rule focuses on detecting the use of this specific cmdlet to disable the Windows Firewall, alerting defenders to potential defense evasion attempts. This technique is valuable to attackers across various attack vectors, especially after initial access has been established.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access through methods such as phishing or exploiting a vulnerability in a network-facing application.</li>
<li>Privilege Escalation (if necessary): The attacker escalates privileges to gain the necessary permissions to modify firewall settings.</li>
<li>PowerShell Execution: The attacker executes PowerShell, either through an interactive session or a script.</li>
<li>Disable Firewall Profile: The attacker uses the <code>Set-NetFirewallProfile</code> cmdlet with parameters such as <code>-Enabled False</code> to disable the firewall for all, public, domain, or private profiles.</li>
<li>Network Reconnaissance: With the firewall disabled, the attacker performs network reconnaissance to identify valuable assets and potential lateral movement paths.</li>
<li>Lateral Movement: The attacker moves laterally to other systems on the network, exploiting trust relationships or vulnerabilities.</li>
<li>Command and Control: The attacker establishes command and control channels to communicate with compromised systems and exfiltrate sensitive data.</li>
<li>Data Exfiltration or Further Exploitation: The attacker exfiltrates sensitive data or continues to exploit the environment based on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of the Windows Firewall can lead to unrestricted lateral movement within a network, allowing attackers to compromise additional systems and exfiltrate sensitive data. This can result in data breaches, financial losses, and reputational damage. While the source does not specify the number of affected organizations, any environment relying on Windows Firewall for network segmentation is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the use of <code>Set-NetFirewallProfile</code> with the <code>-Enabled False</code> parameter (see Sigma rule below).</li>
<li>Enable process creation logging on Windows endpoints to capture PowerShell executions (reference the logsource in the Sigma rule).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the firewall modification activity.</li>
<li>Review and enforce the principle of least privilege to limit the number of users with permissions to modify firewall settings.</li>
<li>Consider implementing additional network segmentation and monitoring controls to detect and prevent lateral movement even if the Windows Firewall is disabled.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>firewall</category><category>windows</category></item><item><title>Windows Defender Exclusions Added via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion-powershell/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion-powershell/</guid><description>Adversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.</description><content:encoded><![CDATA[<p>Attackers may attempt to evade detection by modifying Windows Defender&rsquo;s configuration to exclude specific files, folders, or processes from scanning. This is often achieved by using PowerShell commands to add exclusions. The tactic allows malware to operate without being detected by the built-in antivirus solution. Observed as early as 2018 with Trickbot disabling Windows Defender, this technique remains relevant today. This activity can be performed using <code>Add-MpPreference</code> or <code>Set-MpPreference</code> commands in PowerShell, specifying exclusions by path or process name. Detecting these modifications is critical for maintaining the integrity of endpoint security. The scope of targeting ranges from individual workstations to entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via an undisclosed method.</li>
<li>The attacker executes PowerShell with administrative privileges.</li>
<li>The attacker uses the <code>Add-MpPreference</code> or <code>Set-MpPreference</code> cmdlet to add an exclusion.</li>
<li>The exclusion specifies a file path, folder, or process that should be ignored by Windows Defender.</li>
<li>Windows Defender is reconfigured to ignore the specified item.</li>
<li>The attacker deploys or executes malware in the excluded location.</li>
<li>The malware operates without interference from Windows Defender.</li>
<li>The attacker achieves their final objective, such as data theft or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to operate undetected on compromised systems, leading to potential data breaches, lateral movement within the network, and deployment of ransomware. While the exact number of victims is unknown, this technique is widely used by various threat actors, impacting organizations across various sectors. The lack of detection can lead to prolonged periods of compromise, increasing the potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Windows Defender Exclusions Added via PowerShell&rdquo; to your SIEM to detect suspicious PowerShell commands used to add exclusions.</li>
<li>Enable Sysmon process creation logging with command line auditing to capture the necessary event data for the Sigma rule.</li>
<li>Regularly review Windows Defender exclusion lists to identify any unauthorized or suspicious entries.</li>
<li>Investigate any PowerShell process that uses <code>Add-MpPreference</code> or <code>Set-MpPreference</code> with exclusion parameters, as identified by the provided Sigma rule.</li>
<li>Monitor for processes and file modifications within excluded directories.</li>
<li>Configure alerts to notify security teams when new Windows Defender exclusions are added.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>Suspicious Mofcomp Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-mofcomp-activity/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mofcomp-activity/</guid><description>This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.</description><content:encoded><![CDATA[<p>The rule detects suspicious usage of <code>mofcomp.exe</code>, a command-line tool used to compile Managed Object Format (MOF) files. Attackers can abuse MOF files to manipulate the Windows Management Instrumentation (WMI) repository by building malicious WMI scripts for persistence or execution. This can be achieved by creating their own namespaces and classes within WMI or establishing persistence through WMI Event Subscriptions. The rule identifies unusual mofcomp.exe activity by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes like <code>ScenarioEngine.exe</code> and system accounts (<code>S-1-5-18</code>). This detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, Crowdstrike, and Windows Security Event Logs. The rule aims to detect potential misuse of WMI for malicious purposes, enhancing the visibility of attacker techniques for execution and persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker uploads a malicious MOF file to the compromised system.</li>
<li>The attacker executes <code>mofcomp.exe</code> to compile the malicious MOF file.</li>
<li><code>mofcomp.exe</code> processes the MOF file, creating new namespaces and classes or modifying existing ones in the WMI repository.</li>
<li>If the MOF file creates a WMI Event Subscription, it triggers the execution of a malicious script or binary when a specific event occurs.</li>
<li>The malicious script or binary executes, performing actions such as installing malware, creating backdoors, or exfiltrating data.</li>
<li>The attacker maintains persistence through the WMI Event Subscription, ensuring continued access even after system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via malicious MOF files can lead to persistent access, code execution, and system compromise. Attackers can use this technique to install malware, create backdoors, or steal sensitive data. The rule aims to detect early stages of such attacks, preventing significant damage. By establishing persistence, attackers can maintain long-term control over the compromised system, evading traditional detection methods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious <code>mofcomp.exe</code> activity and tune for your environment.</li>
<li>Enable process creation logging and command-line auditing on Windows systems to capture necessary events for the provided Sigma rules.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on unusual MOF file paths, parent processes, and user accounts.</li>
<li>Review and monitor WMI namespaces and classes for unauthorized modifications or additions following any detected suspicious <code>mofcomp.exe</code> activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>persistence</category><category>windows</category></item><item><title>Signed Proxy Execution via MS Work Folders</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-workfolders-control-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-workfolders-control-execution/</guid><description>Attackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.</description><content:encoded><![CDATA[<p>Windows Work Folders is a Microsoft file server role that allows users to sync work files between their PCs and a central server. The WorkFolders.exe process, when called, will automatically execute any Portable Executable (PE) named control.exe as an argument before accessing the synced share. Attackers can abuse this functionality by placing a malicious executable renamed to control.exe in a location synced by Work Folders, and then triggering WorkFolders.exe. This can lead to the execution of arbitrary code in a manner that bypasses application control policies, as WorkFolders.exe is a signed Microsoft binary. This technique has been observed in the wild and documented by security researchers. This allows attackers to execute code from locations outside the standard Windows directories, evading traditional detection mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system through an unspecified means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker places a malicious executable and renames it to <code>control.exe</code> in a directory accessible to Work Folders.</li>
<li>The attacker configures Windows Work Folders to synchronize the directory containing the malicious <code>control.exe</code>.</li>
<li>The victim system synchronizes with the Work Folders server, copying the malicious <code>control.exe</code> to the local machine.</li>
<li>The attacker triggers the <code>WorkFolders.exe</code> process.</li>
<li><code>WorkFolders.exe</code> executes the <code>control.exe</code> binary from the synced folder.</li>
<li>The malicious <code>control.exe</code> executes, performing attacker-defined actions such as establishing persistence, escalating privileges, or deploying additional malware.</li>
<li>The attacker achieves code execution in a potentially elevated context, leveraging a signed Microsoft binary (<code>WorkFolders.exe</code>) to bypass security controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on a victim&rsquo;s machine, potentially bypassing application control and other security measures. This can lead to a range of malicious activities, including data theft, system compromise, and lateral movement within the network. Given the legitimate use of Work Folders, identifying malicious executions can be challenging, potentially allowing attackers to maintain a persistent foothold. The lack of specific victim counts or industry targeting details in the source material limits a complete assessment of impact scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations where <code>WorkFolders.exe</code> is the parent process and <code>control.exe</code> is the child process, but <code>control.exe</code> is not located in a standard Windows system directory (Sigma rule: &ldquo;Detect Suspicious WorkFolders Control Execution&rdquo;).</li>
<li>Investigate any instances where <code>control.exe</code> is executed from unusual or user-writable locations, especially if <code>WorkFolders.exe</code> is involved (see Attack Chain step 6).</li>
<li>Enable Sysmon process creation logging (Event ID 1) on Windows systems to capture the necessary data for the provided Sigma rules.</li>
<li>Review the Microsoft documentation on Windows Information Protection (WIP) and consider implementing it to encrypt data on PCs using Work Folders.</li>
<li>Implement application control policies that restrict the execution of <code>control.exe</code> to authorized locations (e.g., <code>C:\Windows\System32</code>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>windows</category></item><item><title>Registry Persistence via AppCert DLL Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-appcert-dll-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appcert-dll-persistence/</guid><description>Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.</description><content:encoded><![CDATA[<p>The rule detects attempts to maintain persistence by creating or modifying registry keys associated with AppCert DLLs on Windows systems. AppCert DLLs are loaded by every process that uses common API functions to create processes, making them a viable target for persistence. Adversaries can exploit this by inserting malicious DLL paths into the registry, ensuring their code executes persistently across system reboots. This technique is often used for privilege escalation and persistence. The rule specifically looks for changes in the registry path <code>HKLM\SYSTEM\ControlSet*\Control\Session Manager\AppCertDLLs\*</code>, as well as the equivalent <code>\\REGISTRY\\MACHINE\\SYSTEM\...</code> path. This activity matters because it can lead to stealthy and persistent malware infections. The rule is designed for use with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Crowdstrike, and Sysmon. The detection logic was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker obtains necessary privileges to modify the Windows Registry, potentially requiring administrator rights.</li>
<li>The attacker creates or modifies a registry key under <code>HKLM\SYSTEM\ControlSet*\Control\Session Manager\AppCertDLLs\*</code> to point to a malicious DLL.</li>
<li>The malicious DLL is placed on the file system, often in a location that appears legitimate or is easily accessible.</li>
<li>Any process that uses the standard Windows API to create new processes will load the specified DLL.</li>
<li>The malicious DLL executes its payload, which could include establishing persistence, injecting into other processes, or performing other malicious activities.</li>
<li>The attacker maintains persistence by ensuring the malicious DLL is loaded every time a new process is created.</li>
<li>The final objective is to maintain long-term access to the compromised system, potentially escalating privileges and moving laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistent code execution on the system. This can lead to complete system compromise, data theft, or further propagation of malware within the network. The use of AppCert DLLs allows the malicious code to run in the context of nearly every process, making detection and removal more challenging. Without proper detection and response mechanisms, an attacker can maintain control of the system indefinitely.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging and configure it to monitor the relevant AppCertDLLs registry paths to capture the necessary events for the rules (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rule <code>Detect AppCert DLL Registry Modification</code> to your SIEM to detect unauthorized modifications to the AppCertDLLs registry keys (Rule: Detect AppCert DLL Registry Modification).</li>
<li>Investigate any alerts generated by the rule <code>Detect AppCert DLL Registry Modification</code> to determine the legitimacy of the registry modifications, using the provided triage steps as a guide.</li>
<li>Regularly scan systems for malicious DLLs located in the file system using updated antivirus and anti-malware tools, focusing on DLLs referenced in the AppCertDLLs registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>appcert-dll</category></item><item><title>Rare Connection to WebDAV Target via Rundll32</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-webdav/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-webdav/</guid><description>This rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.</description><content:encoded><![CDATA[<p>Attackers can exploit WebDAV by injecting WebDAV paths into files or features opened by a victim user, leading to NTLM credential leakage through forced authentication. This technique relies on the victim&rsquo;s system attempting to authenticate against a malicious WebDAV server when accessing a file or link containing a WebDAV path. This threat is particularly relevant for defenders because it can lead to unauthorized access to sensitive information and potential lateral movement within the network. The attack leverages <code>rundll32.exe</code> to initiate the WebDAV connection, making it difficult to distinguish from legitimate system processes. The Elastic detection rule identifies rare WebDAV connection attempts to uncover potential credential access attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious document or link containing a WebDAV path.</li>
<li>The victim user opens the malicious document or clicks the link.</li>
<li>The operating system attempts to resolve the WebDAV path using <code>rundll32.exe</code> and the <code>DavSetCookie</code> function.</li>
<li>The system initiates an authentication attempt with the malicious WebDAV server.</li>
<li>The attacker captures the NTLM credentials during the authentication handshake.</li>
<li>The attacker relays the captured NTLM credentials to access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to credential compromise and potential lateral movement within the victim&rsquo;s network. An attacker could gain unauthorized access to sensitive data and systems, potentially leading to data exfiltration, system compromise, or further attacks. This can impact organizations of any size and industry that rely on NTLM authentication. The severity depends on the user&rsquo;s permissions and the resources they can access with their compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect suspicious WebDAV connections initiated via <code>rundll32.exe</code>.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on rare or unusual WebDAV destinations.</li>
<li>Monitor process creation events for <code>rundll32.exe</code> with command-line arguments containing &ldquo;DavSetCookie&rdquo;, focusing on connections to external domains.</li>
<li>Conduct regular security awareness training to educate users about the risks of opening unsolicited documents or clicking suspicious links.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>webdav</category><category>windows</category></item><item><title>New ActiveSync Allowed Device Added via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-activesync-device-added/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-activesync-device-added/</guid><description>The rule detects the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device, potentially allowing attackers to gain persistent access to sensitive email data by adding unauthorized devices.</description><content:encoded><![CDATA[<p>This detection identifies the use of the Exchange PowerShell cmdlet, <code>Set-CASMailbox</code>, to add a new ActiveSync allowed device. Attackers may target user email to collect sensitive information by adding unauthorized devices to a user&rsquo;s allowed ActiveSync devices. The rule focuses on detecting suspicious PowerShell activity by monitoring for specific command patterns indicative of unauthorized device additions. This activity can lead to persistent access to sensitive email data, bypassing normal authentication controls. The original Elastic detection rule was created on 2020/12/15 and updated on 2026/05/04. This matters for defenders because it highlights a persistence mechanism that can be difficult to detect through traditional means.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a privileged account with Exchange management permissions.</li>
<li>The attacker uses PowerShell to execute the <code>Set-CASMailbox</code> cmdlet.</li>
<li>The attacker modifies the <code>ActiveSyncAllowedDeviceIDs</code> attribute for a target user&rsquo;s mailbox.</li>
<li>The attacker adds a rogue device ID to the list of allowed devices.</li>
<li>The attacker configures a mobile device with the rogue device ID to synchronize with the target mailbox.</li>
<li>The attacker gains persistent access to the target user&rsquo;s email, calendar, and contacts.</li>
<li>The attacker exfiltrates sensitive data from the mailbox.</li>
<li>The attacker maintains persistence even after password changes by continuing to synchronize via the added device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to sensitive email data, including confidential communications, financial information, and personal data. This can result in data breaches, compliance violations, and reputational damage. The scope of the impact depends on the privileges of the compromised account and the sensitivity of the data contained in the targeted mailboxes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>ActiveSyncAllowedDeviceID Added via PowerShell</code> to your SIEM and tune for your environment to detect suspicious activity.</li>
<li>Enable Sysmon process-creation logging to capture PowerShell commands for the rule above.</li>
<li>Review Exchange audit logs for instances of <code>Set-CASMailbox</code> being used to modify <code>ActiveSyncAllowedDeviceIDs</code>.</li>
<li>Implement multi-factor authentication (MFA) for all accounts, especially those with Exchange management privileges.</li>
<li>Regularly audit ActiveSync device configurations to identify unauthorized devices.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exchange</category><category>activesync</category><category>powershell</category><category>persistence</category></item><item><title>MSBuild Started by System Process for Defense Evasion and Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-system-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-system-process/</guid><description>Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a legitimate tool used by developers to build applications. However, adversaries are known to abuse MSBuild to execute malicious code, leveraging its trusted status to bypass security measures. This technique allows attackers to perform various actions on compromised systems while blending in with legitimate system activity. The observed behavior involves MSBuild being started by system processes like Explorer (explorer.exe) or Windows Management Instrumentation (WMI, wmiprvse.exe). Defenders should be aware of this unusual activity as it signifies a potential defense evasion tactic and unauthorized code execution within the targeted environment. This activity has been observed across environments leveraging Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, CrowdStrike, and standard Windows event logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker leverages a script or payload that invokes MSBuild.exe.</li>
<li>The script or payload is executed by a system process like explorer.exe or wmiprvse.exe, which is highly unusual for typical MSBuild usage.</li>
<li>MSBuild.exe starts with specific command-line arguments that dictate the build process, often involving malicious code.</li>
<li>The malicious code is embedded within an MSBuild project file (.csproj or similar).</li>
<li>MSBuild.exe executes the malicious code as part of the build process.</li>
<li>The executed code performs actions such as downloading additional payloads, modifying system configurations, or establishing persistence.</li>
<li>The attacker achieves their objective, such as gaining remote access, exfiltrating data, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a variety of negative outcomes, including unauthorized code execution, system compromise, data theft, and potentially complete system takeover. The use of MSBuild as a proxy execution method allows attackers to evade traditional security controls and blend in with legitimate system activities. This can result in delayed detection and increased dwell time, amplifying the potential damage. Since MSBuild is a trusted Microsoft utility, its abuse can make malicious activity harder to identify and respond to.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Build Engine Started by a System Process&rdquo; to your SIEM to detect instances of MSBuild.exe being launched by explorer.exe or wmiprvse.exe (see rules section).</li>
<li>Enable process creation logging with command line arguments to capture the full context of MSBuild.exe executions (reference setup instructions in the source URL).</li>
<li>Investigate any instances of MSBuild.exe started by explorer.exe or wmiprvse.exe to determine if they are legitimate or malicious.</li>
<li>Implement enhanced monitoring and logging for MSBuild.exe and related processes to detect similar activities in the future, ensuring alerts are configured for rapid response.</li>
<li>Review and whitelist any legitimate scripts or administrative tools that leverage MSBuild for authorized tasks to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>msbuild</category><category>proxy-execution</category><category>windows</category></item><item><title>Encoded Executable Stored in the Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-encoded-executable-registry/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-encoded-executable-registry/</guid><description>This rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.</description><content:encoded><![CDATA[<p>This detection identifies Windows Registry modifications used to conceal encoded portable executables, a tactic employed by adversaries to evade traditional disk-based detection mechanisms. The rule focuses on detecting registry entries with data strings that match known encoded executable patterns. This technique allows attackers to store malicious code within the registry, making it more difficult to detect using standard file-based scanning methods. The rule is designed to work with Elastic Defend, but also supports data from third-party EDR solutions, including CrowdStrike, Microsoft Defender XDR, and SentinelOne. The detection logic focuses on identifying registry entries with data resembling encoded executables.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through compromised credentials or exploiting a vulnerability).</li>
<li>The attacker uses a command-line tool, such as PowerShell or cmd.exe, to interact with the registry.</li>
<li>The attacker encodes a malicious executable using tools like <code>certutil</code> or custom encoding scripts.</li>
<li>The attacker creates or modifies a registry key using <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet.</li>
<li>The encoded executable is written to the registry key&rsquo;s data value. The data string often starts with &ldquo;TVqQAAMAAAAEAAAA*&rdquo;.</li>
<li>The attacker uses another script or command to decode the executable from the registry.</li>
<li>The decoded executable is then executed in memory or written to disk for execution.</li>
<li>The attacker achieves their final objective, such as establishing persistence, escalating privileges, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to evade traditional disk-based security measures, enabling them to execute malicious code undetected. Attackers can use this technique to establish persistence, escalate privileges, or deploy malware, including ransomware. The rule helps defenders identify systems where this defense evasion technique is being employed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect encoded executables stored in the registry.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the provided Sigma rules.</li>
<li>Investigate any alerts triggered by the Sigma rules to determine if the registry modification is malicious.</li>
<li>Use endpoint detection and response (EDR) tools to further analyze suspicious processes associated with the registry modifications.</li>
<li>Implement application control policies to prevent the execution of unauthorized executables, even if they are decoded from the registry.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry</category><category>windows</category></item><item><title>Disabling LSA Protection via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-ppl-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-ppl-disable/</guid><description>Adversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.</description><content:encoded><![CDATA[<p>Local Security Authority (LSA) protection is a security feature in Windows that prevents unauthorized processes from accessing sensitive information stored in LSASS memory. This protection is enabled through the RunAsPPL registry key. Adversaries may attempt to disable LSA protection by modifying this registry key, allowing them to more easily access credentials stored in LSASS. This technique can be used as part of a broader attack to escalate privileges and move laterally within a network. The rule detects modifications to the <code>RunAsPPL</code> registry key that weaken LSA protection. This involves monitoring changes to the registry path <code>*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL</code> and alerting when the registry data does not contain values that enable protected LSASS modes (&ldquo;1&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;2&rdquo;, &ldquo;0x00000002&rdquo;).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to an administrator account, if necessary, to gain the required permissions to modify the registry.</li>
<li>The attacker modifies the <code>RunAsPPL</code> registry key located at <code>HKLM\System\CurrentControlSet\Control\Lsa</code> (or similar path under <code>ControlSet00x</code>) to a value that disables LSA protection (e.g., setting it to 0). This is often achieved using tools like <code>reg.exe</code> or PowerShell.</li>
<li>The attacker may stage the system for a reboot to apply the registry change.</li>
<li>After the system reboots, LSASS starts without Protected Process Light (PPL) protection, allowing the attacker to access its memory.</li>
<li>The attacker uses credential dumping tools like <code>Mimikatz</code> to extract credentials from the unprotected LSASS process.</li>
<li>The attacker uses the stolen credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of LSA protection allows attackers to easily extract credentials from LSASS memory. This can lead to widespread compromise of user and service accounts, enabling lateral movement and privilege escalation within the network. The impact could range from data breaches and financial loss to complete system compromise and disruption of critical services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect changes to the <code>RunAsPPL</code> registry key (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;Disabling Lsa Protection via Registry Modification&rdquo; to your SIEM to detect malicious modifications to the <code>RunAsPPL</code> registry key.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process making the change, the user account, and any associated processes (see the &ldquo;investigation_fields&rdquo; in the source).</li>
<li>Monitor for unusual process activity after registry modifications, such as the execution of credential dumping tools (e.g., Mimikatz).</li>
<li>Regularly review and enforce the principle of least privilege to minimize the number of accounts with permissions to modify sensitive registry keys.</li>
<li>Use host isolation when unauthorized LSA-protection weakening is detected and confirmed.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry</category></item><item><title>Command Obfuscation via Unicode Modifier Letters</title><link>https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</guid><description>Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.</description><content:encoded><![CDATA[<p>Attackers are increasingly employing Unicode modifier letters to obfuscate command-line arguments, thereby bypassing traditional string-based detection mechanisms. This technique involves replacing standard ASCII characters with visually similar Unicode characters, making it difficult for simple pattern-matching rules to identify malicious commands. The obfuscation targets common Windows utilities such as <code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, <code>PowerShell.exe</code>, <code>cmd.exe</code>, and others frequently abused in post-exploitation scenarios. Defenders need to implement more sophisticated detection methods that account for Unicode normalization or character range analysis to identify and mitigate this threat. This technique has become more prevalent in the last year as attackers seek to evade common detection strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>Execution: The attacker executes a command-line utility like <code>cmd.exe</code> or <code>powershell.exe</code> to perform malicious actions.</li>
<li>Obfuscation: The command-line arguments are obfuscated by replacing ASCII characters with Unicode modifier letters.</li>
<li>Defense Evasion: The obfuscation allows the attacker to evade simple string-based detections that would normally flag the command as malicious.</li>
<li>Privilege Escalation: The attacker may use the obfuscated command to escalate privileges or gain access to sensitive resources.</li>
<li>Persistence: The attacker may establish persistence by creating a scheduled task or modifying the registry using obfuscated commands.</li>
<li>Lateral Movement: The attacker may use the obfuscated command to move laterally to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful command obfuscation can lead to a significant compromise of Windows systems. Attackers can bypass security controls and execute malicious code undetected, potentially leading to data theft, system disruption, or ransomware deployment. The obfuscation makes it harder for security teams to identify and respond to attacks, increasing the dwell time and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect the presence of Unicode modifier letters in command lines (references: Sigma rules).</li>
<li>Enable Sysmon process creation logging to capture command-line arguments for analysis (references: Sysmon setup instructions).</li>
<li>Investigate any alerts triggered by the Sigma rule and analyze the raw command lines to identify the true intent of the command (references: Triage and Analysis section of the source).</li>
<li>Consider implementing Unicode normalization techniques to remove the obfuscation before analyzing command lines.</li>
<li>Monitor the listed processes (<code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, etc.) more closely for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-line</category><category>unicode</category><category>obfuscation</category></item><item><title>Control Panel Process with Unusual Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-control-panel-abuse/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-control-panel-abuse/</guid><description>Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.</description><content:encoded><![CDATA[<p>This detection rule identifies unusual instances of Control Panel being executed with suspicious keywords or paths in the process command line. Control Panel (control.exe) is a legitimate Windows utility, but adversaries may abuse it to proxy execution of malicious code, effectively bypassing defense mechanisms. This technique involves launching control.exe with command-line arguments that point to malicious payloads or unusual file types, such as image files or INF files, or paths containing traversal sequences. The rule is designed to trigger when control.exe is launched with suspicious arguments like image files, INF files, paths containing traversal sequences, or paths in user-writable locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An adversary gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The adversary stages a malicious payload on the system in a location such as <code>AppData\Local</code> or <code>Users\Public</code>.</li>
<li>The adversary crafts a command line that uses <code>control.exe</code> to execute the malicious payload. The command line includes a suspicious path, such as <code>control.exe evil.jpg</code> or <code>control.exe ..\..\..\evil.dll</code>.</li>
<li>The <code>control.exe</code> process is executed with the malicious command line.</li>
<li><code>Control.exe</code> attempts to load the specified file.</li>
<li>If the file is an executable or script, it is executed within the context of the <code>control.exe</code> process.</li>
<li>The malicious code performs its intended actions (e.g., downloading additional payloads, establishing persistence, or exfiltrating data).</li>
<li>The adversary achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing adversaries to install malware, steal sensitive data, or compromise the entire system. This can result in significant financial loss, reputational damage, and disruption of business operations. Because Control Panel is a signed Microsoft binary, abusing it can bypass application control policies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Control Panel Process with Unusual Arguments&rdquo; to your SIEM to detect suspicious <code>control.exe</code> command lines (rule).</li>
<li>Enable Sysmon process creation logging to capture the command-line arguments of <code>control.exe</code> (logsource).</li>
<li>Monitor process execution events for instances of <code>control.exe</code> launching child processes (rule).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and any subsequent network connections (rule).</li>
<li>Implement application control policies to restrict the execution of <code>control.exe</code> from unusual locations (overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Suspicious .NET Code Compilation via Unusual Parent Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-suspicious-dotnet-compilation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-suspicious-dotnet-compilation/</guid><description>Adversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.</description><content:encoded><![CDATA[<p>Attackers sometimes deliver malicious code in a non-executable format to bypass initial security checks. They then use legitimate .NET compilers like <code>csc.exe</code> (C#) and <code>vbc.exe</code> (VB.NET) to compile the code into an executable on the victim machine. This technique, known as &ldquo;Compile After Delivery&rdquo;, helps them evade traditional signature-based detections. This activity is often launched from scripting engines or system utilities, such as <code>wscript.exe</code>, <code>mshta.exe</code>, <code>cmstp.exe</code>, <code>regsvr32.exe</code> and others. The rule detects these unusual parent-child process relationships, providing an alert for potential post-delivery code compilation activity, and applies to Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unspecified method.</li>
<li>The attacker delivers obfuscated or encoded .NET source code to the target system.</li>
<li>The attacker uses a scripting engine (e.g., <code>wscript.exe</code>, <code>mshta.exe</code>, <code>cscript.exe</code>) or system utility (e.g., <code>wmic.exe</code>, <code>regsvr32.exe</code>, <code>cmstp.exe</code>) to execute a .NET compiler (<code>csc.exe</code> or <code>vbc.exe</code>).</li>
<li>The scripting engine or system utility passes the delivered .NET source code as an argument to the compiler.</li>
<li>The .NET compiler compiles the source code into a binary executable.</li>
<li>The attacker executes the compiled binary.</li>
<li>The compiled binary performs malicious actions, such as establishing persistence, lateral movement, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on the target system, bypassing security measures that rely on pre-execution scanning. This can lead to a range of malicious activities, including data theft, system compromise, and deployment of ransomware. Detecting and preventing this technique is crucial for maintaining the integrity and confidentiality of systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging via Windows Security Event Logs or Sysmon (Event ID 1) to capture process execution data needed for the detection rule.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious .NET Code Compilation&rdquo; to your SIEM to detect instances of .NET compilers being executed by unusual parent processes.</li>
<li>Implement application whitelisting to prevent unauthorized execution of compilers and scripting engines by non-standard parent processes, as described in the rule&rsquo;s documentation.</li>
<li>Monitor process execution for the parent processes listed in the Sigma rule&rsquo;s detection criteria (e.g., <code>wscript.exe</code>, <code>mshta.exe</code>, <code>cmstp.exe</code>, <code>regsvr32.exe</code>) for unusual command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>compile-after-delivery</category><category>windows</category></item><item><title>Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-rdp-enable/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-rdp-enable/</guid><description>Adversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the native Windows command-line tool <code>netsh.exe</code> to modify Windows Firewall rules and enable inbound Remote Desktop Protocol (RDP) connections. This can be used as a defense evasion technique to bypass existing firewall restrictions, allowing them to establish remote access to a compromised host. Ransomware operators and other malicious actors frequently utilize RDP to access victim servers, often using privileged accounts, to further their objectives. This activity can be conducted post-compromise to facilitate lateral movement and the deployment of malicious payloads. The behavior was observed being detected by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host through initial access methods (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker gains a foothold on the system and escalates privileges as needed.</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to modify the Windows Firewall configuration.</li>
<li>The <code>netsh</code> command creates or modifies an inbound rule to allow RDP traffic (TCP port 3389).</li>
<li>The attacker establishes an RDP connection to the compromised host.</li>
<li>The attacker uses the RDP session to perform reconnaissance, move laterally, or deploy malware.</li>
<li>The attacker may attempt to disable or modify security tools to further evade detection.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to unauthorized remote access to systems, enabling lateral movement, data theft, and ransomware deployment. If RDP is enabled on a large number of systems, the attacker can move laterally through the environment. The impact can range from data breaches to complete operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>netsh.exe</code> executing with arguments related to enabling inbound RDP traffic using the &ldquo;Remote Desktop Enabled in Windows Firewall by Netsh&rdquo; rule.</li>
<li>Implement the Sigma rule provided below to detect instances of <code>netsh.exe</code> being used to modify firewall rules related to RDP.</li>
<li>Enforce the principle of least privilege and restrict the use of <code>netsh.exe</code> to authorized personnel only.</li>
<li>Review existing firewall rules and remove any unnecessary or overly permissive rules.</li>
<li>Enable Sysmon process creation logging for enhanced visibility into process execution events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>windows</category><category>netsh</category><category>rdp</category></item></channel></rss>