<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Defender XDR — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/defender-xdr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 30 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/defender-xdr/feed.xml" rel="self" type="application/rss+xml"/><item><title>Wireless Credential Dumping via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</guid><description>Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>Attackers often target wireless credentials to gain unauthorized network access. This involves using the legitimate Windows command-line tool <code>netsh.exe</code> to extract Wi-Fi passwords stored on a compromised system. By leveraging <code>netsh</code>, attackers can bypass traditional security measures and retrieve sensitive information without deploying custom malware. The technique involves specific command-line arguments that instruct <code>netsh</code> to display wireless keys in cleartext, exposing the network passwords. Defenders must monitor <code>netsh</code> command-line activity to identify potential credential access attempts. This activity can lead to lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to list available wireless profiles.</li>
<li>The attacker identifies a target wireless profile from the list.</li>
<li>The attacker executes <code>netsh.exe</code> again, this time specifying the target profile and requesting the key to be displayed in cleartext using the <code>key=clear</code> argument.</li>
<li><code>Netsh.exe</code> retrieves the Wi-Fi password from the Windows Wireless LAN service.</li>
<li>The password is displayed in the command output, which the attacker captures.</li>
<li>The attacker uses the obtained Wi-Fi password to connect to the wireless network.</li>
<li>The attacker can now perform lateral movement and access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful credential dumping allows attackers to gain unauthorized access to wireless networks. This can lead to lateral movement within the organization&rsquo;s network, access to sensitive data, and further compromise of systems and resources. The impact includes potential data breaches, financial losses, and reputational damage. This technique allows attackers to bypass traditional network access controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Wireless Credential Dumping via Netsh</code> to identify suspicious <code>netsh.exe</code> commands in your environment.</li>
<li>Enable Sysmon process creation logging to capture the <code>netsh.exe</code> command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process lineage and user context as outlined in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
<li>Implement strong password policies for Wi-Fi networks, including the use of WPA2 or WPA3 encryption.</li>
<li>Review and restrict the use of <code>netsh.exe</code> on systems where it is not required, using application control solutions.</li>
<li>Monitor for related alerts indicating lateral movement, staging, remote access, or persistence, as mentioned in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>netsh</category><category>windows</category></item><item><title>Persistence via BITS Job Notify Cmdline</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-bits-persistence/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-bits-persistence/</guid><description>Adversaries can achieve persistence by abusing the Background Intelligent Transfer Service (BITS) SetNotifyCmdLine method to execute a program after a job finishes, leading to arbitrary code execution and system compromise.</description><content:encoded><![CDATA[<p>The Background Intelligent Transfer Service (BITS) is a Windows service used for asynchronous, prioritized, and throttled file transfers. Attackers can abuse BITS to establish persistence by using the <code>SetNotifyCmdLine</code> method to execute a program after a BITS job completes or enters a specific state. This technique allows adversaries to run arbitrary code with elevated privileges, bypassing traditional security measures. The detection rule identifies suspicious processes initiated by BITS, excluding known legitimate executables like <code>WerFaultSecure.exe</code>, <code>WerFault.exe</code>, <code>wermgr.exe</code>, and <code>directxdatabaseupdater.exe</code>. This behavior can be employed to maintain access to a compromised system, even after a reboot or user logout. Defenders need to monitor BITS activity for unusual command-line executions to detect and prevent potential persistence attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through other means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker uses the BITSAdmin tool or PowerShell cmdlets to create a new BITS job.</li>
<li>The attacker configures the BITS job to download a malicious payload or execute a malicious script.</li>
<li>The attacker utilizes the <code>SetNotifyCmdLine</code> method to set a command that will be executed upon job completion or a specified state change.</li>
<li>The BITS service executes the specified command, which can be a script interpreter (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>) or a malicious executable.</li>
<li>The malicious command downloads or executes further payloads, establishing persistence on the system.</li>
<li>The attacker maintains persistent access, allowing them to execute commands, steal data, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems. This can lead to data theft, further malware deployment, or complete system compromise. The BITS service runs with elevated privileges, so any command executed via <code>SetNotifyCmdLine</code> will also run with those privileges. This persistence mechanism is difficult to detect because BITS is a legitimate Windows service, and its activity can be easily masked as normal system operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for processes spawned by <code>svchost.exe</code> with arguments containing &ldquo;BITS&rdquo; but not in the exclusion list (WerFaultSecure.exe, WerFault.exe, wermgr.exe, directxdatabaseupdater.exe) using the &ldquo;Persistence via BITS Job Notify Cmdline&rdquo; rule.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious BITS Job Creation&rdquo; to identify unusual BITS job creation activities.</li>
<li>Review BITS job configurations on systems to identify and remove any unauthorized or suspicious jobs.</li>
<li>Enable Sysmon process creation logging to capture detailed information about process execution, including parent-child relationships and command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>bits</category><category>windows</category></item><item><title>PowerShell Script Block Logging Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</guid><description>Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.</description><content:encoded><![CDATA[<p>Attackers frequently disable PowerShell Script Block Logging to evade detection and hide malicious activities on compromised systems. By modifying the <code>EnableScriptBlockLogging</code> registry value to &lsquo;0&rsquo; or &lsquo;0x00000000&rsquo;, adversaries can significantly reduce the visibility into their PowerShell-based attacks. This technique is particularly effective when followed by script-driven activity, making it harder for security teams to identify and respond to threats. This behavior has been observed across multiple environments, including those utilizing endpoint detection and response solutions such as Elastic Defend, Microsoft Defender XDR, SentinelOne, and CrowdStrike. The rule was last updated on 2026-05-04 and is designed to detect these specific registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker may attempt to escalate privileges to gain necessary permissions to modify the registry.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the registry to disable PowerShell Script Block Logging by setting <code>HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging\EnableScriptBlockLogging</code> to 0 or 0x00000000 using <code>reg.exe</code> or PowerShell itself.</li>
<li><strong>Execution:</strong> The attacker executes malicious PowerShell scripts, leveraging the disabled logging to avoid detection. These scripts may be used for reconnaissance, lateral movement, or data exfiltration.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence using various techniques, such as creating scheduled tasks or modifying registry keys to ensure continued access to the system.</li>
<li><strong>Command and Control:</strong> The attacker establishes a command and control channel to communicate with the compromised system and issue further instructions.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems on the network, compromising additional assets.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as data theft, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of PowerShell Script Block Logging can severely hinder incident response efforts, allowing attackers to operate undetected for extended periods. Organizations may experience data breaches, financial losses, and reputational damage. The impact can be widespread as attackers leverage compromised systems for lateral movement and further exploitation. The loss of PowerShell logging can blind security teams, making it difficult to reconstruct attacker actions and contain the breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PowerShell_Script_Block_Logging_Disabled</code> to your SIEM to detect registry modifications that disable PowerShell Script Block Logging.</li>
<li>Monitor registry events for changes to the <code>EnableScriptBlockLogging</code> value, focusing on events with <code>registry.data.strings</code> set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo; (see rule <code>PowerShell_Script_Block_Logging_Disabled</code>).</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively (see references).</li>
<li>Review and harden PowerShell execution policies to prevent unauthorized script execution (related to tactic TA0005).</li>
<li>Implement strict access controls to limit who can modify registry settings related to PowerShell logging (related to tactic TA0005).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>registry</category></item><item><title>UAC Bypass via DiskCleanup Scheduled Task Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.</description><content:encoded><![CDATA[<p>This rule identifies User Account Control (UAC) bypass attempts via hijacking the DiskCleanup Scheduled Task. Attackers exploit this method to execute code with elevated privileges, bypassing standard security controls. The technique involves leveraging the <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> executables with specific arguments (<code>/autoclean</code> and <code>/d</code>) outside of their expected paths. This allows attackers to run malicious code under the guise of a legitimate system process, making detection more challenging. This technique is used to gain elevated privileges on a compromised system, allowing for further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker modifies or creates a scheduled task to execute <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments.</li>
<li>The modified scheduled task is triggered, executing the specified executable with the supplied arguments.</li>
<li>The executable, such as <code>cleanmgr.exe</code>, attempts to run Disk Cleanup.</li>
<li>If the executable path is outside the standard locations (e.g., <code>C:\\Windows\\System32</code> or <code>C:\\Windows\\SysWOW64</code>), it indicates a potential hijack.</li>
<li>Malicious code is executed with elevated privileges due to the UAC bypass.</li>
<li>The attacker uses these elevated privileges to install malware, modify system settings, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass User Account Control (UAC) and execute code with elevated privileges. This can lead to the installation of malware, modification of system settings, data theft, and other malicious activities. While the exact number of victims is unknown, this technique is effective on systems where UAC is enabled but misconfigured or vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup with Suspicious Path&rdquo; to your SIEM and tune for your environment to detect UAC bypass attempts.</li>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup and Taskhostw&rdquo; to your SIEM to detect UAC bypass attempts.</li>
<li>Monitor process creation events for <code>cleanmgr.exe</code> and <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments, focusing on executions outside the standard system directories.</li>
<li>Review and harden scheduled tasks to prevent unauthorized modifications.</li>
<li>Ensure that UAC settings are properly configured and enforced across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows</category><category>diskcleanup</category><category>scheduled-task</category></item><item><title>Process Execution from Suspicious Windows Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</guid><description>Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.</description><content:encoded><![CDATA[<p>This detection identifies process execution from suspicious default Windows directories. Attackers may hide malware in trusted paths to evade defenses, making it difficult for analysts to distinguish between legitimate and malicious activity. The detection focuses on identifying processes running from directories like C:\PerfLogs, C:\Users\Public, and various Windows subdirectories (e.g., C:\Windows\Tasks, C:\Windows\AppReadiness), where executable files are not typically expected to reside. The detection excludes known legitimate processes like SpeechUXWiz.exe, SystemSettings.exe, TrustedInstaller.exe and other Intel and IBM executables to reduce false positives. This technique is often used to bypass security controls or take advantage of existing exceptions applied to these directories. This activity was observed being used by threat actors in the Siestagraph campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker drops a malicious executable into a suspicious directory like C:\Users\Public or C:\Windows\Tasks.</li>
<li>The attacker executes the malware from the unusual directory. This might be achieved using <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The executed malware establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The malware connects to a command-and-control (C2) server to receive further instructions.</li>
<li>The C2 server instructs the malware to perform reconnaissance on the network.</li>
<li>The malware attempts to move laterally to other systems on the network using techniques like pass-the-hash or exploiting vulnerabilities.</li>
<li>The attacker achieves their objective, such as data exfiltration, ransomware deployment, or establishing long-term access to the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, persistence on the system, and further compromise of the network. Attackers can use this technique to bypass security controls and evade detection, potentially leading to data breaches, financial loss, or disruption of services. While the rule itself has a medium severity, the impact of a successful attack using this technique can be severe, depending on the attacker&rsquo;s objectives and the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Process Execution from Unusual Directory&rdquo; to your SIEM and tune for your environment to detect suspicious process execution.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the process execution is legitimate or malicious.</li>
<li>Enable process creation logging, specifically Event ID 4688 with command line process auditing, to ensure the Sigma rule has the necessary data to function effectively.</li>
<li>Review and harden permissions on the listed suspicious directories to prevent unauthorized file creation and execution.</li>
<li>Block execution of unsigned or untrusted executables from these directories using application control solutions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>masquerading</category></item><item><title>Potential Defense Evasion via Filter Manager (fltMC.exe)</title><link>https://feed.craftedsignal.io/briefs/2024-01-filter-manager-evasion/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-filter-manager-evasion/</guid><description>Adversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.</description><content:encoded><![CDATA[<p>The Filter Manager Control Program (fltMC.exe) is a Windows utility used to manage filter drivers, also known as minifilters. These minifilters are leveraged by various security products, including EDR, antivirus solutions, and data loss prevention tools, to intercept and modify I/O requests. Attackers can abuse fltMC.exe to unload these minifilters, effectively disabling or circumventing the security measures they provide. This allows malicious actors to operate without detection, potentially leading to data breaches, malware infections, or other harmful activities. This technique has been observed being used to disable security products such as Bitdefender, SentinelOne and ManageEngine Endpoint Central.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploit).</li>
<li>Attacker executes <code>fltMC.exe</code> with administrative privileges.</li>
<li><code>fltMC.exe</code> attempts to unload a specific filter driver (minifilter).</li>
<li>The operating system processes the request to unload the specified filter driver.</li>
<li>If successful, the targeted minifilter is removed from the active filter stack.</li>
<li>Security software relying on the unloaded minifilter ceases to function correctly, leaving a security gap.</li>
<li>Attacker performs malicious actions, such as deploying malware or exfiltrating sensitive data, without the protection of the disabled filter driver.</li>
<li>Attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to disable or circumvent security controls, increasing the likelihood of successful malware infections, data breaches, and other malicious activities. The scope of impact depends on the specific filter driver unloaded and the security products it supports. Disabling a critical EDR minifilter could leave the entire system vulnerable, while disabling a less critical filter might only impact a subset of security features.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>fltMC.exe</code> with the <code>unload</code> argument to identify potential evasion attempts (see Sigma rule &ldquo;Potential Evasion via Filter Manager&rdquo;).</li>
<li>Investigate any instances of <code>fltMC.exe</code> execution where the parent process is not a known and trusted system management tool.</li>
<li>Implement strict access controls to limit the ability of users to execute <code>fltMC.exe</code> or modify filter driver configurations.</li>
<li>Review the list of exclusions in the provided EQL query to identify any legitimate software that may be generating false positives.</li>
<li>Ensure that endpoint security solutions are properly configured and monitored to detect and prevent unauthorized filter driver modifications.</li>
<li>Enable Sysmon process creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>filter-driver</category><category>fltMC.exe</category><category>windows</category></item><item><title>Network Logon Provider Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-network-logon-provider-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-network-logon-provider-modification/</guid><description>Adversaries may modify the network logon provider registry to register a rogue network logon provider module for persistence and credential access by intercepting authentication credentials in clear text during user logon.</description><content:encoded><![CDATA[<p>Attackers may modify the network logon provider registry to gain persistence or access credentials. This involves registering a rogue network logon provider module that intercepts authentication credentials in clear text during user logon. The modification of the ProviderPath key under the NetworkProvider service registry path can be indicative of this malicious activity. The registry modification is often performed by non-system accounts and the adversary will attempt to hide the malicious DLL by placing it in common directories. This technique allows adversaries to steal user credentials or maintain persistent access to the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker locates the registry key related to network logon providers: <code>HKLM\SYSTEM\CurrentControlSet\Services\*\NetworkProvider\ProviderPath</code>.</li>
<li>The attacker modifies the <code>ProviderPath</code> registry value to point to a malicious DLL.</li>
<li>The system loads the malicious DLL during the logon process.</li>
<li>The malicious DLL intercepts user credentials in clear text.</li>
<li>The attacker harvests the intercepted credentials.</li>
<li>The attacker uses the harvested credentials for lateral movement or further exploitation of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of user credentials, allowing attackers to gain unauthorized access to sensitive systems and data. Modification of the network logon provider registry enables attackers to maintain persistent access to the compromised system, even after a reboot. This can result in data breaches, financial losses, and reputational damage. The severity depends on the level of access granted to the compromised accounts and the sensitivity of the data they can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications to the <code>HKLM\SYSTEM\CurrentControlSet\Services\*\NetworkProvider\ProviderPath</code> key, using the provided Sigma rule to detect suspicious changes.</li>
<li>Enable Sysmon registry event logging to capture registry modifications.</li>
<li>Regularly audit network logon providers and verify the integrity and authenticity of the registered DLLs.</li>
<li>Investigate processes modifying the registry and their associated file creation events for unknown or suspicious processes.</li>
<li>Block execution of unsigned or untrusted DLLs in the network logon provider path.</li>
<li>Deploy the Sigma rule &ldquo;Network Logon Provider Registry Modification&rdquo; to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>registry-modification</category></item><item><title>Detection of Encrypted Archive Creation with WinRAR or 7-Zip</title><link>https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</guid><description>Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.</description><content:encoded><![CDATA[<p>Attackers frequently compress and encrypt data before exfiltration to reduce the amount of data being sent over the network and to obfuscate the contents. This behavior often indicates a later stage of intrusion where the attacker has already collected sensitive data and is preparing to move it out of the environment. The use of archiving tools like WinRAR and 7-Zip with encryption flags can help attackers to hide their activities, making it more difficult for defenders to identify and respond to data theft. This technique has been observed in multiple threat actors including Turla as documented by WeLiveSecurity. This brief focuses on detecting command-line activity indicative of archive creation with encryption using WinRAR or 7-Zip on Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li><strong>Credential Access:</strong> The attacker attempts to obtain credentials using techniques such as Mimikatz or credential dumping.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify sensitive data and systems of interest.</li>
<li><strong>Data Collection:</strong> The attacker gathers sensitive data from various locations on the compromised system or network.</li>
<li><strong>Archive Creation:</strong> The attacker uses WinRAR or 7-Zip to create an encrypted archive of the collected data using command-line arguments like <code>-hp</code>, <code>-p</code>, <code>/hp</code>, or <code>/p</code> with <code>rar.exe</code> or <code>WinRAR.exe</code> or <code>-p*</code> with <code>7z.exe</code> or <code>7za.exe</code>.</li>
<li><strong>Data Staging:</strong> The encrypted archive is moved to a staging location, such as a temporary directory or removable media.</li>
<li><strong>Exfiltration:</strong> The attacker exfiltrates the encrypted archive from the network using various methods, such as FTP, SCP, or cloud storage services.</li>
<li><strong>Covering Tracks:</strong> The attacker deletes the archive from the staging location to remove evidence of the activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including personally identifiable information (PII), financial records, intellectual property, and other confidential information. This can result in significant financial losses, reputational damage, legal liabilities, and regulatory fines for the victim organization. The number of victims and specific sectors targeted will vary depending on the attacker&rsquo;s objectives and the nature of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Encrypting Files with WinRar or 7z - CommandLine&rdquo; to your SIEM to detect the execution of WinRAR or 7-Zip with encryption parameters (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Enable process creation logging with command line arguments in Sysmon to ensure the necessary data is available for detection (Data Source: Sysmon).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the scope and impact of the potential data exfiltration attempt (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Monitor network traffic for unusual outbound connections, particularly to cloud storage services or other external destinations, that may indicate data exfiltration.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>collection</category><category>archive</category><category>exfiltration</category><category>windows</category></item><item><title>Potential Protocol Tunneling via Yuze</title><link>https://feed.craftedsignal.io/briefs/2024-01-yuze-tunneling/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-yuze-tunneling/</guid><description>This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.</description><content:encoded><![CDATA[<p>This rule detects the execution of Yuze, an open-source tunneling tool written in C, which is commonly used for intranet penetration. Yuze supports both forward and reverse SOCKS5 proxy tunneling and is often executed using <code>rundll32</code> to load <code>yuze.dll</code> with the <code>RunYuze</code> export. Threat actors can leverage Yuze to proxy command and control (C2) communications or to pivot within a network. The detection focuses on identifying processes with command-line arguments indicative of Yuze execution, specifically those involving &ldquo;reverse,&rdquo; &ldquo;-c,&rdquo; &ldquo;proxy,&rdquo; &ldquo;fwd,&rdquo; and &ldquo;-l&rdquo; parameters. This activity has been observed in real-world campaigns, increasing the importance of timely detection and response.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a target system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker uploads or drops the <code>yuze.dll</code> file onto the compromised host.</li>
<li>The attacker uses <code>rundll32.exe</code> to execute <code>yuze.dll</code>, calling the <code>RunYuze</code> export.</li>
<li>The command line includes parameters to establish a reverse or forward SOCKS5 proxy tunnel (e.g., <code>rundll32 yuze.dll,RunYuze reverse -c &lt;ip&gt;:&lt;port&gt;</code>).</li>
<li>Yuze establishes a tunnel to a remote server, allowing the attacker to proxy network traffic.</li>
<li>The attacker uses the established tunnel to pivot within the network and access internal resources.</li>
<li>The attacker may proxy C2 traffic through the tunnel, masking the true origin of the commands.</li>
<li>The attacker performs actions on the internal network, such as data exfiltration or lateral movement, using the tunnel as a covert channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish covert communication channels, bypass network security controls, and proxy malicious traffic, potentially leading to unauthorized access to sensitive data, lateral movement within the network, and data exfiltration. The use of Yuze can obscure the origin of attacks, making attribution more difficult and hindering incident response efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Yuze Tunneling via Rundll32&rdquo; to your SIEM to detect the execution of <code>yuze.dll</code> via <code>rundll32.exe</code> with specific command-line arguments.</li>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Auditing) to capture the necessary command-line information for the Sigma rules.</li>
<li>Investigate any identified instances of <code>rundll32.exe</code> executing <code>yuze.dll</code>, focusing on the parent processes and network connections.</li>
<li>Block the C2/relay IP or domain found in the <code>-c</code> argument at DNS/firewall, as described in the Triage and Analysis section of the rule&rsquo;s note.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>tunneling</category><category>yuze</category><category>proxy</category></item></channel></rss>