<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>EdgeWebView — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/edgewebview/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/edgewebview/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Process Access via Direct System Call</title><link>https://feed.craftedsignal.io/briefs/2024-01-direct-syscall-process-access/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-direct-syscall-process-access/</guid><description>Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.</description><content:encoded><![CDATA[<p>This detection identifies suspicious process access events on Windows systems where a process attempts to access another process&rsquo;s memory via direct system calls, bypassing standard Windows API calls. Endpoint security solutions often hook userland Windows APIs to detect malicious code execution. Attackers can evade these hooks by directly invoking syscalls, which are lower-level instructions that interact directly with the operating system kernel. The rule specifically looks for process access events (Sysmon Event ID 10) where the call trace does not originate from known Windows system DLLs like ntdll.dll, indicating a potential attempt to bypass security measures. The rule excludes certain legitimate applications, such as Malwarebytes Anti-Exploit, Cisco AMP, Microsoft EdgeWebView, and Adobe Acrobat DC, to reduce false positives. This technique is often employed by advanced malware and red teams to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious process is executed on the system, either through user interaction or exploitation of a vulnerability.</li>
<li>The process attempts to gain access to another process&rsquo;s memory space (Target Process).</li>
<li>Instead of using standard Windows API calls, the malicious process directly invokes system calls (syscalls) to access the target process&rsquo;s memory.</li>
<li>The <code>CallTrace</code> in the Sysmon event does not originate from expected system DLLs like <code>ntdll.dll</code>, <code>sysfer.dll</code>, <code>wow64cpu.dll</code>, <code>wow64win.dll</code>, or <code>win32u.dll</code>, indicating a direct syscall.</li>
<li>The process might attempt to read sensitive information such as credentials, inject malicious code, or manipulate the target process&rsquo;s behavior.</li>
<li>The malicious process performs actions within the context of the target process, such as executing injected code or accessing sensitive data.</li>
<li>The attacker leverages the compromised process to achieve their objectives, such as data exfiltration, lateral movement, or privilege escalation.</li>
<li>The attacker cleans up any traces of their activity and attempts to maintain persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive data, the injection of malicious code into legitimate processes, and the complete takeover of the affected system. This can result in data breaches, financial loss, and reputational damage. The impact is especially significant if the target process holds sensitive credentials, browser secrets, or has security-product context.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process access logging (Event ID 10) with call tracing and ingest the logs into your SIEM to activate the rules above (<a href="https://ela.st/sysmon-event-10-setup">https://ela.st/sysmon-event-10-setup</a>).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your environment to detect direct syscall process access.</li>
<li>Investigate any alerts generated by these rules, focusing on the <code>SourceImage</code>, <code>TargetImage</code>, <code>GrantedAccess</code>, and <code>CallTrace</code> fields in the Sysmon event to determine the legitimacy of the process access attempt.</li>
<li>Prioritize investigation of alerts where the target process is <code>lsass.exe</code> or other security-sensitive processes.</li>
<li>Implement robust endpoint detection and response (EDR) solutions to detect and prevent malicious activity on endpoints.</li>
<li>Monitor for suspicious process creation events originating from the flagged processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Process Creation Followed by Memory Access from Unknown Region</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-process-calltrace/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-process-calltrace/</guid><description>The rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.</description><content:encoded><![CDATA[<p>This detection identifies potential process injection attempts, specifically process hollowing, by monitoring process creation events followed by memory access from unknown regions. The rule focuses on processes spawned by Microsoft Office applications (winword.exe, excel.exe, outlook.exe, powerpnt.exe), scripting engines (cscript.exe, wscript.exe, mshta.exe), and command-line tools (cmd.exe, powershell.exe, rundll32.exe, regsvr32.exe, wmic.exe, cmstp.exe, msxsl.exe). The logic looks for a spawned process by one of these applications/tools, followed by a process access event for an unknown memory region by the parent process, indicating a potential code injection attempt. Attackers use process injection to hide malicious activity within legitimate processes, evading detection and hindering forensic analysis. This technique is a common tactic used to establish persistence, escalate privileges, or execute malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious document or executes a script.</li>
<li>The Microsoft Office application (e.g., winword.exe) or scripting engine (e.g., wscript.exe) starts as a parent process.</li>
<li>The parent process creates a new child process (e.g., a legitimate system executable).</li>
<li>The attacker injects malicious code into the newly created child process&rsquo;s memory, often overwriting legitimate code sections.</li>
<li>The parent process accesses the child process&rsquo;s memory from an unknown code region, indicating the injected code. Sysmon event ID 10 captures this access.</li>
<li>The injected code executes within the context of the child process, performing malicious actions.</li>
<li>These actions can include establishing persistence, downloading additional malware, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful process injection allows attackers to mask their malicious activities within legitimate processes, making detection and attribution significantly harder. This can lead to prolonged infections, data breaches, and system compromise. The impact can range from individual workstation compromise to widespread organizational damage, depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role. The rule mitigates risks associated with advanced persistent threats (APTs) and commodity malware using process injection for defense evasion.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 10 (Process Access) to collect the necessary telemetry for this detection (<a href="https://ela.st/sysmon-event-1-setup">Sysmon Event ID 1 - Process Creation</a>, <a href="https://ela.st/sysmon-event-10-setup">Sysmon Event ID 10 - Process Access</a>).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Process Creation CallTrace&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious activities performed by the injected code.</li>
<li>Consider memory dumping the child process for further analysis, to examine if malicious code exists.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>process-injection</category><category>windows</category></item></channel></rss>