<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Elastic Endgame — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/elastic-endgame/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/elastic-endgame/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>DNS Global Query Block List Modified or Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</guid><description>Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>The DNS Global Query Block List (GQBL) is a Windows security feature designed to prevent the resolution of specific DNS names, commonly exploited in attacks like WPAD spoofing. Attackers who have obtained elevated privileges, such as DNSAdmin, can modify or disable this list to bypass security controls. This allows exploitation of hosts running WPAD with default settings. The modification of the GQBL can be used for privilege escalation and lateral movement within a network. This rule detects changes to the registry values associated with the GQBL, specifically &ldquo;EnableGlobalQueryBlockList&rdquo; and &ldquo;GlobalQueryBlockList.&rdquo; This activity could indicate an attacker attempting to weaken defenses to facilitate further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain DNSAdmin rights.</li>
<li>The attacker modifies the &ldquo;EnableGlobalQueryBlockList&rdquo; registry value to &ldquo;0&rdquo; or &ldquo;0x00000000,&rdquo; effectively disabling the GQBL.</li>
<li>Alternatively, the attacker modifies the &ldquo;GlobalQueryBlockList&rdquo; registry value to remove &ldquo;wpad&rdquo; from the list.</li>
<li>The attacker leverages the disabled GQBL to conduct WPAD spoofing attacks, redirecting network traffic to attacker-controlled servers.</li>
<li>The attacker captures user credentials transmitted during WPAD authentication.</li>
<li>The attacker uses the captured credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or disabling of the DNS Global Query Block List can lead to WPAD spoofing attacks, credential theft, lateral movement, and ultimately, complete compromise of the network. Attackers can leverage this technique to gain unauthorized access to sensitive data or systems. The impact includes potential data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of DNS Global Query Block List</code> to your SIEM to detect unauthorized changes to the GQBL configuration.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the Sigma rule to function (reference the logsource in the rule).</li>
<li>Review and restrict DNSAdmin privileges to only necessary accounts to minimize the attack surface (reference: Overview section).</li>
<li>Monitor network traffic for unusual DNS queries or WPAD-related activity, correlating with registry modification events (reference: Attack Chain step 5).</li>
<li>Regularly audit registry settings related to DNS configuration, including the GQBL, to identify unauthorized modifications (reference: Attack Chain steps 3 &amp; 4).</li>
<li>Update security policies and procedures to include specific measures for monitoring and protecting the DNS Global Query Block List (reference: Impact section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Suspicious Managed Code Hosting Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</guid><description>This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious managed code hosting processes on Windows systems. Attackers may leverage processes like <code>wscript.exe</code>, <code>cscript.exe</code>, <code>mshta.exe</code>, <code>wmic.exe</code>, <code>svchost.exe</code>, <code>dllhost.exe</code>, <code>cmstp.exe</code>, and <code>regsvr32.exe</code> to execute malicious code, often bypassing traditional security controls. These processes can be abused to load and execute .NET assemblies or other managed code components. The detection focuses on identifying unusual file creation events associated with these processes which could indicate an attacker is attempting to leverage these processes for malicious purposes. This activity might be indicative of code injection, defense evasion, or other suspicious code execution techniques. The rule uses EQL to search for file events associated with specific processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a phishing email or compromised software.</li>
<li>The attacker uses a LOLBin such as <code>mshta.exe</code> or <code>regsvr32.exe</code> to bypass application control.</li>
<li>The LOLBin executes a malicious script or loads a malicious DLL from a user-writable location.</li>
<li>The malicious script or DLL performs reconnaissance activities, such as gathering system information or enumerating network resources.</li>
<li>The attacker then attempts to escalate privileges by exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses the compromised process to download and execute additional malware.</li>
<li>The malware establishes persistence on the system through scheduled tasks or registry modifications.</li>
<li>The attacker performs lateral movement within the network, compromising additional systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal sensitive data, and establish persistence. The use of LOLBins can bypass application control, making detection more challenging. Depending on the scope of the attack, this could result in significant financial losses, reputational damage, and disruption of business operations. This is a high-severity finding due to the potential for attackers to gain full control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging (Event ID 11) to collect the necessary data for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Managed Code Hosting Process&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the file paths, process command lines, and parent processes involved.</li>
<li>Monitor for unexpected file creation events associated with processes like <code>wscript.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code> in user-writable directories.</li>
<li>Implement application control policies to restrict the execution of LOLBins and other potentially malicious processes.</li>
<li>Correlate the detection with other security events to identify related malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>managed code</category><category>lolbin</category></item><item><title>Potential Remote Install via MsiExec</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</guid><description>This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.</description><content:encoded><![CDATA[<p>Adversaries may abuse Windows Installer (msiexec.exe) to perform remote installations of malicious payloads. This technique is used for initial access, defense evasion, and execution of arbitrary code. The detection rule identifies attempts to install a file from a remote server using MsiExec. The rule looks for msiexec.exe processes running with arguments such as <code>-i</code>, <code>/i</code>, <code>-p</code>, or <code>/p</code>, indicative of remote installations, and executed from suspicious parent processes like <code>sihost.exe</code>, <code>explorer.exe</code>, <code>cmd.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>, <code>wmiprvse.exe</code>, <code>pcalua.exe</code>, <code>forfiles.exe</code>, and <code>conhost.exe</code>. The rule includes exceptions to reduce false positives from legitimate software installations, specifically excluding command lines containing <code>--set-server</code>, <code>UPGRADEADD</code>, <code>--url</code>, <code>USESERVERCONFIG</code>, <code>RCTENTERPRISESERVER</code>, <code>app.ninjarmm.com</code>, <code>zoom.us/client</code>, <code>SUPPORTSERVERSTSURI</code>, <code>START_URL</code>, <code>AUTOCONFIG</code>, <code>awscli.amazonaws.com</code>, <code>*/i \&quot;C:*</code>, and <code>*/i C:\\*</code>. This technique can lead to complete system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unspecified method (e.g., phishing, exploit).</li>
<li>The attacker uses a script or command-line interpreter (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to initiate the <code>msiexec.exe</code> process.</li>
<li>The <code>msiexec.exe</code> process is launched with arguments that specify a remote MSI package (<code>-i</code>, <code>/i</code>, <code>-p</code>, <code>/p</code>) and enable silent installation (<code>/qn</code>, <code>-qn</code>, <code>-q</code>, <code>/q</code>, <code>/quiet</code>).</li>
<li>The <code>msiexec.exe</code> process downloads the MSI package from a remote server over HTTP or HTTPS.</li>
<li><code>msiexec.exe</code> executes the downloaded MSI package, which may contain malicious payloads.</li>
<li>The malicious payload executes, potentially performing actions such as installing malware, establishing persistence, or escalating privileges.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker performs further actions, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive data, or disrupt system operations. A compromised system can be used as a pivot point to access other systems on the network. The impact can range from data breaches and financial losses to reputational damage and disruption of critical services. The number of potential victims depends on the scope of the initial access and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious MsiExec invocations with remote payloads.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the required data is available for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and network connections associated with the <code>msiexec.exe</code> process.</li>
<li>Monitor process execution events for child processes spawned by <code>msiexec.exe</code> for anomalous activity.</li>
<li>Implement application control policies to restrict the execution of <code>msiexec.exe</code> to authorized users and processes only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category><category>remote-install</category></item><item><title>Potential Exploitation of an Unquoted Service Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</guid><description>This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.</description><content:encoded><![CDATA[<p>Unquoted service paths in Windows can be exploited to escalate privileges. When a service path lacks quotes, Windows may execute a malicious executable placed in a higher-level directory. This detection rule identifies suspicious processes starting from common unquoted paths, like &ldquo;C:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;, signaling potential exploitation attempts. The rule aims to detect early stages of privilege escalation threats. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, Windows Security Event Logs, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a service running with an unquoted path, such as &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>The attacker places a malicious executable named &ldquo;Program.exe&rdquo; in &ldquo;C:&quot;</li>
<li>The operating system attempts to start the service &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>Due to the unquoted path, the OS incorrectly parses the path and first attempts to execute &ldquo;C:\Program.exe&rdquo;.</li>
<li>The malicious &ldquo;Program.exe&rdquo; executes with the privileges of the service account.</li>
<li>The malicious executable performs actions to escalate privileges, such as adding a user to the local administrators group.</li>
<li>The attacker gains elevated access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of an unquoted service path vulnerability can lead to complete system compromise, as the attacker gains the privileges of the service account. This can allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. The impact is high, potentially leading to a loss of confidentiality, integrity, and availability of the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review process executable paths to confirm if they match the patterns specified in the rule query, such as &ldquo;?:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Potential Exploitation of an Unquoted Service Path Vulnerability&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging with Event ID 1 to activate the Sigma rules above.</li>
<li>Conduct a thorough review of service configurations to identify and correct any unquoted service paths as part of remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>windows</category></item><item><title>Suspicious Alternate Data Stream (ADS) File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</link><pubDate>Fri, 26 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</guid><description>Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the creation of Alternate Data Streams (ADS) on Windows systems, a technique often employed by adversaries to conceal malicious code or data within seemingly benign files. Attackers leverage scripting engines and command interpreters to write ADS to various file types, including executables, documents, and media files. This activity is uncommon in legitimate workflows, making it a valuable indicator of potential compromise. The rule is designed to trigger on file creation events where the process creating the file is a known script or command interpreter (cmd.exe, powershell.exe, etc.) and the target file has a suspicious extension. The detection excludes common legitimate ADS usage patterns. This technique is used for defense evasion, allowing malware to persist without being easily detected by traditional security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses a command interpreter (cmd.exe, powershell.exe, etc.) or scripting engine (wscript.exe, cscript.exe) to execute malicious code.</li>
<li>The malicious code creates an Alternate Data Stream (ADS) on a targeted file (e.g., an executable, document, or image). The targeted file&rsquo;s extension could be pdf, dll, exe, dat, etc.</li>
<li>The attacker hides malicious code or data within the ADS, making it less visible to standard file system scans and security tools. The ADS is written to a file path using the <code>C:\\*:\*</code> syntax.</li>
<li>The attacker may rename or clean up any staging files to further conceal their activity.</li>
<li>The attacker can then execute the hidden code within the ADS, or use the ADS to store configuration data for later use.</li>
<li>The attacker maintains persistence by using the ADS to store and execute malicious code, bypassing typical file-based security measures.</li>
<li>The ultimate goal is to maintain unauthorized access to the system, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious code within legitimate files, evading detection by traditional security measures. This can lead to prolonged persistence on compromised systems, enabling data theft, ransomware deployment, or other malicious activities. While the specific number of victims is unknown, this technique is broadly applicable across Windows environments, potentially affecting a wide range of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via Cmd</code> to detect ADS creation events initiated by cmd.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via PowerShell</code> to detect ADS creation events initiated by powershell.exe.</li>
<li>Enable Sysmon Event ID 15 (FileCreateStreamHash) to provide detailed information about ADS creation events, as referenced in the rule&rsquo;s setup instructions.</li>
<li>Investigate any alerts generated by these rules, focusing on the file paths, creating processes, and command-line arguments involved, as detailed in the rule&rsquo;s triage and analysis notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ads</category><category>file-creation</category><category>windows</category></item><item><title>First Time Seen Remote Monitoring and Management Tool Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-seen-rmm/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-seen-rmm/</guid><description>Detects the execution of previously unseen remote monitoring and management (RMM) tools or remote access software on compromised Windows endpoints, often leveraged for command-and-control, persistence, and execution of malicious commands.</description><content:encoded><![CDATA[<p>Attackers commonly abuse legitimate remote monitoring and management (RMM) tools and remote access software for command and control (C2), persistence, and execution of native commands on compromised endpoints. These tools provide attackers with the ability to maintain access, execute commands, and move laterally within a network. This detection identifies when a process associated with commonly abused RMM/remote access tools is observed for the first time on a host. The rule is designed to trigger when a new process name or code signature associated with RMM software, or a child process of such software, is seen within a configured history window. This helps defenders quickly identify potentially malicious use of legitimate tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to a target system through various methods, such as exploiting vulnerabilities or using compromised credentials.</li>
<li>Tool Deployment: The attacker deploys a remote monitoring and management (RMM) tool or remote access software on the compromised endpoint. This may involve downloading and installing the tool, or exploiting existing installations.</li>
<li>Persistence: The RMM tool is configured to run persistently on the system, ensuring that the attacker maintains access even after a reboot or other disruption. This may involve creating a service or adding a registry key to ensure the tool starts automatically.</li>
<li>Command and Control: The attacker uses the RMM tool to establish a command and control (C2) channel with the compromised system. This allows them to remotely execute commands, transfer files, and monitor activity on the system.</li>
<li>Lateral Movement: Using the RMM tool, the attacker moves laterally within the network, compromising additional systems and escalating their access. This may involve using the tool to access shared resources or execute commands on other systems.</li>
<li>Data Exfiltration or Ransomware Deployment: The attacker uses their access to exfiltrate sensitive data from the compromised network or deploy ransomware to encrypt files and demand a ransom payment.</li>
<li>Cleanup: The attacker may attempt to remove traces of their activity, such as logs or files associated with the RMM tool, to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via RMM tools can lead to significant data breaches, financial losses, and reputational damage. The use of legitimate tools makes detection more difficult. Successful attacks can result in ransomware deployment, data theft, and prolonged unauthorized access to sensitive systems. Organizations in all sectors are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the process creation rule to detect the execution of RMM tools on endpoints based on <code>process.name</code> and <code>process.code_signature.subject_name</code> criteria in the query.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the collection of necessary event data for the detection rule.</li>
<li>Investigate any alerts generated by the detection rule to determine whether the execution of the RMM tool is authorized and legitimate. Refer to the references for a list of commonly abused RMM tools and associated indicators.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remote-access</category><category>rmm</category><category>command-and-control</category><category>persistence</category></item><item><title>Credential Acquisition via Registry Hive Dumping</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</guid><description>Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>This detection identifies attempts to export registry hives containing sensitive credential information using the Windows <code>reg.exe</code> utility. Attackers may target the <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code> hives to extract stored credentials, including password hashes and LSA secrets. The activity is often part of a broader credential access campaign. The rule focuses on detecting the execution of <code>reg.exe</code> with specific arguments indicating an attempt to save or export these critical registry hives. The use of <code>reg.exe</code> makes this technique accessible to various threat actors, including ransomware groups and nation-state actors. Defenders need to monitor for this activity to prevent unauthorized credential access and potential lateral movement within the network. This rule specifically looks for &ldquo;save&rdquo; and &ldquo;export&rdquo; arguments targeting SAM and SECURITY hives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>reg.exe</code> from the command line or through a script.</li>
<li>The <code>reg.exe</code> command includes arguments to save or export registry hives.</li>
<li>The target registry hives are <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code>, containing sensitive credential information.</li>
<li>The exported registry hive is saved to a file on disk or a network share.</li>
<li>The attacker may compress or encrypt the exported registry hive to evade detection.</li>
<li>The attacker retrieves the exported registry hive for offline analysis.</li>
<li>The attacker extracts credential information from the registry hive, such as password hashes and LSA secrets, to use in lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to acquire sensitive credentials stored within the registry. This can lead to lateral movement within the network, privilege escalation, and ultimately, data exfiltration or system compromise. Compromised credentials can be used to access critical systems and data, causing significant damage to the organization. The impact is considered high due to the potential for widespread access and control over the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation auditing with command line arguments to capture the execution of <code>reg.exe</code> with relevant arguments. (<a href="https://ela.st/audit-process-creation">Data Source: Windows Security Event Logs, Sysmon</a>)</li>
<li>Deploy the Sigma rule <code>Detect Registry Hive Export via Reg.exe</code> to your SIEM to detect the execution of <code>reg.exe</code> with arguments indicative of registry hive dumping.</li>
<li>Implement access controls and monitor file system activity to detect unauthorized access or modification of registry hive files.</li>
<li>Review and restrict the use of <code>reg.exe</code> to authorized personnel and processes.</li>
<li>Monitor for parent processes of <code>reg.exe</code> that are unusual or unexpected, which might indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the process command line, parent process, and destination of the exported registry hive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-dump</category><category>windows</category></item><item><title>Renamed Automation Script Interpreter</title><link>https://feed.craftedsignal.io/briefs/2024-01-renamed-autoit/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-renamed-autoit/</guid><description>Detects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.</description><content:encoded><![CDATA[<p>Malware operators often rename legitimate system and scripting tools to blend in with normal system processes and bypass security measures. This rule specifically detects instances where automation script interpreters like AutoIt, AutoHotkey, and KIX32 have been renamed. By comparing the process name against the original file name embedded in the executable, this detection identifies potential attempts to masquerade malicious scripts as legitimate software. This technique is employed to bypass application whitelisting and other security controls that rely on file names or process names for identification and authorization. This detection is relevant for any Windows environment where these scripting tools are used, as it can highlight potentially malicious activity masked by a common evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, often through phishing or exploiting a software vulnerability.</li>
<li>The attacker uploads or drops a malicious script (e.g., AutoIt, AutoHotkey, or KIX32 script) onto the target machine.</li>
<li>The attacker renames the legitimate AutoIt, AutoHotkey, or KIX32 interpreter executable to a non-standard name (e.g., &ldquo;svchost.exe&rdquo; or &ldquo;wininit.exe&rdquo;) to masquerade as a legitimate process.</li>
<li>The attacker executes the renamed interpreter, which in turn executes the malicious script.</li>
<li>The script performs malicious actions, such as downloading additional malware, modifying system settings, or establishing persistence.</li>
<li>The attacker uses the compromised system for lateral movement within the network or for data exfiltration.</li>
<li>The attacker attempts to maintain persistence on the system to ensure continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful renaming of script interpreters allows attackers to execute malicious scripts undetected, potentially leading to data theft, system compromise, or further propagation within the network. The impact can range from minor disruption to significant financial loss and reputational damage, depending on the attacker&rsquo;s objectives and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Renamed AutoIt Interpreter&rdquo; to your SIEM to detect when AutoIt executables are renamed, focusing on <code>process.pe.original_file_name</code> and <code>process.name</code>.</li>
<li>Deploy the Sigma rule &ldquo;Renamed AutoHotkey Interpreter&rdquo; to your SIEM to detect when AutoHotkey executables are renamed, focusing on <code>process.pe.original_file_name</code> and <code>process.name</code>.</li>
<li>Enable Sysmon process creation logging to capture the necessary process metadata, as referenced in the rule <code>logsource</code>.</li>
<li>Investigate any alerts generated by these rules to determine the legitimacy of the renamed executable and its associated activity as described in the <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>autoit</category><category>autohotkey</category><category>kix32</category><category>windows</category></item><item><title>Detection of Custom Shim Database Installation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</guid><description>Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.</description><content:encoded><![CDATA[<p>Attackers can exploit the Windows Application Compatibility Shim functionality to maintain persistence and execute arbitrary code within legitimate Windows processes. This is achieved by installing custom shim databases, which are designed to ensure older applications run smoothly on newer operating systems. By manipulating these databases, attackers can stealthily inject malicious code into trusted processes. The rule detects changes in specific registry paths associated with the installation of these databases, excluding known legitimate processes to minimize false positives. This technique allows for the execution of malicious code without directly modifying the target application&rsquo;s executable, making it difficult to detect with traditional methods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the registry to create a new entry for a custom shim database. The registry path targeted is typically under <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\</code>.</li>
<li>The attacker writes a malicious <code>.sdb</code> file containing the custom shim database to a location on disk.</li>
<li>The registry entry created points to the malicious <code>.sdb</code> file.</li>
<li>When a targeted application is launched, Windows checks the AppCompatFlags registry keys.</li>
<li>The system loads the malicious shim database specified in the registry.</li>
<li>The malicious code within the shim database is executed in the context of the targeted application.</li>
<li>The attacker achieves persistence, as the malicious shim database is loaded every time the targeted application is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the system, even after reboots or software updates. The injected code runs within the context of a legitimate process, which can evade detection by traditional security tools. This can lead to data theft, system compromise, or further malicious activities, such as lateral movement within the network. The use of application shimming for persistence affects systems running Windows and can impact organizations of any size or sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Custom Shim Database Installation</code> to your SIEM to identify suspicious registry modifications related to application shimming.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes that are not in the exclusion list.</li>
<li>Block or quarantine any identified malicious <code>.sdb</code> files to prevent further execution.</li>
<li>Review and update the exclusion list in the Sigma rule with any newly identified legitimate applications that use shim databases, reducing false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>app-compat</category><category>shim</category><category>windows</category></item><item><title>Suspicious Antimalware Scan Interface DLL Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</guid><description>An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.</description><content:encoded><![CDATA[<p>The Antimalware Scan Interface (AMSI) is a Windows interface that allows applications and services to integrate with antimalware products. Attackers may attempt to bypass AMSI to execute malicious code without detection. This detection identifies the creation of the AMSI DLL (<code>amsi.dll</code>) in unusual locations, which is a common technique used to load a rogue AMSI module instead of the legitimate one. This technique can be used to evade detection by security products that rely on AMSI for scanning potentially malicious scripts and code. The rule is designed to work with data from Winlogbeat, Elastic Endpoint, Sysmon, Endgame, SentinelOne Cloud Funnel, Microsoft Defender XDR, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploit).</li>
<li>The attacker determines the location of the legitimate <code>amsi.dll</code> file.</li>
<li>The attacker identifies a writable directory where a malicious <code>amsi.dll</code> can be placed. This location must be in the search order of applications that use AMSI, such as PowerShell or other scripting hosts.</li>
<li>The attacker copies or creates a malicious <code>amsi.dll</code> in the identified location. This rogue DLL is designed to bypass or disable AMSI functionality.</li>
<li>A process like PowerShell or another scripting host is launched. Because the malicious <code>amsi.dll</code> is in a higher-priority directory, it is loaded instead of the legitimate AMSI library.</li>
<li>The launched process executes malicious code (e.g., PowerShell script).</li>
<li>Because the rogue <code>amsi.dll</code> is loaded, AMSI scans are bypassed, allowing the malicious code to execute without detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful AMSI bypass can allow attackers to execute malicious code, such as malware, scripts, or exploits, without detection by antimalware products. This can lead to system compromise, data theft, or other malicious activities. The impact can range from a single compromised endpoint to a wider breach of an organization&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file creation monitoring with Sysmon or Elastic Defend to detect the creation of files, specifically DLLs, in unusual locations.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Antimalware Scan Interface DLL Creation&rdquo; to your SIEM to detect the creation of <code>amsi.dll</code> in non-standard paths. Tune the rule for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, file path, and user context to determine if the activity is malicious.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi-bypass</category><category>dll-hijacking</category><category>windows</category></item><item><title>Script Execution via Microsoft HTML Application</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</guid><description>Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies the execution of scripts via HTML applications, leveraging Windows utilities like <code>rundll32.exe</code> or <code>mshta.exe</code>. Attackers often use this method to bypass process and signature-based defenses by proxying the execution of malicious content through legitimate, signed binaries. The detection focuses on specific command-line arguments and patterns associated with this technique, while also excluding known legitimate uses by applications such as Citrix System32 (<code>wfshell.exe</code>), Microsoft Access (<code>MSACCESS.EXE</code>), and Quokka.Works (<code>GTInstaller.exe</code>). This technique is used by attackers to execute malicious scripts without directly running them, thus evading traditional security measures. The detection rule analyzes process names, command-line arguments, parent processes, and file paths to identify potentially malicious activity indicative of defense evasion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means (e.g., phishing, drive-by download).</li>
<li>The attacker leverages a malicious HTML application (HTA) file or a scriptlet (SCT) file.</li>
<li>The attacker uses <code>mshta.exe</code> or <code>rundll32.exe</code> to execute the malicious HTA or SCT file. The command line includes obfuscated or encoded script content.</li>
<li><code>mshta.exe</code> or <code>rundll32.exe</code> process spawns a child process, such as <code>cmd.exe</code> or <code>powershell.exe</code>, to execute further commands.</li>
<li>The spawned process executes malicious code, such as downloading and executing a payload.</li>
<li>The attacker achieves persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker performs lateral movement by exploiting vulnerabilities or using stolen credentials.</li>
<li>The final objective is achieved, such as data exfiltration, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise the system, steal sensitive data, deploy ransomware, or establish a persistent foothold. Due to the nature of the technique, it can bypass many traditional security measures. The wide adoption of Windows and the inherent trust placed in signed binaries makes this a potent evasion technique. Failure to detect and prevent this attack can lead to significant financial and reputational damage for the targeted organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Script Execution via Microsoft HTML Application&rdquo; to your SIEM to detect suspicious <code>mshta.exe</code> and <code>rundll32.exe</code> executions. Tune the rule by adding exceptions for known legitimate uses in your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the visibility required for the Sigma rules to function correctly.</li>
<li>Monitor process command lines for suspicious arguments like &ldquo;script:eval&rdquo;, &ldquo;WScript.Shell&rdquo;, and &ldquo;mshta http&rdquo; which are indicative of this technique.</li>
<li>Implement application control policies to restrict the execution of <code>mshta.exe</code> and <code>rundll32.exe</code> where they are not required for legitimate business purposes.</li>
<li>Investigate and block any identified malicious HTA files or scriptlet URLs found in the command lines of detected processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>script-execution</category><category>windows</category></item><item><title>Suspicious Script Object Execution via scrobj.dll</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-scrobj-load/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-scrobj-load/</guid><description>Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.</description><content:encoded><![CDATA[<p>This detection identifies suspicious usage of <code>scrobj.dll</code>, a legitimate Windows library, when loaded into unusual Microsoft processes. Attackers may exploit <code>scrobj.dll</code> to execute malicious scriptlets within trusted processes, thereby evading detection. This technique allows adversaries to proxy execution through trusted system binaries. The rule focuses on detecting anomalous activity by excluding common executables, and flagging only non-standard processes loading <code>scrobj.dll</code>. The detection logic is based on identifying image load events where <code>scrobj.dll</code> is loaded into unexpected processes, indicating a potential misuse of the library. The rule is designed for data generated by Elastic Defend, Elastic Endgame, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker crafts or deploys a malicious scriptlet designed to execute malicious commands or payloads.</li>
<li>The attacker leverages a non-standard or less common Microsoft process to load <code>scrobj.dll</code>.</li>
<li><code>scrobj.dll</code> is loaded into the target process, enabling the execution of scriptlets.</li>
<li>The malicious scriptlet executes within the context of the trusted Microsoft process, bypassing application whitelisting or other security controls.</li>
<li>The scriptlet performs malicious actions, such as downloading additional payloads, modifying system configurations, or establishing command and control communication.</li>
<li>The attacker achieves their objectives, such as data exfiltration, lateral movement, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of a trusted process, bypassing security controls and potentially leading to full system compromise. This could result in data theft, system corruption, or further propagation of the attack within the network. The impact is significant because it allows malware to operate under the guise of legitimate system processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Scrobj.dll Image Load</code> to your SIEM to detect this activity (see rule below).</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Suspicious Scrobj.dll Image Load</code> to determine the legitimacy of the <code>scrobj.dll</code> loading activity.</li>
<li>Implement application whitelisting to prevent unauthorized execution of scripts and binaries, focusing on processes identified in the detection rule.</li>
<li>Continuously audit scheduled tasks and exclude known safe processes from the detection rule to minimize false positives, as described in the rule&rsquo;s Triage and Analysis section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Mofcomp Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-mofcomp-activity/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mofcomp-activity/</guid><description>This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.</description><content:encoded><![CDATA[<p>The rule detects suspicious usage of <code>mofcomp.exe</code>, a command-line tool used to compile Managed Object Format (MOF) files. Attackers can abuse MOF files to manipulate the Windows Management Instrumentation (WMI) repository by building malicious WMI scripts for persistence or execution. This can be achieved by creating their own namespaces and classes within WMI or establishing persistence through WMI Event Subscriptions. The rule identifies unusual mofcomp.exe activity by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes like <code>ScenarioEngine.exe</code> and system accounts (<code>S-1-5-18</code>). This detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, Crowdstrike, and Windows Security Event Logs. The rule aims to detect potential misuse of WMI for malicious purposes, enhancing the visibility of attacker techniques for execution and persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker uploads a malicious MOF file to the compromised system.</li>
<li>The attacker executes <code>mofcomp.exe</code> to compile the malicious MOF file.</li>
<li><code>mofcomp.exe</code> processes the MOF file, creating new namespaces and classes or modifying existing ones in the WMI repository.</li>
<li>If the MOF file creates a WMI Event Subscription, it triggers the execution of a malicious script or binary when a specific event occurs.</li>
<li>The malicious script or binary executes, performing actions such as installing malware, creating backdoors, or exfiltrating data.</li>
<li>The attacker maintains persistence through the WMI Event Subscription, ensuring continued access even after system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via malicious MOF files can lead to persistent access, code execution, and system compromise. Attackers can use this technique to install malware, create backdoors, or steal sensitive data. The rule aims to detect early stages of such attacks, preventing significant damage. By establishing persistence, attackers can maintain long-term control over the compromised system, evading traditional detection methods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious <code>mofcomp.exe</code> activity and tune for your environment.</li>
<li>Enable process creation logging and command-line auditing on Windows systems to capture necessary events for the provided Sigma rules.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on unusual MOF file paths, parent processes, and user accounts.</li>
<li>Review and monitor WMI namespaces and classes for unauthorized modifications or additions following any detected suspicious <code>mofcomp.exe</code> activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>persistence</category><category>windows</category></item><item><title>Microsoft Defender Tampering via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-tampering/</guid><description>Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly disable or tamper with Microsoft Defender features to evade detection and conceal malicious behavior within compromised Windows environments. This is often achieved by modifying specific registry keys that control the behavior and functionality of Defender components, such as real-time monitoring, exploit protection, and tamper protection itself. Such actions can significantly reduce the effectiveness of endpoint security, allowing malicious activities to proceed undetected. The references point to techniques that disable PUA protection, tamper protection, memory integrity, and real-time protection. This behavior is observed across various attack scenarios, including ransomware deployment and cryptocurrency mining campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified vector (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker obtains elevated privileges on the system.</li>
<li>The attacker uses an administrative tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker disables real-time monitoring by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring</code> to 1.</li>
<li>The attacker disables tamper protection by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Features\TamperProtection</code> to 0.</li>
<li>The attacker disables PUA Protection by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\PUAProtection</code> to 0.</li>
<li>With Defender weakened, the attacker executes malicious payloads, such as ransomware or cryptocurrency miners.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with Microsoft Defender can lead to a significant degradation of endpoint security posture. This can result in undetected malware infections, data breaches, and system compromise. Disabling Defender features can allow attackers to establish persistence, escalate privileges, and deploy malicious payloads without triggering alerts. The impact can range from individual system compromise to widespread network infection, depending on the attacker&rsquo;s objectives and the extent of the tampering.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Windows Defender Tampering - Disable Realtime Monitoring&rdquo; to your SIEM to detect modifications to the <code>DisableRealtimeMonitoring</code> registry value.</li>
<li>Deploy the Sigma rule &ldquo;Microsoft Windows Defender Tampering - Disable Tamper Protection&rdquo; to detect modifications to the <code>TamperProtection</code> registry value.</li>
<li>Monitor registry modification events, specifically targeting keys associated with Microsoft Defender settings as described in the rule query.</li>
<li>Investigate any process modifying Windows Defender registry settings that are not explicitly authorized, referencing the process exclusions in the rule query.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Command Obfuscation via Unicode Modifier Letters</title><link>https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</guid><description>Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.</description><content:encoded><![CDATA[<p>Attackers are increasingly employing Unicode modifier letters to obfuscate command-line arguments, thereby bypassing traditional string-based detection mechanisms. This technique involves replacing standard ASCII characters with visually similar Unicode characters, making it difficult for simple pattern-matching rules to identify malicious commands. The obfuscation targets common Windows utilities such as <code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, <code>PowerShell.exe</code>, <code>cmd.exe</code>, and others frequently abused in post-exploitation scenarios. Defenders need to implement more sophisticated detection methods that account for Unicode normalization or character range analysis to identify and mitigate this threat. This technique has become more prevalent in the last year as attackers seek to evade common detection strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>Execution: The attacker executes a command-line utility like <code>cmd.exe</code> or <code>powershell.exe</code> to perform malicious actions.</li>
<li>Obfuscation: The command-line arguments are obfuscated by replacing ASCII characters with Unicode modifier letters.</li>
<li>Defense Evasion: The obfuscation allows the attacker to evade simple string-based detections that would normally flag the command as malicious.</li>
<li>Privilege Escalation: The attacker may use the obfuscated command to escalate privileges or gain access to sensitive resources.</li>
<li>Persistence: The attacker may establish persistence by creating a scheduled task or modifying the registry using obfuscated commands.</li>
<li>Lateral Movement: The attacker may use the obfuscated command to move laterally to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful command obfuscation can lead to a significant compromise of Windows systems. Attackers can bypass security controls and execute malicious code undetected, potentially leading to data theft, system disruption, or ransomware deployment. The obfuscation makes it harder for security teams to identify and respond to attacks, increasing the dwell time and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect the presence of Unicode modifier letters in command lines (references: Sigma rules).</li>
<li>Enable Sysmon process creation logging to capture command-line arguments for analysis (references: Sysmon setup instructions).</li>
<li>Investigate any alerts triggered by the Sigma rule and analyze the raw command lines to identify the true intent of the command (references: Triage and Analysis section of the source).</li>
<li>Consider implementing Unicode normalization techniques to remove the obfuscation before analyzing command lines.</li>
<li>Monitor the listed processes (<code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, etc.) more closely for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-line</category><category>unicode</category><category>obfuscation</category></item><item><title>Suspicious Unshare Usage for Namespace Manipulation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</guid><description>The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.</description><content:encoded><![CDATA[<p>The <code>unshare</code> command in Linux is a utility used to create new namespaces, providing isolation for processes. While crucial for containerization and security, attackers can misuse <code>unshare</code> to escape container boundaries or escalate privileges by manipulating system namespaces. This occurs by creating namespaces that bypass established security controls. This activity is often observed when threat actors attempt to gain unauthorized access to host resources or elevate their privileges within a compromised system. The focus of this detection is on identifying unusual <code>unshare</code> executions that deviate from legitimate system management activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through exploiting a vulnerability in a containerized application.</li>
<li>The attacker executes the <code>unshare</code> command.</li>
<li><code>unshare</code> creates new namespaces, isolating the attacker&rsquo;s process from the rest of the system.</li>
<li>The attacker attempts to mount sensitive directories from the host system into the new namespace.</li>
<li>Using the newly gained access, the attacker attempts to modify system files, such as <code>/etc/passwd</code> or <code>/etc/shadow</code>, to create new privileged accounts.</li>
<li>The attacker leverages the elevated privileges to install persistent backdoors or malware on the host system.</li>
<li>The attacker attempts to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via <code>unshare</code> can lead to privilege escalation, container escape, and unauthorized access to sensitive resources on the host system. The impact includes potential data breaches, system compromise, and lateral movement within the network. While the number of victims is unknown, the widespread use of containerization technologies makes this a significant threat, particularly for organizations relying on Linux-based container environments and cloud infrastructures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Namespace Manipulation Using Unshare</code> to your SIEM to detect suspicious <code>unshare</code> command executions and tune for your environment.</li>
<li>Enable Auditbeat or Elastic Defend to collect the necessary process execution data to trigger the provided Sigma rule, as outlined in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review and tune the provided Sigma rule&rsquo;s exclusion list based on your environment&rsquo;s legitimate use cases for <code>unshare</code>, as described in the &ldquo;False positive analysis&rdquo; section.</li>
<li>Implement additional monitoring and alerting for unusual <code>unshare</code> usage patterns to enhance detection capabilities and prevent future occurrences as recommended in the &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>container-escape</category><category>linux</category></item><item><title>Potential Protocol Tunneling via Yuze</title><link>https://feed.craftedsignal.io/briefs/2024-01-yuze-tunneling/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-yuze-tunneling/</guid><description>This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.</description><content:encoded><![CDATA[<p>This rule detects the execution of Yuze, an open-source tunneling tool written in C, which is commonly used for intranet penetration. Yuze supports both forward and reverse SOCKS5 proxy tunneling and is often executed using <code>rundll32</code> to load <code>yuze.dll</code> with the <code>RunYuze</code> export. Threat actors can leverage Yuze to proxy command and control (C2) communications or to pivot within a network. The detection focuses on identifying processes with command-line arguments indicative of Yuze execution, specifically those involving &ldquo;reverse,&rdquo; &ldquo;-c,&rdquo; &ldquo;proxy,&rdquo; &ldquo;fwd,&rdquo; and &ldquo;-l&rdquo; parameters. This activity has been observed in real-world campaigns, increasing the importance of timely detection and response.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a target system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker uploads or drops the <code>yuze.dll</code> file onto the compromised host.</li>
<li>The attacker uses <code>rundll32.exe</code> to execute <code>yuze.dll</code>, calling the <code>RunYuze</code> export.</li>
<li>The command line includes parameters to establish a reverse or forward SOCKS5 proxy tunnel (e.g., <code>rundll32 yuze.dll,RunYuze reverse -c &lt;ip&gt;:&lt;port&gt;</code>).</li>
<li>Yuze establishes a tunnel to a remote server, allowing the attacker to proxy network traffic.</li>
<li>The attacker uses the established tunnel to pivot within the network and access internal resources.</li>
<li>The attacker may proxy C2 traffic through the tunnel, masking the true origin of the commands.</li>
<li>The attacker performs actions on the internal network, such as data exfiltration or lateral movement, using the tunnel as a covert channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish covert communication channels, bypass network security controls, and proxy malicious traffic, potentially leading to unauthorized access to sensitive data, lateral movement within the network, and data exfiltration. The use of Yuze can obscure the origin of attacks, making attribution more difficult and hindering incident response efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Yuze Tunneling via Rundll32&rdquo; to your SIEM to detect the execution of <code>yuze.dll</code> via <code>rundll32.exe</code> with specific command-line arguments.</li>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Auditing) to capture the necessary command-line information for the Sigma rules.</li>
<li>Investigate any identified instances of <code>rundll32.exe</code> executing <code>yuze.dll</code>, focusing on the parent processes and network connections.</li>
<li>Block the C2/relay IP or domain found in the <code>-c</code> argument at DNS/firewall, as described in the Triage and Analysis section of the rule&rsquo;s note.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>tunneling</category><category>yuze</category><category>proxy</category></item></channel></rss>