<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Internet Explorer — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/internet-explorer/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:12:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/internet-explorer/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Command and Control via Internet Explorer COM Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-iexplore-com-c2/</link><pubDate>Wed, 03 Jan 2024 18:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-iexplore-com-c2/</guid><description>This rule detects potential command and control activity where Internet Explorer (iexplore.exe) is started via the Component Object Model (COM) and makes unusual network connections, indicating adversaries might exploit Internet Explorer via COM to evade detection and bypass host-based firewall restrictions.</description><content:encoded><![CDATA[<p>This detection rule identifies potential command and control (C2) activity abusing Internet Explorer (iexplore.exe) via the Component Object Model (COM) on Windows systems. The technique involves launching iexplore.exe through COM, often using system binaries like <code>rundll32.exe</code> or <code>regsvr32.exe</code> to proxy the execution and evade security controls. The rule focuses on identifying unusual DNS queries originating from iexplore.exe, excluding those directed towards common Microsoft and OCSP-related domains. This tactic allows adversaries to make network connections appearing benign while hosting malicious content or performing C2 functions. The rule is designed for environments using Elastic Defend. The rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to the targeted system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The adversary uses <code>rundll32.exe</code> or <code>regsvr32.exe</code> to load <code>IEProxy.dll</code>, which is used to instantiate Internet Explorer via COM.</li>
<li>Iexplore.exe is launched as a child process of <code>rundll32.exe</code> or <code>regsvr32.exe</code> with the <code>-Embedding</code> flag, indicating it was started via COM.</li>
<li>Iexplore.exe initiates DNS queries to resolve domains for command and control communication or to retrieve malicious payloads.</li>
<li>The DNS queries bypass typical whitelists by using uncommon or attacker-controlled domains.</li>
<li>Iexplore.exe establishes network connections to external IP addresses associated with the malicious domains.</li>
<li>Data is exfiltrated or further commands are received through the established connections.</li>
<li>The adversary maintains persistence and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to establish a covert command and control channel, potentially leading to data theft, system compromise, or further propagation within the network. The use of Internet Explorer, a trusted system binary, helps evade detection and bypass host-based firewalls. The impact can range from individual workstation compromise to broader network breaches, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Command and Control via Internet Explorer</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes (<code>rundll32.exe</code>, <code>regsvr32.exe</code>) and the destination domains of the DNS queries.</li>
<li>Monitor process execution events for instances of <code>iexplore.exe</code> being launched with the <code>-Embedding</code> flag, especially when the parent process is <code>rundll32.exe</code> or <code>regsvr32.exe</code>.</li>
<li>Review network connection logs for <code>iexplore.exe</code> to identify any unusual or suspicious outbound connections to domains not associated with standard Microsoft services or internal resources.</li>
<li>Implement network-level controls to block communication with any identified malicious domains.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>command-and-control</category><category>com</category><category>iexplore</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item></channel></rss>