<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>M365 Defender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/m365-defender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/m365-defender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Command Shell Activity Started via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</guid><description>This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers commonly abuse RunDLL32, a legitimate Windows utility, to execute malicious code by hosting it within DLLs. This technique allows adversaries to launch command shells like cmd.exe or PowerShell, effectively bypassing traditional security controls. Defenders should be aware of this technique because it provides a stealthy way for attackers to execute arbitrary commands, potentially leading to further compromise of the system. This activity is detected by monitoring for command shells initiated by RunDLL32, while excluding known benign patterns to reduce false positives. The detection rule was last updated on 2026/05/04 and supports multiple data sources, including Elastic Defend, Microsoft Defender XDR, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker uses RunDLL32.exe to execute a malicious DLL.</li>
<li>RunDLL32.exe loads the specified DLL into memory.</li>
<li>The malicious DLL contains code to execute a command shell (cmd.exe or powershell.exe).</li>
<li>RunDLL32.exe spawns a command shell process.</li>
<li>The attacker uses the command shell to execute commands for reconnaissance.</li>
<li>The attacker may use the command shell to download additional payloads.</li>
<li>The attacker leverages the command shell to perform lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the compromised system. While the rule is rated &ldquo;low&rdquo; severity, this initial access can lead to credential access (T1552) and further lateral movement within the network. Attackers can potentially gain full control of the system, leading to data theft, system disruption, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Command Shell Activity Started via RunDLL32&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for this detection.</li>
<li>Review the process details of RunDLL32.exe to confirm the parent-child relationship with the command shell, helping to reduce false positives.</li>
<li>Implement enhanced monitoring for rundll32.exe and related processes to detect similar activities in the future and improve response times.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>command-shell</category><category>rundll32</category></item><item><title>Code Signing Policy Modification Through Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</guid><description>Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.</description><content:encoded><![CDATA[<p>Attackers may attempt to subvert trust controls by disabling or modifying the code signing policy. This allows them to execute unsigned or self-signed malicious code. This can be achieved by modifying boot configuration data (BCD) settings using the built-in bcdedit.exe utility on Windows. Disabling Driver Signature Enforcement (DSE) allows the loading of untrusted drivers, which can compromise system integrity. The rule identifies commands that can disable the Driver Signature Enforcement feature. The scope of the targeting is broad, as it can affect any Windows system where an attacker gains sufficient privileges to modify the BCD settings. This activity is detected by analyzing process execution events for specific command-line arguments used with bcdedit.exe. The detection rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative privileges on a Windows system.</li>
<li>The attacker executes <code>bcdedit.exe</code> with arguments to disable driver signature enforcement. Example: <code>bcdedit.exe /set testsigning on</code> or <code>bcdedit.exe /set nointegritychecks on</code>.</li>
<li>The <code>bcdedit.exe</code> modifies the Boot Configuration Data (BCD) store.</li>
<li>The system is restarted to apply the changes made to the BCD.</li>
<li>The attacker loads an unsigned or self-signed malicious driver.</li>
<li>The malicious driver executes with kernel-level privileges.</li>
<li>The attacker performs malicious activities such as installing rootkits, bypassing security controls, or stealing sensitive data.</li>
<li>The attacker maintains persistence by ensuring the malicious driver is loaded on subsequent system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of unsigned or self-signed malicious code, which can compromise the integrity and security of the system. Attackers can install rootkits, bypass security controls, or steal sensitive data. The impact can range from individual system compromise to broader network-wide attacks, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Code Signing Policy Modification Through Built-in Tools&rdquo; to your SIEM to detect the execution of <code>bcdedit.exe</code> with arguments used to disable code signing (process.args).</li>
<li>Enable process creation logging with command line arguments on Windows systems to ensure the Sigma rule can capture the relevant events (logsource).</li>
<li>Investigate any detected instances of code signing policy modification, as this activity is typically not legitimate and can indicate malicious activity. The rule <code>First Time Seen Driver Loaded - df0fd41e-5590-4965-ad5e-cd079ec22fa9</code> can be used to detect suspicious drivers loaded into the system after the command was executed.</li>
<li>Ensure that Driver Signature Enforcement is enabled on all systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>code-signing</category><category>windows</category></item><item><title>Windows Console History Clearing</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</guid><description>Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.</description><content:encoded><![CDATA[<p>Attackers can try to cover their tracks by clearing the PowerShell console history on Windows systems. PowerShell offers multiple ways to log commands, including the built-in history and the command history managed by the PSReadLine module. This activity is often part of post-compromise behavior aimed at evading detection and forensic analysis. This rule detects the execution of specific commands that clear the built-in PowerShell logs or delete the <code>ConsoleHost_history.txt</code> file. The rule focuses on PowerShell activity and covers scenarios where commands like Clear-History, Remove-Item, rm, and Set-PSReadlineOption are used to manipulate command history.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified method, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker executes PowerShell (powershell.exe, pwsh.exe, or powershell_ise.exe) to perform reconnaissance and other malicious activities.</li>
<li>The attacker attempts to clear the PowerShell command history using the <code>Clear-History</code> cmdlet.</li>
<li>Alternatively, the attacker attempts to remove the <code>ConsoleHost_history.txt</code> file using <code>Remove-Item</code> or <code>rm</code>, which stores the PSReadLine command history.</li>
<li>Another method involves using the <code>Set-PSReadlineOption</code> cmdlet with the <code>SaveNothing</code> parameter to prevent the saving of future command history.</li>
<li>The attacker may leverage other tools and techniques to further obscure their activities and maintain persistence on the compromised system.</li>
<li>The attacker attempts to move laterally to other systems within the network to increase their impact.</li>
<li>The final objective is data exfiltration, deployment of ransomware, or other malicious activities, all while attempting to evade detection by clearing logs and command history.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful clearing of console history hinders forensic investigations and incident response efforts. If command history is cleared, administrators will have difficulty reconstructing the attacker&rsquo;s actions and identifying the extent of the compromise. This can lead to prolonged incident response times, increased damage, and potential for further exploitation of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Clearing PowerShell History</code> to your SIEM to detect the use of <code>Clear-History</code> cmdlet, potentially indicating an attempt to remove command history.</li>
<li>Deploy the Sigma rule <code>Detect Removal of PowerShell History File</code> to detect the use of <code>Remove-Item</code> or <code>rm</code> command against the PowerShell history file.</li>
<li>Enable PowerShell logging and auditing policies to ensure adequate visibility into PowerShell activity as described in the <a href="https://ela.st/audit-process-creation">setup instructions</a> to improve detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>Suspicious Managed Code Hosting Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</guid><description>This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious managed code hosting processes on Windows systems. Attackers may leverage processes like <code>wscript.exe</code>, <code>cscript.exe</code>, <code>mshta.exe</code>, <code>wmic.exe</code>, <code>svchost.exe</code>, <code>dllhost.exe</code>, <code>cmstp.exe</code>, and <code>regsvr32.exe</code> to execute malicious code, often bypassing traditional security controls. These processes can be abused to load and execute .NET assemblies or other managed code components. The detection focuses on identifying unusual file creation events associated with these processes which could indicate an attacker is attempting to leverage these processes for malicious purposes. This activity might be indicative of code injection, defense evasion, or other suspicious code execution techniques. The rule uses EQL to search for file events associated with specific processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a phishing email or compromised software.</li>
<li>The attacker uses a LOLBin such as <code>mshta.exe</code> or <code>regsvr32.exe</code> to bypass application control.</li>
<li>The LOLBin executes a malicious script or loads a malicious DLL from a user-writable location.</li>
<li>The malicious script or DLL performs reconnaissance activities, such as gathering system information or enumerating network resources.</li>
<li>The attacker then attempts to escalate privileges by exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses the compromised process to download and execute additional malware.</li>
<li>The malware establishes persistence on the system through scheduled tasks or registry modifications.</li>
<li>The attacker performs lateral movement within the network, compromising additional systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal sensitive data, and establish persistence. The use of LOLBins can bypass application control, making detection more challenging. Depending on the scope of the attack, this could result in significant financial losses, reputational damage, and disruption of business operations. This is a high-severity finding due to the potential for attackers to gain full control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging (Event ID 11) to collect the necessary data for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Managed Code Hosting Process&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the file paths, process command lines, and parent processes involved.</li>
<li>Monitor for unexpected file creation events associated with processes like <code>wscript.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code> in user-writable directories.</li>
<li>Implement application control policies to restrict the execution of LOLBins and other potentially malicious processes.</li>
<li>Correlate the detection with other security events to identify related malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>managed code</category><category>lolbin</category></item><item><title>Suspicious Alternate Data Stream (ADS) File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</link><pubDate>Fri, 26 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</guid><description>Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the creation of Alternate Data Streams (ADS) on Windows systems, a technique often employed by adversaries to conceal malicious code or data within seemingly benign files. Attackers leverage scripting engines and command interpreters to write ADS to various file types, including executables, documents, and media files. This activity is uncommon in legitimate workflows, making it a valuable indicator of potential compromise. The rule is designed to trigger on file creation events where the process creating the file is a known script or command interpreter (cmd.exe, powershell.exe, etc.) and the target file has a suspicious extension. The detection excludes common legitimate ADS usage patterns. This technique is used for defense evasion, allowing malware to persist without being easily detected by traditional security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses a command interpreter (cmd.exe, powershell.exe, etc.) or scripting engine (wscript.exe, cscript.exe) to execute malicious code.</li>
<li>The malicious code creates an Alternate Data Stream (ADS) on a targeted file (e.g., an executable, document, or image). The targeted file&rsquo;s extension could be pdf, dll, exe, dat, etc.</li>
<li>The attacker hides malicious code or data within the ADS, making it less visible to standard file system scans and security tools. The ADS is written to a file path using the <code>C:\\*:\*</code> syntax.</li>
<li>The attacker may rename or clean up any staging files to further conceal their activity.</li>
<li>The attacker can then execute the hidden code within the ADS, or use the ADS to store configuration data for later use.</li>
<li>The attacker maintains persistence by using the ADS to store and execute malicious code, bypassing typical file-based security measures.</li>
<li>The ultimate goal is to maintain unauthorized access to the system, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious code within legitimate files, evading detection by traditional security measures. This can lead to prolonged persistence on compromised systems, enabling data theft, ransomware deployment, or other malicious activities. While the specific number of victims is unknown, this technique is broadly applicable across Windows environments, potentially affecting a wide range of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via Cmd</code> to detect ADS creation events initiated by cmd.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via PowerShell</code> to detect ADS creation events initiated by powershell.exe.</li>
<li>Enable Sysmon Event ID 15 (FileCreateStreamHash) to provide detailed information about ADS creation events, as referenced in the rule&rsquo;s setup instructions.</li>
<li>Investigate any alerts generated by these rules, focusing on the file paths, creating processes, and command-line arguments involved, as detailed in the rule&rsquo;s triage and analysis notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ads</category><category>file-creation</category><category>windows</category></item><item><title>Group Policy Discovery via Microsoft GPResult Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</guid><description>Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.</description><content:encoded><![CDATA[<p>Attackers may leverage the <code>gpresult.exe</code> utility, a built-in Windows tool, to gather information about Group Policy Objects (GPOs) within an Active Directory environment. This reconnaissance activity allows adversaries to understand the existing security policies, identify potential misconfigurations, and discover pathways for privilege escalation or lateral movement. The rule focuses on detecting the execution of <code>gpresult.exe</code> with specific command-line arguments (<code>/z</code>, <code>/v</code>, <code>/r</code>, <code>/x</code>) commonly associated with malicious reconnaissance. This behavior is typically observed after an initial compromise, where the attacker is attempting to map out the network and identify valuable targets. This activity matters for defenders as it provides an early indicator of post-compromise activity and can help prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li>The attacker executes <code>gpresult.exe</code> from the command line or through a script.</li>
<li>The attacker uses command-line arguments such as <code>/z</code>, <code>/v</code>, <code>/r</code>, or <code>/x</code> to request detailed information about Group Policy settings.</li>
<li><code>gpresult.exe</code> queries the Active Directory domain to retrieve GPO information applicable to the user or computer.</li>
<li>The attacker parses the output of <code>gpresult.exe</code> to identify security policies, user rights assignments, and other relevant configurations.</li>
<li>The attacker identifies potential weaknesses in the GPO configuration, such as overly permissive user rights or insecure password policies.</li>
<li>The attacker uses the gathered information to exploit identified weaknesses and escalate privileges or move laterally to other systems within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a comprehensive understanding of the target environment&rsquo;s security posture, enabling attackers to identify and exploit weaknesses for privilege escalation and lateral movement. While the source does not specify a number of victims or sectors targeted, the impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of operations. The discovery of misconfigured group policies can open doors for attackers to compromise critical systems and data within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to your SIEM to detect the execution of <code>gpresult.exe</code> with suspicious parameters.</li>
<li>Enable Windows process creation logging to capture command-line arguments used with <code>gpresult.exe</code> and other executables.</li>
<li>Review and harden Group Policy configurations to minimize the risk of exploitation by attackers.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to determine the context and intent of the activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>group_policy</category></item><item><title>Windows Script Execution from Archive File</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</guid><description>This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly use archive files (ZIP, RAR, 7z) to deliver malicious scripts, such as JScript and VBScript, to Windows systems. This technique allows them to bypass some initial security checks and deliver payloads that can execute arbitrary code. The &ldquo;Windows Script Execution from Archive&rdquo; detection identifies instances where Windows Script Host (wscript.exe) is launched from temporary directories containing extracted archive contents. This activity can indicate a user has opened a malicious archive, leading to potential malware execution. This detection focuses on the parent-child process relationship, where explorer.exe, winrar.exe, or 7zFM.exe spawns wscript.exe to execute scripts from the temp directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious archive file (e.g., ZIP, RAR, 7z) via email or downloads it from a website.</li>
<li>The user opens the archive file using a file archiver tool like Explorer, WinRAR, or 7-Zip.</li>
<li>The archiver extracts the contents, including a malicious JScript (.js) or VBScript (.vbs) file, to a temporary directory, such as <code>\Users\*\AppData\Local\Temp\7z*\</code>.</li>
<li>The user (or the archiver tool) inadvertently executes the extracted script using Windows Script Host (wscript.exe).</li>
<li>Wscript.exe executes the malicious script, which may perform a variety of actions, such as downloading and executing additional payloads.</li>
<li>The script establishes persistence via registry modification, adding a run key to execute upon system startup.</li>
<li>The script connects to a command-and-control server to receive further instructions.</li>
<li>The attacker gains control of the compromised system and begins lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to arbitrary code execution on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. While the number of affected organizations is not specified, the technique is broadly applicable to any Windows environment where users handle archive files, potentially affecting numerous individuals and organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of wscript.exe and its arguments.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution from Archive&rdquo; to your SIEM to identify suspicious script execution patterns.</li>
<li>Monitor process activity for wscript.exe and other scripting engines executing from temporary directories.</li>
<li>Configure endpoint security solutions to block execution of scripts from common temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>scripting</category><category>archive</category></item><item><title>Windows Account Discovery of Administrator Accounts</title><link>https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</link><pubDate>Wed, 03 Jan 2024 17:14:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</guid><description>Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance activities within a compromised environment to understand the available resources and potential targets. This reconnaissance helps them plan subsequent actions, such as privilege escalation and lateral movement. This activity involves using built-in Windows utilities like <code>net.exe</code> and <code>wmic.exe</code> to enumerate administrator-related user accounts and groups. This information can reveal potential targets for credential compromise or other post-exploitation activities. Lower privileged accounts commonly perform this enumeration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>net.exe</code> with arguments to list users and groups.</li>
<li>The attacker filters the output for administrator-related keywords like &ldquo;admin&rdquo;, &ldquo;Domain Admins&rdquo;, &ldquo;Enterprise Admins&rdquo;, &ldquo;Remote Desktop Users&rdquo;, or &ldquo;Organization Management&rdquo;.</li>
<li>Alternatively, the attacker executes <code>wmic.exe</code> to query user accounts.</li>
<li>The attacker parses the output from <code>wmic.exe</code> to identify administrator accounts.</li>
<li>The attacker identifies privileged accounts to target for credential theft or privilege escalation.</li>
<li>The attacker uses the identified accounts to perform lateral movement or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of administrator accounts allows an attacker to identify high-value targets within the environment. This can lead to credential theft, privilege escalation, lateral movement, and ultimately, unauthorized access to sensitive data or systems. While the risk score is low, this activity serves as a precursor to more serious compromises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>net.exe</code> and <code>wmic.exe</code> commands with arguments related to user and group enumeration using the Sigma rules provided.</li>
<li>Investigate any instances of lower-privileged accounts executing these commands and filter out authorized administrative accounts performing the same actions.</li>
<li>Enable Windows process creation logging to capture the necessary events.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>account-discovery</category><category>windows</category></item><item><title>Proxy Execution via Windows OpenSSH Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</guid><description>Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.</description><content:encoded><![CDATA[<p>This detection identifies attempts to execute commands through a proxy using the Windows OpenSSH client (ssh.exe or sftp.exe). Attackers may abuse this behavior to evade application control policies by leveraging the trusted Windows OpenSSH binaries. The technique involves using the <code>ProxyCommand</code> or <code>LocalCommand</code> options with the OpenSSH client to execute arbitrary commands on the target system. The rule focuses on detecting command lines containing potentially malicious commands such as PowerShell, schtasks, mshta, msiexec, cmd, or script execution, indicating a possible attempt to bypass security measures. The detection logic is applicable to Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes the Windows OpenSSH client (ssh.exe or sftp.exe) with either the <code>ProxyCommand</code> or <code>LocalCommand</code> option.</li>
<li>The <code>ProxyCommand</code> or <code>LocalCommand</code> parameter specifies a command to be executed locally on the system.</li>
<li>The command includes potentially malicious payloads such as PowerShell commands, scheduled tasks manipulation (schtasks), or execution of other LOLBINs (Living Off the Land Binaries) like mshta or msiexec.</li>
<li>The OpenSSH client executes the specified command.</li>
<li>The malicious command performs actions such as downloading and executing additional payloads, creating scheduled tasks for persistence, or executing arbitrary code.</li>
<li>The attacker achieves their objectives, such as gaining further access to the system, escalating privileges, or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the affected system. Attackers can bypass application control mechanisms, execute arbitrary code, and establish persistence. This can result in data theft, system disruption, or further propagation of the attack within the network. The severity of the impact depends on the privileges of the account running the OpenSSH client and the specific actions performed by the malicious commands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to capture the execution of ssh.exe and sftp.exe with malicious parameters.</li>
<li>Deploy the Sigma rule <code>Proxy Execution via Windows OpenSSH</code> to your SIEM to detect suspicious OpenSSH client executions with malicious commands in the command line.</li>
<li>Monitor for the creation of child processes from ssh.exe or sftp.exe, as this can indicate the execution of malicious commands specified in the <code>ProxyCommand</code> or <code>LocalCommand</code> options.</li>
<li>Review and restrict the usage of <code>PermitLocalCommand</code> in OpenSSH server configurations to prevent attackers from executing commands locally on the system after a connection is established.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>openssh</category><category>application-control-bypass</category></item><item><title>Potential DNS Tunneling via NsLookup</title><link>https://feed.craftedsignal.io/briefs/2024-01-dns-tunneling-nslookup/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dns-tunneling-nslookup/</guid><description>Detection of multiple nslookup.exe executions with explicit query types from a single host, potentially indicating command and control activity via DNS tunneling, where attackers abuse DNS for data infiltration or exfiltration.</description><content:encoded><![CDATA[<p>Attackers can abuse DNS protocol for command and control and/or data exfiltration by exploiting network rules that allow DNS communication with external resources. This technique, known as DNS tunneling, involves encoding data within DNS queries to transmit commands, malicious files, or exfiltrate sensitive information to attacker-controlled DNS servers. Detection focuses on identifying anomalous patterns of nslookup.exe usage, specifically a high volume of executions with explicit query types originating from a single host within a short timeframe. This activity may bypass traditional security controls that monitor standard network traffic, enabling covert communication channels.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the network.</li>
<li>The attacker executes <code>nslookup.exe</code> to perform DNS queries with specific query types (e.g., <code>-querytype=TXT</code>, <code>-qt=A</code>).</li>
<li>The attacker encodes data (commands, files, or exfiltrated data) into the DNS query.</li>
<li>The compromised host sends multiple DNS requests to a rogue DNS server controlled by the attacker.</li>
<li>The attacker receives the DNS queries and decodes the data.</li>
<li>The attacker uses the tunneled command to further compromise the internal network.</li>
<li>The attacker exfiltrates data to the attacker-controlled server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful DNS tunneling allows attackers to establish covert communication channels, bypassing traditional security measures. This can lead to command and control of compromised systems, exfiltration of sensitive data, and further propagation within the network. The impact includes potential data breaches, system compromise, and prolonged attacker presence due to the difficulty in detecting covert DNS traffic.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Nslookup DNS Tunneling Activity&rdquo; to your SIEM to detect potential DNS tunneling attempts.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture <code>nslookup.exe</code> executions and their command-line arguments.</li>
<li>Inspect network traffic logs for unusually high volumes of DNS queries originating from individual hosts.</li>
<li>Monitor DNS query logs for encoded or unusual data patterns within DNS query names.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dns-tunneling</category><category>command-and-control</category><category>windows</category></item><item><title>NullSessionPipe Registry Modification for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</guid><description>Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>NullSessionPipe</code> registry setting in Windows. This setting defines named pipes that can be accessed without authentication, facilitating anonymous connections. Adversaries may exploit this by modifying the registry to enable lateral movement, allowing unauthorized access to network resources. By adding specific pipes to the <code>NullSessionPipes</code> registry key, an attacker can make services accessible without requiring authentication. This rule focuses on flagging modifications that introduce new accessible pipes, which could indicate malicious intent. The targeted configuration is located under <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters</code>. The registry key <code>NullSessionPipes</code> is of particular interest when its values change.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system within the network.</li>
<li>The attacker gains elevated privileges on the compromised system.</li>
<li>The attacker modifies the Windows Registry, specifically the <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionPipes</code> key. They add a new pipe name to this key, which will allow unauthenticated access to that named pipe.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify the registry, potentially using commands like <code>reg add</code> or <code>Set-ItemProperty</code>.</li>
<li>A remote system attempts to connect to the newly accessible named pipe on the compromised system without authenticating.</li>
<li>The attacker exploits the now-accessible service or application associated with the named pipe to execute commands or transfer data.</li>
<li>The attacker leverages this access to move laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>NullSessionPipes</code> registry setting can lead to unauthorized access to sensitive resources and lateral movement within the network. By enabling anonymous access to named pipes, attackers can potentially bypass authentication mechanisms and gain control over critical systems. While the direct number of victims is not specified, the impact can be significant, particularly in organizations where shared resources and services rely on secure authentication protocols.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to capture changes to the <code>NullSessionPipes</code> registry key. This will allow you to detect unauthorized modifications as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;NullSessionPipe Registry Modification&rdquo; to your SIEM and tune for your environment to identify malicious activity related to named pipe modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific named pipes being added or modified in the registry event details, as detailed in the rule&rsquo;s description.</li>
<li>Regularly review and validate the legitimacy of existing entries in the <code>NullSessionPipes</code> registry key to identify and remove any unauthorized pipes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>registry-modification</category></item><item><title>Execution via Local SxS Shared Module</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</guid><description>This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of the Windows Side-by-Side (SxS) feature to execute malicious code. Attackers can place a malicious DLL file within an application&rsquo;s local SxS folder (application.exe.local) and trick the Windows module loader into prioritizing it over legitimate system DLLs. This technique, known as DLL hijacking or DLL redirection, allows adversaries to gain arbitrary code execution within the context of the targeted application. This technique may be used to bypass security controls, escalate privileges, or establish persistence. The detection focuses on file events related to DLLs within these specific SxS folders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker identifies a legitimate application with an associated SxS folder (application.exe.local).</li>
<li>The attacker creates or modifies a malicious DLL file.</li>
<li>The attacker places the malicious DLL file in the application&rsquo;s SxS folder (application.exe.local).</li>
<li>A legitimate application attempts to load a DLL.</li>
<li>Due to the presence of the malicious DLL in the SxS folder, the Windows module loader prioritizes the attacker&rsquo;s DLL.</li>
<li>The malicious DLL is loaded and executed by the application.</li>
<li>The attacker achieves code execution within the context of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the targeted application&rsquo;s context. This can result in privilege escalation, data theft, system compromise, or the establishment of persistence mechanisms. While the number of directly affected organizations is unknown, this technique can be used against a wide range of applications on Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events for DLL files in <code>C:\*\*.exe.local\*.dll</code> and <code>\\Device\\HarddiskVolume*\\*\\*.exe.local\\*.dll</code> using the provided Sigma rule to detect potential malicious DLL planting.</li>
<li>Enable Sysmon Event ID 11 (File Create) to improve visibility into file creation events, as noted in the <a href="https://ela.st/sysmon-event-11-setup">setup instructions</a>.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the DLL creation event and the involved application.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>dll-hijacking</category></item><item><title>Adding Hidden File Attribute via Attrib.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</guid><description>Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.</description><content:encoded><![CDATA[<p>Attackers can add the &lsquo;hidden&rsquo; attribute to files to hide them from the user in an attempt to evade detection. This technique involves using the <code>attrib.exe</code> utility to modify file attributes. By setting the hidden attribute, adversaries can conceal tooling and malware to prevent administrators and users from finding it, even if they are looking specifically for it. This tactic is often employed post-compromise to maintain a stealthy presence within the target environment. Detection focuses on monitoring process executions that involve <code>attrib.exe</code> with command-line arguments indicating the modification of the hidden attribute. The rule is designed for data generated by Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as exploiting a vulnerability or using stolen credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain the necessary permissions to execute system utilities.</li>
<li>Defense Evasion: The attacker uses <code>attrib.exe</code> to modify the hidden attribute of a malicious file or directory. For example, <code>attrib.exe +h C:\path\to\malicious\file.exe</code>.</li>
<li>Concealment: The malicious file or directory is now hidden from normal directory listings, making it harder for users and administrators to detect.</li>
<li>Persistence: The attacker establishes persistence by hiding malicious scripts or executables in startup directories or scheduled tasks.</li>
<li>Lateral Movement: The attacker uses the hidden files to move laterally within the network, potentially using them as part of a larger attack campaign.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this attack includes prolonged attacker presence, increased difficulty in detecting malicious activity, and potential data exfiltration or system compromise. While the risk score is relatively low, the technique contributes to a broader attack chain and can significantly hinder incident response efforts. A successful hiding of artifacts might lead to further compromise, data breaches, or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Adding Hidden File Attribute via Attrib&rdquo; to your SIEM to detect suspicious usage of <code>attrib.exe</code>.</li>
<li>Enable process creation logging with command line monitoring in Windows environments to ensure the Sigma rule can capture relevant events.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and target files to determine if the activity is legitimate.</li>
<li>Correlate detections of <code>attrib.exe</code> with other suspicious activities or alerts on the same host.</li>
<li>Implement file integrity monitoring to detect unauthorized changes to file attributes, including the hidden attribute.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>attrib.exe</category></item><item><title>Detecting Execution from Alternate Data Streams</title><link>https://feed.craftedsignal.io/briefs/2024-01-ads-execution/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ads-execution/</guid><description>Adversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.</description><content:encoded><![CDATA[<p>Alternate Data Streams (ADS) are a feature of the NTFS file system that allows files to contain multiple data streams. Adversaries can exploit this feature to hide malicious code within legitimate files, making detection more difficult. This technique is often used for defense evasion, as security tools may not inspect ADS when scanning for malware. This detection focuses on identifying processes initiated from ADS by monitoring process execution paths and arguments, specifically looking for the pattern &ldquo;?:\<em>:</em>&rdquo;. This activity is uncommon for legitimate processes, making it a valuable indicator of potential malicious activity. The rule is designed for data generated by Elastic Defend, but also supports CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker creates an Alternate Data Stream (ADS) within a seemingly benign file (e.g., <code> harmless.txt:malicious.exe</code>).</li>
<li>The attacker copies or moves malicious executable code into the newly created ADS.</li>
<li>The attacker uses a method to execute the code within the ADS, often involving command-line arguments that specify the ADS path (e.g., <code> harmless.txt:malicious.exe</code>).</li>
<li>The operating system executes the code contained within the ADS as if it were a standard executable.</li>
<li>The malicious code performs its intended actions, such as installing malware, establishing persistence, or escalating privileges.</li>
<li>The attacker may attempt to further conceal their activity by deleting the original executable or modifying timestamps.</li>
<li>The final objective is to achieve persistence, exfiltrate data, or perform other malicious activities while evading traditional detection methods.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide and execute malicious code, bypassing standard security measures. This can lead to malware infections, data breaches, and system compromise. The number of victims and specific sectors targeted can vary, but the potential impact includes data loss, financial damage, and reputational harm.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Unusual Process Execution from Alternate Data Stream&rdquo; to your SIEM and tune for your environment to detect processes executing from ADS.</li>
<li>Enable Sysmon process creation logging to capture process execution events necessary for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes with command-line arguments matching the <code>?:\\*:\*</code> pattern.</li>
<li>Review process details, including the process name and path, to determine if it is a known legitimate application or potentially malicious, as described in the rule&rsquo;s investigation guide.</li>
<li>Correlate events with other security logs or alerts from data sources like Sysmon, Microsoft Defender XDR, or Crowdstrike to gather additional context.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>alternate data stream</category></item></channel></rss>