<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>M365_defender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/m365_defender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 04 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/m365_defender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual Service Host Child Process - Childless Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-svchost-child-process/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-svchost-child-process/</guid><description>This detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.</description><content:encoded><![CDATA[<p>The Windows Service Host process (svchost.exe) is a critical system component that hosts multiple Windows services to optimize resource utilization. Certain services running under svchost.exe are not expected to spawn child processes. Attackers may inject malicious code into these &ldquo;childless&rdquo; svchost processes to execute unauthorized commands and evade traditional detection methods. This detection rule identifies anomalies by monitoring child processes of svchost.exe instances associated with services known to be childless, such as <code>WdiSystemHost</code>, <code>LicenseManager</code>, and <code>StorSvc</code>, flagging potential process injection or exploitation attempts. The rule aims to identify deviations from the expected behavior of these services, providing an early warning of potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or by leveraging existing credentials.</li>
<li>The attacker injects malicious code into a running svchost.exe process associated with a childless service like <code>WdiSystemHost</code> or <code>StorSvc</code>.</li>
<li>The injected code spawns a child process from the targeted svchost.exe instance. This could involve executing a system utility or a custom payload.</li>
<li>The child process executes commands or performs actions dictated by the injected code, such as establishing a reverse shell or downloading additional payloads.</li>
<li>The attacker uses the spawned process to perform reconnaissance activities, gathering information about the system and network.</li>
<li>The attacker escalates privileges, potentially leveraging vulnerabilities or misconfigurations accessible from the compromised svchost process.</li>
<li>The attacker moves laterally to other systems on the network, using the compromised system as a pivot point.</li>
<li>The attacker achieves their final objective, which may include data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to privilege escalation, allowing attackers to gain control of the compromised system and potentially the entire network. Attackers can use the compromised system as a staging ground for further attacks, exfiltrate sensitive data, deploy ransomware, or disrupt critical services. The medium severity score reflects the potential for significant impact if the activity is not detected and contained promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unusual Svchost Child Process - Childless Service</code> to your SIEM to detect potential process injection attacks targeting svchost.exe.</li>
<li>Tune the rule by adding known false positives to the exclusion list, such as <code>WerFault.exe</code>, <code>WerFaultSecure.exe</code>, and <code>wermgr.exe</code> to reduce alert fatigue.</li>
<li>Enable process creation logging via Sysmon (Event ID 1) with command line details for better visibility into spawned processes, as described in the <a href="https://ela.st/sysmon-event-1-setup">setup guide</a>.</li>
<li>Investigate any alerts generated by the rule, focusing on the process details and parent-child relationships to determine the legitimacy of the spawned process.</li>
<li>Consider using endpoint detection and response (EDR) solutions like Elastic Defend for enhanced visibility and automated response capabilities, as the rule is designed for data generated by <a href="https://www.elastic.co/security/endpoint-security">Elastic Defend</a>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>process_injection</category><category>privilege_escalation</category><category>defense_evasion</category><category>windows</category></item></channel></rss>