<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Diagnostics Troubleshooting Wizard (MSDT) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-diagnostics-troubleshooting-wizard-msdt/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 25 Jan 2024 14:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-diagnostics-troubleshooting-wizard-msdt/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Microsoft Diagnostics Wizard Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-msdt-abuse/</link><pubDate>Thu, 25 Jan 2024 14:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-msdt-abuse/</guid><description>This rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.</description><content:encoded><![CDATA[<p>The Microsoft Diagnostics Troubleshooting Wizard (MSDT) is a built-in Windows tool used for troubleshooting various system issues. Attackers can abuse MSDT to proxy malicious command or binary execution through carefully crafted process arguments, evading traditional defense mechanisms. This technique leverages the trust associated with a signed Microsoft binary (msdt.exe) to execute arbitrary commands. The detection rule identifies suspicious MSDT executions based on command-line arguments, filename discrepancies, and unusual process relationships. This activity has been observed since at least May 2022 and continues to be a relevant defense evasion technique. Defenders should monitor for unusual invocations of MSDT, especially when launched from untrusted sources or with suspicious arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access via an unspecified vector (e.g., phishing, drive-by download).</li>
<li>The attacker uses a malicious document or script to invoke <code>msdt.exe</code> with specific arguments.</li>
<li>MSDT is executed with a crafted <code>IT_RebrowseForFile</code> or <code>IT_BrowseForFile</code> parameter containing a malicious payload.</li>
<li>Alternatively, MSDT is executed with <code>-af /skip</code> and a path to a malicious <code>PCWDiagnostic.xml</code> file.</li>
<li>MSDT processes the malicious input, leading to the execution of attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes, potentially downloading or executing further payloads.</li>
<li>The attacker achieves persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker moves laterally through the network, compromising additional systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security controls and execute arbitrary code on compromised systems. This can lead to data theft, system compromise, and further propagation of the attack within the network. The defense evasion tactic can obscure malicious activities, making it more difficult to detect and respond to incidents. Depending on the user&rsquo;s privileges, the attacker might gain elevated privileges on the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to detect suspicious MSDT executions based on process arguments, filename discrepancies, and unusual parent-child relationships.</li>
<li>Monitor process creation events for <code>msdt.exe</code> with arguments containing <code>IT_RebrowseForFile=*</code>, <code>*FromBase64*</code>, or <code>*/../../../*</code> using the provided Sigma rule.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution details for the provided Sigma rules.</li>
<li>Investigate any alerts generated by these rules, focusing on the process command line, parent process, and any spawned child processes.</li>
<li>Block execution of <code>msdt.exe</code> from non-standard paths as highlighted in the detection rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>defense-evasion</category><category>msdt</category><category>windows</category></item></channel></rss>