<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Monitoring Agent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-monitoring-agent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-monitoring-agent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Whoami Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-whoami-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-whoami-discovery/</guid><description>This rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.</description><content:encoded><![CDATA[<p>The <code>whoami</code> utility is commonly used by attackers post-compromise to gather information about the current user and their privileges on a compromised system. This information helps attackers assess their level of access and plan further actions within the environment, such as privilege escalation or lateral movement. This activity is most concerning when executed by SYSTEM accounts or from unusual parent processes. This detection identifies unusual or suspicious executions of <code>whoami.exe</code>, especially when associated with system privileges or specific parent processes known to be abused by attackers. The rule is designed to function across various Windows environments and considers potential false positives from legitimate administrative tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows system through an exploit or compromised credentials.</li>
<li>Privilege Escalation (Optional): The attacker may attempt to elevate privileges to a higher level, potentially SYSTEM.</li>
<li>Discovery: The attacker executes <code>whoami.exe</code> to determine the current user and their privileges.</li>
<li>Information Gathering: The attacker analyzes the output of <code>whoami.exe</code> to understand the context of the compromised system.</li>
<li>Lateral Movement (Conditional): Based on the information gathered, the attacker may attempt to move laterally to other systems.</li>
<li>Further Exploitation: The attacker leverages the gathered information to further exploit the compromised system or network.</li>
<li>Persistence (Optional): The attacker may establish persistence to maintain access to the compromised system.</li>
<li>Objective Completion: The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and reconnaissance can allow attackers to gain a deeper understanding of a compromised system. This may lead to further exploitation, lateral movement, and ultimately, the exfiltration of sensitive data or the disruption of critical services. While the <code>whoami</code> command itself is not inherently malicious, its suspicious usage often indicates malicious activity within a compromised environment. The severity is low because the execution of whoami by itself is not enough to confirm malicious activity, and further investigation is needed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>whoami.exe</code> executions (reference: logs-endpoint.events.process-*, logs-system.security*, logs-windows.forwarded*, logs-windows.sysmon_operational-*).</li>
<li>Deploy the Sigma rule &ldquo;Whoami Process Activity&rdquo; to your SIEM and tune for your environment (reference: rule).</li>
<li>Investigate parent processes of <code>whoami.exe</code> for any suspicious or unusual activity (reference: Attack Chain).</li>
<li>Monitor for other discovery commands executed around the same time as <code>whoami.exe</code> (reference: Related rules).</li>
<li>Review and tune the false positives outlined in the rule to minimize noise (reference: false_positives).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>threat-detection</category></item></channel></rss>