<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Visual Studio — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-visual-studio/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-visual-studio/feed.xml" rel="self" type="application/rss+xml"/><item><title>Persistence via Visual Studio Tools for Office (VSTO) Add-ins</title><link>https://feed.craftedsignal.io/briefs/2024-01-vsto-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vsto-persistence/</guid><description>The Visual Studio Tools for Office (VSTO) add-ins can be abused by attackers to establish persistence in Microsoft Office applications by modifying registry keys.</description><content:encoded><![CDATA[<p>Attackers can leverage Visual Studio Tools for Office (VSTO) add-ins to establish persistence within Microsoft Office applications. VSTO add-ins, designed to extend the functionality of Office applications, can be manipulated by threat actors to execute malicious code upon application startup. By modifying specific registry keys associated with VSTO add-ins, adversaries can ensure their code is loaded and executed each time an Office application is launched. This technique allows for covert and persistent access to compromised systems, enabling further malicious activities such as data exfiltration, lateral movement, or the deployment of additional payloads. The detection of this persistence mechanism is crucial for defenders to identify and mitigate potential compromises within their environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system via unspecified means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker identifies the registry keys associated with VSTO add-ins for Office applications (Outlook, Word, Excel, PowerPoint). These keys are typically located under <code>\Software\Microsoft\Office\[Application]\Addins\</code>.</li>
<li>The attacker modifies the registry to add or modify entries related to a malicious VSTO add-in. This involves setting the <code>LoadBehavior</code> value to <code>3</code> to ensure the add-in is loaded on startup.</li>
<li>The attacker places the malicious VSTO add-in files (DLLs) in a location accessible to the Office application.</li>
<li>The attacker may also modify the <code>\Software\Microsoft\VSTO\Security\Inclusion\</code> registry key to bypass security warnings related to unsigned add-ins.</li>
<li>The user launches the targeted Office application (e.g., Outlook).</li>
<li>The Office application loads the malicious VSTO add-in based on the modified registry entries.</li>
<li>The malicious VSTO add-in executes its payload, enabling the attacker to perform malicious activities on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistent code execution within Microsoft Office applications. This can lead to the compromise of sensitive data, the deployment of additional malware, and the establishment of a long-term foothold within the targeted environment. The scope of impact depends on the privileges of the user account and the capabilities of the malicious VSTO add-in. Since Office applications are commonly used, a successful attack could potentially affect a large number of users within an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Persistence Via Visual Studio Tools for Office</code> to your SIEM to detect suspicious registry modifications related to VSTO add-ins.</li>
<li>Monitor registry modifications under the paths <code>\Software\Microsoft\Office\Outlook\Addins\</code>, <code>\Software\Microsoft\Office\Word\Addins\</code>, <code>\Software\Microsoft\Office\Excel\Addins\</code>, <code>\Software\Microsoft\Office\Powerpoint\Addins\</code>, and <code>\Software\Microsoft\VSTO\Security\Inclusion\</code> (see Sigma rule and references).</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted VSTO add-ins.</li>
<li>Regularly review and audit installed Office add-ins to identify and remove any suspicious or unauthorized extensions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>office</category><category>vsto</category></item><item><title>Detecting Suspicious Scheduled Task Creation in Windows</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-creation/</guid><description>This rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.</description><content:encoded><![CDATA[<p>Adversaries frequently abuse Windows scheduled tasks to establish persistence, move laterally within a network, and escalate privileges. This technique involves creating or modifying scheduled tasks to execute malicious code at specific times or in response to certain events. This detection rule identifies suspicious task creation by filtering out benign tasks and those initiated by system accounts, focusing on potential threats. The rule relies on Windows Security Event Logs, offering a valuable method for identifying unauthorized task creation indicative of malicious activity. The detection logic specifically excludes common tasks associated with software updates from vendors like Hewlett-Packard, Microsoft, Google, and Mozilla, as well as tasks run by system accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker uses their initial access to execute commands, potentially leveraging PowerShell or cmd.exe.</li>
<li>The attacker uses the <code>schtasks</code> command-line utility or the COM interface to create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload, such as a reverse shell or a data exfiltration script.</li>
<li>The task is set to trigger based on a specific schedule, such as at system startup, at a specific time, or upon a specific event.</li>
<li>When the trigger occurs, the scheduled task executes the malicious payload.</li>
<li>The malicious payload establishes persistence, allowing the attacker to maintain access to the compromised system.</li>
<li>The attacker can then use the persistent access to move laterally to other systems or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to maintain persistent access to compromised systems, potentially leading to data theft, system disruption, or further lateral movement within the network. By creating malicious scheduled tasks, attackers can ensure their code is executed even after a system reboot or user logoff. This can result in long-term compromise and significant damage to affected organizations. While the number of victims and specific sectors targeted are not detailed, the potential impact is broad due to the widespread use of Windows systems in enterprise environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logging and ensure that event ID 4698 (A scheduled task was created) is collected.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Scheduled Task Creation via Winlog&rdquo; to your SIEM to detect potentially malicious scheduled task creation events.</li>
<li>Regularly review and update the exclusion list in the Sigma rule to account for new benign scheduled tasks in your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the task&rsquo;s name, path, actions, and triggers to determine if they are suspicious.</li>
<li>Monitor for related suspicious activity, such as unusual process executions or network connections originating from the compromised system.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>scheduled_task</category><category>windows</category></item></channel></rss>