<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft.Workflow.Compiler.exe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft.workflow.compiler.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft.workflow.compiler.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Microsoft Workflow Compiler Rename</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-workflow-compiler-rename/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-workflow-compiler-rename/</guid><description>Detection of the renaming of microsoft.workflow.compiler.exe, a technique used by attackers to evade security controls and potentially execute arbitrary code for privilege escalation or persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the suspicious renaming of the Microsoft Workflow Compiler (microsoft.workflow.compiler.exe), a legitimate but rarely used executable typically found in C:\Windows\Microsoft.NET\Framework64\v4.0.30319. Attackers may rename this file to masquerade malicious activity and bypass security solutions that rely on file name-based detection. This technique can be employed by various threat actors, including ransomware groups like BlackByte, to execute arbitrary code, escalate privileges, and maintain persistence on compromised systems. The LOLBAS Project documents this binary as a potential avenue for malicious code execution. This activity is significant because it represents a living-off-the-land tactic (LOTL) that is harder to detect than custom malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker identifies Microsoft.Workflow.Compiler.exe in C:\Windows\Microsoft.NET\Framework64\v4.0.30319.</li>
<li>The attacker renames Microsoft.Workflow.Compiler.exe to a different name (e.g., svchost.exe) using a command-line tool like <code>rename</code>.</li>
<li>The attacker executes the renamed executable with malicious parameters or a payload.</li>
<li>The renamed Microsoft Workflow Compiler executes arbitrary code, bypassing file name-based security controls.</li>
<li>The attacker achieves privilege escalation by exploiting the trust associated with the original executable.</li>
<li>The attacker establishes persistence by scheduling the renamed executable to run automatically.</li>
<li>The attacker uses the compromised system to move laterally, exfiltrate data, or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful renaming and execution of the Microsoft Workflow Compiler can lead to significant compromise, allowing attackers to bypass security measures and execute arbitrary code. This can lead to privilege escalation, persistence, and further malicious activities such as data theft or ransomware deployment. The BlackByte ransomware group has been known to use similar LOLBIN techniques, and the ease of renaming the file makes it a popular choice for attackers looking to evade detection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events (Sysmon EventID 1 or Windows Event Log Security 4688) for the execution of renamed Microsoft Workflow Compiler processes using the provided Sigma rule <code>Detect Suspicious Microsoft Workflow Compiler Execution</code>.</li>
<li>Implement endpoint detection and response (EDR) solutions to collect and analyze process telemetry, including process names, original file names, parent processes, and command-line arguments.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Microsoft Workflow Compiler Rename</code> to identify instances where <code>Microsoft.Workflow.Compiler.exe</code> is renamed.</li>
<li>Investigate any alerts generated by the Sigma rules, paying close attention to the parent processes, command-line arguments, and destination hosts.</li>
<li>Enable Sysmon process creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lolbin</category><category>defense-evasion</category><category>living-off-the-land</category><category>masquerading</category></item></channel></rss>