<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MsMpEng.exe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/msmpeng.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/msmpeng.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential RemoteMonologue Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</guid><description>This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.</description><content:encoded><![CDATA[<p>The RemoteMonologue attack technique abuses Component Object Model (COM) objects to coerce authentication from a remote system. This is achieved by modifying the <code>RunAs</code> registry value associated with a COM object. Setting this value to &ldquo;Interactive User&rdquo; forces the COM object to run under the context of the interactive user, enabling attackers to hijack sessions and potentially escalate privileges. This technique is often used as a defense evasion or persistence mechanism by adversaries after gaining initial access to a system. The attack involves modifying registry keys associated with COM objects to trigger NTLM authentication coercion. This can be used for lateral movement and gaining access to sensitive resources. This rule is designed to detect registry modifications indicative of the RemoteMonologue attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the target system through unspecified means.</li>
<li>Identify COM Objects: The attacker identifies suitable COM objects for abuse.</li>
<li>Modify Registry: The attacker modifies the registry to set the <code>RunAs</code> value for the selected COM object to <code>Interactive User</code>. This involves modifying the registry path <code>HKCR\AppID\{Clsid}\RunAs</code>.</li>
<li>Trigger COM Object Execution: The attacker triggers the execution of the modified COM object, potentially through a remote procedure call or other inter-process communication mechanisms.</li>
<li>Authentication Coercion: The execution of the COM object triggers NTLM authentication to a system controlled by the attacker.</li>
<li>Relay Attack: The attacker relays the coerced NTLM authentication to gain access to other resources on the network.</li>
<li>Session Hijacking: Successful relay leads to session hijacking, allowing the attacker to impersonate the user.</li>
<li>Lateral Movement/Privilege Escalation: The attacker uses the hijacked session for lateral movement or privilege escalation within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful RemoteMonologue attack can lead to unauthorized access to sensitive systems and data. By coercing authentication and hijacking sessions, attackers can bypass security controls and escalate their privileges within the network. The scope of the impact depends on the privileges of the hijacked user account and the resources accessible to that account. This attack can enable lateral movement, data exfiltration, and other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect RemoteMonologue Registry Modification</code> to your SIEM to identify suspicious registry modifications related to COM object hijacking.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the registry event logs and identifying the user account and process responsible for the registry modification.</li>
<li>Implement enhanced monitoring on critical systems to detect any attempts to modify COM object registry settings.</li>
<li>Block the attack by ensuring &ldquo;RunAs&rdquo; value is not set to &ldquo;Interactive User&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remotemonologue</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item></channel></rss>