<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PowerPoint — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/powerpoint/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 18:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/powerpoint/feed.xml" rel="self" type="application/rss+xml"/><item><title>XSL Script Execution via COM Interface in Microsoft Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-xsl-script-execution-via-com/</link><pubDate>Fri, 26 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xsl-script-execution-via-com/</guid><description>Adversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging the Microsoft.XMLDOM COM interface in Microsoft Office applications to execute malicious scripts. This technique involves embedding malicious JScript or VBScript within XSL transformations, which are then processed by Office applications like Word, Excel, PowerPoint, and Publisher. The exploitation begins when a user opens a specially crafted document. This campaign abuses legitimate functionalities for malicious purposes. This technique can be used for initial access, defense evasion, and execution of arbitrary code. The observed behavior includes the loading of <code>msxml3.dll</code> and the spawning of child processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious Office document.</li>
<li>The user opens the document in Microsoft Word (winword.exe), Excel (excel.exe), PowerPoint (powerpnt.exe), or Publisher (mspub.exe).</li>
<li>The Office application loads <code>msxml3.dll</code> to process XML content within the document.</li>
<li>The document contains an embedded XSL script with malicious JScript or VBScript code.</li>
<li>The XSL transformation is initiated, executing the embedded script via the COM interface.</li>
<li>The script spawns a new process (cmd.exe, powershell.exe, or mshta.exe) to execute arbitrary commands.</li>
<li>The spawned process downloads and executes a payload from a remote server.</li>
<li>The payload establishes persistence, escalates privileges, and performs malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, potentially compromising sensitive data and allowing attackers to gain initial access to the targeted system. This can result in data breaches, financial losses, and reputational damage. The scope of impact includes any Windows systems running vulnerable versions of Microsoft Office. If successful, the attacker can achieve persistence, perform lateral movement and compromise other systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;XSL Script Execution via COM&rdquo; to your SIEM to detect the execution of hosted XSL scripts using the Microsoft.XMLDOM COM interface.</li>
<li>Monitor for the loading of <code>msxml3.dll</code> by Microsoft Office applications and subsequent process creations to identify potential exploitation attempts.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized scripts and executables, particularly those not located in standard directories.</li>
<li>Block the execution of unusual or unsigned child processes spawned by Microsoft Office applications to prevent malicious script execution.</li>
<li>Educate users about the risks of opening suspicious attachments or clicking on links in phishing emails (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xsl-script</category><category>com-interface</category><category>office-macro</category></item><item><title>Suspicious Image Load (taskschd.dll) from MS Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</guid><description>Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.</description><content:encoded><![CDATA[<p>This detection rule identifies a suspicious image load (<code>taskschd.dll</code>) originating from Microsoft Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSPUB.EXE, MSACCESS.EXE). The behavior suggests potential adversarial activity involving the creation of scheduled tasks through the Windows Component Object Model (COM). Attackers may exploit this technique to establish persistence, circumventing traditional monitoring focused on the <code>schtasks.exe</code> utility. The use of COM for scheduled task management allows for stealthier operation and evasion of standard security controls, making it a valuable persistence mechanism for malicious actors. The rule is designed for data generated by Elastic Defend, Sysmon, and other endpoint detection platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User opens a malicious Microsoft Office document (e.g., Word, Excel).</li>
<li>The document executes embedded macro code or exploits a vulnerability.</li>
<li>The macro or exploit leverages the Component Object Model (COM).</li>
<li>The Office application (e.g., WINWORD.EXE) loads the <code>taskschd.dll</code> library, providing access to the Task Scheduler service.</li>
<li>The COM interface is used to programmatically create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload at a later time or on a recurring basis.</li>
<li>The malicious payload could be a script, executable, or command-line instruction.</li>
<li>Upon execution, the payload achieves the attacker&rsquo;s objective, such as establishing persistence, downloading additional malware, or compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging this technique can allow adversaries to maintain persistent access to a compromised system. This can lead to long-term data exfiltration, lateral movement within the network, and deployment of ransomware. The low severity score assigned to the original rule may underestimate the potential impact, as persistence is a critical component of many advanced attacks. Affected systems may require extensive remediation to remove all traces of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Office Application Loading Task Scheduler DLL&rdquo; to your SIEM and tune for your environment to detect this specific activity.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging on Windows endpoints to provide visibility into DLL loading events, which is a prerequisite for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific scheduled tasks that are created and the payloads they execute.</li>
<li>Monitor for scheduled task creation events (Event ID 4698) and deletion events (Event ID 4699) in the Windows Event Logs, as referenced in the rule&rsquo;s investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>image_load</category><category>scheduled_task</category></item><item><title>Suspicious Command Prompt Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-cmd-network/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-cmd-network/</guid><description>This alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.</description><content:encoded><![CDATA[<p>This detection identifies suspicious network connections initiated by the command prompt (cmd.exe) on Windows systems. The rule focuses on cmd.exe processes executed with specific arguments, such as those indicating script execution (e.g., *.bat, *.cmd), access to remote resources (e.g., URLs), or those spawned by Microsoft Office applications (Excel, Word, etc.). Attackers frequently abuse cmd.exe to download malicious payloads, execute commands, or establish command and control channels. This detection aims to identify such potentially malicious activity by correlating process creation events with subsequent network connections. The rule excludes common private and reserved IP address ranges to reduce false positives. The targeted systems are Windows endpoints where adversaries attempt to leverage cmd.exe for malicious purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious document (e.g., Word, Excel) or executes a seemingly benign application.</li>
<li>The document or application contains a macro or script that initiates a cmd.exe process.</li>
<li>The cmd.exe process is launched with arguments indicating script execution (<code>/c</code>, <code>/k</code>) and referencing a remote resource (e.g., a URL) or a local batch file.</li>
<li>The cmd.exe process attempts to download a payload from a remote server using protocols like HTTP, HTTPS, or FTP.</li>
<li>The downloaded payload is saved to disk, often with a disguised filename.</li>
<li>The cmd.exe process executes the downloaded payload, initiating further malicious actions.</li>
<li>The malicious payload establishes a command and control (C2) channel with a remote server.</li>
<li>The attacker uses the C2 channel to send commands to the compromised system, potentially leading to data exfiltration or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of Windows endpoints, potentially enabling attackers to download and execute malicious payloads, establish command and control channels, and perform further malicious activities such as data theft, lateral movement, or ransomware deployment. While this detection has a low severity, it serves as an early warning sign of potential compromise and should be investigated promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the full context of cmd.exe executions.</li>
<li>Monitor network connections from cmd.exe processes, focusing on connections to external IP addresses, using a network monitoring solution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious cmd.exe network connections.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on cmd.exe processes spawned by Office applications or those executing scripts from remote URLs.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-prompt</category><category>network-connection</category><category>windows</category><category>execution</category><category>command-and-control</category></item></channel></rss>